http://wq6xe2lh5aoc3kuvznaupy5byqhd4uffoekt3d34p2wkhkovwtnifkid.onion/phones.html
Hacking of Phones Hack Only With Phone Number Guaranteed remote access, we use a node that emulates calls from known numbers to guarantee that the victim receives the call and thus enter the device, once inside a remote access is installed that will give us the facility to make any request that you require, theft of files, monitoring of messages and calls or any other service.