Use Netcat to Spawn Reverse Shells & Connect to Other Computers [Tutorial]

Тәжірибелік нұсқаулар және стиль

Get Our Premium Ethical Hacking Bundle (90% Off): nulb.app/cwlshop
How to Create Reverse Shells with Netcat
Full Tutorial: nulb.app/z3gcc
Subscribe to Null Byte: goo.gl/J6wEnH
Kody's Twitter: / kodykinzie
Cyber Weapons Lab, Episode 050
Netcat and Ncat are two useful tools for copying data across a network. To a hacker, the only limit to these tools utility is your imagination, and we'll demonstrate the ability to do everything from copying data across a local network to remotely controlling a computer with a reverse shell. We'll show you how it works in this episode of Cyber Weapons Lab.
To learn more, check out the article: nulb.app/z3gcc
Follow Null Byte on:
Twitter: / nullbyte
Flipboard: flip.it/3.Gf_0
Website: null-byte.com
Weekly newsletter: eepurl.com/dE3Ovb
Vimeo: vimeo.com/channels/nullbyte

Пікірлер: 275

  • @minibit0103
    @minibit01035 жыл бұрын

    Always nice to see basic techniques that are clear, keep the content flowing!

  • @MrKristian252
    @MrKristian2525 жыл бұрын

    Hacking doesn't need to be used in a bad way.. but it's a really good way to learn how the structure of these systems/technologies/software/code work. I love watching your videos, because it's information I've never heard about before...

  • @Aditya-wg3lp

    @Aditya-wg3lp

    4 жыл бұрын

    Mr.Kristian252 im using it for scambaitin

  • @jahazielvazquez7264

    @jahazielvazquez7264

    4 жыл бұрын

    Oh come on, let's be real here. Everyone here is trying to feed their evil curiosity

  • @paultapping9510

    @paultapping9510

    3 жыл бұрын

    Shaper vs anarch. Or urbex vs housebreaking, I guess. Same means, different ends.

  • @ismaelc.e8398

    @ismaelc.e8398

    2 жыл бұрын

    W BIG POWA CUMS BIG RESPONSABILITY

  • @somebody3271

    @somebody3271

    2 жыл бұрын

    @@jahazielvazquez7264 true

  • @ajopasoij9d00
    @ajopasoij9d005 жыл бұрын

    Ghost in the Shell!

  • @SadKris

    @SadKris

    5 жыл бұрын

    ...im so proud of this joke

  • @bittylifts

    @bittylifts

    3 жыл бұрын

    DO NOT LIKE, ITS AT 69

  • @milathecat5454

    @milathecat5454

    3 жыл бұрын

    I love you destiny

  • @Hari-888
    @Hari-8883 жыл бұрын

    This video was amazing dude, I finally understood how exactly a reverse shell works

  • @harism0
    @harism04 жыл бұрын

    I like the cat pictures in the background, fits in well 😂👏

  • @silverhawktc
    @silverhawktc5 жыл бұрын

    Great content as always, keep up the good work! I noticed you use some really good songs in the background :D. Would you please tell us which you use in the description? That would be great!

  • @PianoShawn
    @PianoShawn5 жыл бұрын

    i've been waiting for this for a very long time

  • @sireatsalot398

    @sireatsalot398

    5 жыл бұрын

    same

  • @pavelschannel-alittleoutof3532
    @pavelschannel-alittleoutof35322 жыл бұрын

    He has pictures of cats so therefore I trust him 100% :) He does explain very well without going on too much unlike others. I like his teaching methods. We need more people like this as you tube is full of useless teaching / tutorial videos that should be binned...

  • @StefanRows
    @StefanRows5 жыл бұрын

    Kody, amazing Video as always! Can't wait for the next one!

  • @iyeetsecurity922
    @iyeetsecurity9222 жыл бұрын

    I grew up loving any form of a puzzle. Then it continued with video games. That's the reason I enjoy hacking and lock picking. They're just puzzles waiting to be solved.

  • @techslugz

    @techslugz

    Жыл бұрын

    I am pretty sure I have the same addiction 😮

  • @puppyofwrath
    @puppyofwrath3 жыл бұрын

    That is a big watch. This dude knows what time it is.

  • @Passive-Play
    @Passive-Play Жыл бұрын

    You're an inspiration and amazing teacher, found you via David Bombal and your videos have provided some of the most easiest to deliver education I have found on KZread

  • @fredericaveline9207
    @fredericaveline92074 жыл бұрын

    Good job! I'm hacker rookie, and I'm used to using metasploit framework without knowing the basics! So thanks.

  • @NullByteWHT

    @NullByteWHT

    4 жыл бұрын

    frédéric aveline thanks for watching! Tell all of your friends about us! 😃

  • @kenny-kvibe
    @kenny-kvibe4 жыл бұрын

    This nc is really really awesome to use if you have to copy some text to other devices running linux. I mean It's like Copy-Paste over the local network, very convenient!

  • @lelandclayton5462
    @lelandclayton54625 жыл бұрын

    This trick has been around for a long time and harden IT security veterans know about it and have setup proper firewall rules and crap. A matter of fact this is in the book "Instant Netcat Starter" by K. C. Yerrid.

  • @Cesar-dt9nl
    @Cesar-dt9nl5 жыл бұрын

    If hacking wasnt good enough, now with lazerhawk this is flawless, thanks for the info

  • @craigheard2504
    @craigheard25043 жыл бұрын

    Thanks a lot. You explained this extremely well. this ability is powerful, useful and terrifying.

  • @kohibzoparel4657

    @kohibzoparel4657

    2 жыл бұрын

    Great fun though remember to cover that camera that's the best way to stay safe online 😅😅😅😅😅😅

  • @cy_wareye7395
    @cy_wareye73955 жыл бұрын

    Your intro helps me focus before your tut

  • @NullByteWHT

    @NullByteWHT

    5 жыл бұрын

    I'm glad you like it! We shot it the one day we had a nice stabilizer

  • @jannmoon
    @jannmoon5 жыл бұрын

    really loving the new haircut bro

  • @CaptBoykin
    @CaptBoykin5 жыл бұрын

    @6:20 "nc -l -p 6996 -e /bin/bash " does not perform a reverse shell. This is a bind shell.

  • @krizsan0596

    @krizsan0596

    3 жыл бұрын

    It is a reverse shell since the server is calling back to the attacker

  • @CaptBoykin

    @CaptBoykin

    3 жыл бұрын

    @@krizsan0596 No. @6:10 he correctly references it as a backdoor (bindshell). A reverse shell would imply the incoming connection is running the prog (-e). The "shell" that is spawned via "-e" @6:20 is spawned on the host that is running nc (which is binding locally on that host with the "-l" option). It's doing zero 'dialing out' as it's a local listener.

  • @realitynowassigned

    @realitynowassigned

    3 жыл бұрын

    @@AaronmMcLean hush child.

  • @realitynowassigned

    @realitynowassigned

    3 жыл бұрын

    @@CaptBoykin thanks for pointing that out, its important. I specifically needed to look at reverse shells

  • @jhde9067

    @jhde9067

    3 жыл бұрын

    So ... What is a reverse shell? What's the different types of shells and their differences? Kinda confusing.

  • @kingslayer9097
    @kingslayer90975 жыл бұрын

    Love the cats behind u

  • @Dave-kq7gv
    @Dave-kq7gv5 жыл бұрын

    combine this with a n00b guide for cron...I'm a newb at both but see how cool it'd be! Cool content all around, good sir!

  • @Daniel_CLopes
    @Daniel_CLopes5 жыл бұрын

    Great, great, great. Could you kindly upload a video explaining how to generate nmap reports, import report to metasploit framework and exploit vulnerability using scripts? I know we can find videos out there but I believe you guys can do it MUCH better.

  • @oliverludwig6148
    @oliverludwig61483 жыл бұрын

    1st background track is Lazerhawk - So far away, in case anyone is wondering.

  • @imrwe9691
    @imrwe96915 жыл бұрын

    Your just awesome man .We would love if you put up a video of hacking these microsoft technician scammers and shutting down their network .It would be fun.

  • @Mong3
    @Mong35 жыл бұрын

    Please talk about C2's (command & control) and Payloads generators with build/execution time polymorphisms.

  • @biniesh7097
    @biniesh70975 жыл бұрын

    thank you for the vide0!

  • @GoranObal
    @GoranObal3 жыл бұрын

    9:03 I'm pretty sure the article was for using Windows command prompt. There the type command is like cat in linux. The type command in linux is something else.

  • @matteocassino3172
    @matteocassino31723 жыл бұрын

    Love the tool and the awesome GhostInTheShell wallpaper (must have! Thx reverse pic search ;-)

  • @htiguy1
    @htiguy14 жыл бұрын

    Very interesting, you have some great content. Thank you.

  • @NullByteWHT

    @NullByteWHT

    4 жыл бұрын

    htiguy1 thanks for watching! Tell all of your friends about us! 😃

  • @VetbossOfficial
    @VetbossOfficial3 жыл бұрын

    thank you. but can I save the computer connection so I can get access in the future as well? Because I want to connect to it more than once.

  • @jackrichards3697
    @jackrichards3697 Жыл бұрын

    You've been a great directory ;) for basic info over the last few years. Thank you. Keep it coming!

  • @rayamoooooo685
    @rayamoooooo6853 жыл бұрын

    *just glad i can follow along*

  • @CrackerWeb
    @CrackerWeb4 жыл бұрын

    To use the nc the client system(server) must have nc install, am i right?

  • @RAGHAVENDRASINGH17
    @RAGHAVENDRASINGH175 жыл бұрын

    Nice tutorial

  • @LiquidTension187
    @LiquidTension1873 жыл бұрын

    Hey great video !!! Very informative (: just curious, how big of a file can you transfer on LAN using netcat ?

  • @amarchhabra2175
    @amarchhabra21755 жыл бұрын

    Thanks for the great video. The Null Byte web page seems to be down. Will it eventually be brought back online?

  • @sinan5488
    @sinan54885 жыл бұрын

    FINALLY A GOOD TUTORIAL BY A GOOD HACKER

  • @jitheshkuyyalil
    @jitheshkuyyalil2 жыл бұрын

    Wonderful. Thank you so much.

  • @sabrario
    @sabrario5 жыл бұрын

    what laptop do you have? Do you use any other system?

  • @g.s.3389
    @g.s.33895 жыл бұрын

    can you please make a video on how to make an headless rpi with kali so that wifi works without the need of a GUI. thx

  • @yunietpiloto4425
    @yunietpiloto44255 жыл бұрын

    very nice vid...thanks for sharing

  • @TheCuriousM1nd
    @TheCuriousM1nd5 жыл бұрын

    What laptop did you use sir!

  • @adriansony9762
    @adriansony97622 жыл бұрын

    Great content I love your channel very much

  • @acostantino7624
    @acostantino76245 жыл бұрын

    what are the pros using netcat insead of ssh?

  • @DDBAA24

    @DDBAA24

    5 жыл бұрын

    Well, in regards to transferring files over the network NC seems faster it could be my imagination but it does. Also to speed up SSH passing the -C flag will enable compression in the SSH session which does seem to speed things up slightly . I digress. Getting to the question, this is a chicken and the egg type question, in order to use NC on a remote system you would already have had to gain access to it , so to do that you would use SSH. So you wouldn't be able to use NC unless you had a shell already via SSH so therefore there are no pros because one doesn't exist without the other, no shell= no netcat. In order to use NC you would have to setup a listener (the server) and connect to the listener ( you the client). Hope that brings some clarity.

  • @astralseeker
    @astralseeker4 жыл бұрын

    Music: Swedish progressive trance project: Vibrasphere Title: Sweet September ... no credit you're welcome

  • @dualsensedynasty
    @dualsensedynasty2 жыл бұрын

    do you have anything like getting reverse shell from Public network and Public IP

  • @rayhanfoinshola7037
    @rayhanfoinshola7037 Жыл бұрын

    I have a question do you need net cat on both the attacking device and the device that is attacking.

  • @nemo2225
    @nemo22255 жыл бұрын

    You can simply ping the address for ip resolving. That's more anonymous than running nmap scan, right?

  • @haskeww8193
    @haskeww81934 ай бұрын

    I am very new i would love to be able to identify that a computer is compromised i don't have access to certain files despite being the administrator, i have played around downloaded comodo which at least allows me to deny processes from executing but i get lost looking threw processes, weird files, would love how to use a packet sniffer ect i really need to get a better foundation of the basics anything you recommend?

  • @clarktrader625
    @clarktrader6255 жыл бұрын

    Thks you sir.

  • @Dev_UI
    @Dev_UI5 жыл бұрын

    I love how hard you hit that mech keyboard in most videos you've made :D :)

  • @NullByteWHT

    @NullByteWHT

    5 жыл бұрын

    I spilled a yerba mate tea all over my keyboard and it is extremely sticky

  • @Dev_UI

    @Dev_UI

    5 жыл бұрын

    😁😂

  • @GameChannelOfficial
    @GameChannelOfficial5 жыл бұрын

    How to connect to nc session vis Windows????

  • @jacoblessard8213
    @jacoblessard82132 жыл бұрын

    I know this is 3 years old but someone please help, I'm trying to figure out a way I can do exactly this but just by using a rogue access point. In theory, if someone is connected to my rogue access point shouldn't I be able to then connect to it with netcat and get a reverse shell on them. I really just want to know more about modern attacks that are done with rogue access points.

  • @asipalacios8701
    @asipalacios87012 ай бұрын

    does it still work if you dont have physical access to both computers? is it really hacking or do you show connection with netcat here?

  • @Danieloani
    @Danieloani3 жыл бұрын

    I think don't understand the concept. The point of this video is to show how to control a remote computer using netcat. However, in order to make something work, at first, you need to open a port on the "remote computer" (which as hacker' you don't have access to). Is there a way to convince the target to open a port and run the commands via a bash?

  • @GodKeks-
    @GodKeks-2 жыл бұрын

    Hello thanks i have a quetschen what u using in the window? Dell-3 what is this ?

  • @CRRonaldo-lq9os
    @CRRonaldo-lq9os5 жыл бұрын

    i love your channel

  • @poopingturtle7978
    @poopingturtle79784 жыл бұрын

    So do you need to have the backdoor? If so how would you install it remotely?

  • @davidkostoski

    @davidkostoski

    3 жыл бұрын

    If he knew that he wouldn't be making videos that explain BASICS. He'd then have a 500k job as a security specialist.

  • @Software-ns9li
    @Software-ns9li5 жыл бұрын

    I am trying to get a reverse shell on a PC with nothing more than an IP address, how do i accomplish this? i have a lab setup with different internet sources etc, all i can get is an IP, how do i get a revere shell with just an IP?, I have tried NetCat and MSFvenom but have failed

  • @Uneke
    @Uneke5 жыл бұрын

    You really hate Priceline don’t you! 😂 I called out what site you were gonna pull an ip from before you said it 😂 Amazing! Perhaps one day you could make a video with the story behind it? Maybe call it “in the life of null byte, the shady practices of a crappy website” haha

  • @Morpheus776
    @Morpheus7765 жыл бұрын

    i wish i had the computer knowledge this guy has. where should one start?

  • @velociraptux7
    @velociraptux73 жыл бұрын

    I thought what I'd do was I'd pretend I was one of those deaf-mutes

  • @gixr5635
    @gixr56354 жыл бұрын

    great video !

  • @NullByteWHT

    @NullByteWHT

    4 жыл бұрын

    Flixr506 thanks for watching!

  • @andreimerla924
    @andreimerla9244 жыл бұрын

    resource temporarily unavailable i got this error when i tried to connect to the server

  • @bj76681
    @bj766812 жыл бұрын

    Hi Null Byte, I tried this but am not getting the connection establed on the listener side. it's showing " Listening on [any] 88......" after that no results. I tried adding the IP in ufw but still no luck. can help me to resolve this issue?

  • @skyelf4270
    @skyelf42702 жыл бұрын

    Hello, I try to connect two of my window laptop but keep getting this error message, do you know why? Ncat: An existing connection was forcibly closed by the remote host.

  • @whyarewealwaysyelling
    @whyarewealwaysyelling5 жыл бұрын

    Is it true you turned down a guest appearance on mr. Robot?

  • @mahigiri8062
    @mahigiri80623 жыл бұрын

    *Can somebody help me please* I used 'XEEXE' to create payloads but after running it on another windows, through where should I listen to it. I tried meterpreter but no connection was established. I believe xeexe is something different and might require something else. How can I establish connection please help

  • @younesmohssen8158
    @younesmohssen81585 жыл бұрын

    What if you wanted to get a reverse shell but you didn't have physical access to the targeted computer?

  • @phantomplayed

    @phantomplayed

    3 жыл бұрын

    Same question

  • @captainspolding6355
    @captainspolding63553 жыл бұрын

    With Quick Batch File Compiler can build an hiden .exe wit Netcat parameters same a .bat File, can use to build a small Backdoor

  • @cheetriprem9725
    @cheetriprem97255 жыл бұрын

    thank you.

  • @lightyagami1456
    @lightyagami14565 жыл бұрын

    8:54 What the heck! Am I unable to follow here? I thought that the MacOS had apparently became the attacker and the Kali system was victim since it can exfiltrate and run files from Kali. Pls reply which is the attacker machine here????

  • @leonardofelippine9781

    @leonardofelippine9781

    4 жыл бұрын

    Yes, I also got lost during the explanation. I believe the roles were reversed at some point

  • @dr.z1657

    @dr.z1657

    4 жыл бұрын

    Light Yagami I got lost here as well.

  • @KamilKowalski-lf3yt

    @KamilKowalski-lf3yt

    Жыл бұрын

    can you help me with it ?

  • @KamilKowalski-lf3yt

    @KamilKowalski-lf3yt

    Жыл бұрын

    @@leonardofelippine9781 can you help me with it ?

  • @debbiedaley6989
    @debbiedaley69895 жыл бұрын

    Hello...I sent u a list of questions 4 days ago using Termux....can u please help me ?????

  • @larbiboudibaboudiba5335
    @larbiboudibaboudiba53355 жыл бұрын

    u didnt montion the netcat -e "specifique version of netcat that can execute command" | | echo "nice work bro "

  • @ko-Daegu

    @ko-Daegu

    5 жыл бұрын

    larbiboudiba boudiba 6:33 He did it to execute bash

  • @ko-Daegu

    @ko-Daegu

    5 жыл бұрын

    larbiboudiba boudiba You wrote netcat -e So I thought that you where talking about nc -e I don’t know evil netcat this is a new for me will check it out Thankx

  • @ziomek96011

    @ziomek96011

    5 жыл бұрын

    You can still make a reverse shell by reading and writing to a named pipe, you can find info about how to do it in the man pages.

  • @shubhamtrivedi2155
    @shubhamtrivedi21554 жыл бұрын

    Dude u r perfect!!

  • @utshabchouhan1225
    @utshabchouhan12252 жыл бұрын

    Sir, I have access to upload any file in C:\Windows\Temp folder of (IIS/Windows server) .Can I get reverse connection just by uploading a reverse shell ?

  • @8080VB

    @8080VB

    2 жыл бұрын

    yes use -e

  • @roya2045
    @roya20453 жыл бұрын

    Hi Bro I have a system in my network I know its IP is there a way to access the system without using a payload I want to access its drives. Please reply

  • @mnageh-bo1mm
    @mnageh-bo1mm5 жыл бұрын

    Can you do this with metasplot ?

  • @debbiedaley6989
    @debbiedaley69895 жыл бұрын

    Im using termux .....so do I use apt get install or the (nc -l 8888)to install Also If doin jus a priv attack....do we need to type NC-l try.txt...ALL U TYPE INTO NETCAT COMPUTER TO TEST N INSTALL ARMEGGETON or just stay in "root" linux computer n not add lines ur putting into netcat screen ..confused as to if I'm suppose to b installing armeggeton which u didnt do in linux but u did in netcat computer .And ADD COMMANDS U PUT INTO NETCAT BUT NOT LINUX FOR TESTING ALSO ....PLEASE. HELP..BEEN TRYIN FOR DAYS WEEKS N MONTHS TO PERFORM THIS REMOTE ATTACK CUZ ITS THE M9DT IMPORTSNT THING IN MY LIFE SO I HAVE PROOF N CAN GET A DIV IN MASS U NEED PROOF ...PLEASE LMK COMMANDS FOR ONLY PRIVSTE ATTACK N WILL THIS WORK IF HE HAS A PRIV NETWORK N HAS ANTI VIRUS SOFTWARE PROTECTING HIS PHONE ?? ....THE ONLY COMMANDS I HAVE FOR PRIV IS. Line 1...APT GET INSTALLL get netcat. THEN line 2... NC THEN HIS IP 8888 THEN LINE 3 is his IP AGAIN BUT WITH 6996 ??????? DONT SOUND RIGHT...THEN LINE 4 IS NC -l -p 6996 -e /bin/bash n Line 4 nc -l -p 8888 Line 5 cat '/root/try.txt NC then IP then 8888....so 5 lines ...did not see u type any other in linic for Priv attack .that's why confused. If commands u put in netcat should have been put into termux for priv attack...please. n so sorry if I've confused the heck out of u....I dont have much time left ..PLEASS HELP

  • @user-om9pg9bn1w
    @user-om9pg9bn1w4 жыл бұрын

    can the server get a reverse shell on the client?

  • @alice_in_wonderland42
    @alice_in_wonderland425 жыл бұрын

    tcpsvd would be also good.

  • @tlouik
    @tlouik3 жыл бұрын

    what laptop do u use?

  • @raulcattelan4506
    @raulcattelan45063 жыл бұрын

    Thanks a lot

  • @paulredman1520
    @paulredman15202 жыл бұрын

    do both of the computers have to be using kali?

  • @DSAhmed
    @DSAhmed3 жыл бұрын

    why do you run nmap just to get priceline's IP address? seems a bit much. (dig, or nslookup seems to work just fine, plus you know 80/443 will be open)

  • @FirstLast-hm8oz
    @FirstLast-hm8oz4 жыл бұрын

    My question is how to start a "nc -l -p 9669 -e /bin/bash " on the server if I am not in yet.

  • @Wastelander1972

    @Wastelander1972

    4 жыл бұрын

    If you’re using a Linux terminal, chances are you can chain the command... you could try piping it, but IDK if you will experience the same results with piping. Chain with ; pipe with | . Ethical hacking only, please.

  • @CaptBoykin

    @CaptBoykin

    3 жыл бұрын

    RCE would be required first. Netcat using -l is not a reverse shell. It is a bind shell.

  • @hyperdragon1013

    @hyperdragon1013

    3 жыл бұрын

    ok let me help you and people with the same question basically get in

  • @FirstLast-hm8oz

    @FirstLast-hm8oz

    3 жыл бұрын

    @@hyperdragon1013 I cannot get an answer. Something is hanging in an endless delay. How can send an answer ?

  • @FirstLast-hm8oz

    @FirstLast-hm8oz

    3 жыл бұрын

    @@CaptBoykin What is RCE ? There are abundant meanings for this. Were is the answer to my question hidden ?

  • @JdThe65th
    @JdThe65th3 жыл бұрын

    Yay, now I can troll tech support scammers!

  • @geekster3092
    @geekster30924 жыл бұрын

    but how did you get the server installed on the victims pc withou them knowing?

  • @fastexpand
    @fastexpand3 жыл бұрын

    The website you’re attacking won’t just set up ncat for you to attack like that though right? How do you make it work if you only have control of the attacking computer??

  • @adryelgainza1530

    @adryelgainza1530

    3 жыл бұрын

    im pretty new to this but i assume that this is done via an exploit. Im not sure. Its been two months so correct me if im wrong

  • @fastexpand

    @fastexpand

    3 жыл бұрын

    ​@@adryelgainza1530 Yeah I've since learned that you have to get access through an exploit before you can run the reverse shell

  • @sefiyt12

    @sefiyt12

    2 жыл бұрын

    @@fastexpand do you use metasploit?

  • @fastexpand

    @fastexpand

    2 жыл бұрын

    @@sefiyt12 I'm in the process of learning that one

  • @badvadass9964
    @badvadass99644 жыл бұрын

    Nice Haircut cuttie

  • @romandp4742
    @romandp47423 жыл бұрын

    how do i get the terminal command thing?

  • @Akira29H
    @Akira29H3 жыл бұрын

    can you demonstrate how to use from kali to windows?

  • @Cookiekeks
    @Cookiekeks2 жыл бұрын

    You are staring into my soul

  • @melting9419
    @melting94195 жыл бұрын

    nice haircut!

  • @lux-music6321
    @lux-music63212 жыл бұрын

    3:35 if I try to connect to the server I just get (Unknown) [*my ip] 8888 (?) : Connection refused I'm running it from 2 VM's on the same computer

  • @Shmancy_pants_69
    @Shmancy_pants_693 жыл бұрын

    Noob question, I lost the flow... were you hacking the linux computer with the macbook or hacking the mac book with Kali. I thought it was hacking the macbook with Kali but at the end with the files transfer I got lost.

  • @greob
    @greob5 жыл бұрын

    Oh, you removed the stickers?

  • @SuperAmir64
    @SuperAmir644 жыл бұрын

    Thank u

  • @mercilesspidermissesbaby_w4737
    @mercilesspidermissesbaby_w47374 жыл бұрын

    hey could you please give me the link to the download you used, im having a hard time trusting any links

  • @mihaiioc.3809

    @mihaiioc.3809

    3 жыл бұрын

    Don't send messages while riding a horse

Келесі