Send us message
How do I trust a hacker?
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.
Do I pay Hacker Directly?
Never. Pay through the site and to the instructions of the site. If a hacker asks for payment directly, report to help@blackhat-unlock.com
We issue an invoice with a unique Job Number for every job. The invoice has job number, details, status, terms and payment instructions. Pay to the invoice only.
How can aviod fraud?
Strictly follow the payment process
Can I pay my credit card
We accept all major credit and debit cards. We accept PayPal for selected countries. We send payment invoice that includes the payment options applicable for your job.
Will my job be competed my hacker with 100% Guarantee?
See Payment process and note that the price is a guide only based on past 4 years’ data. The exact price is fixed between you and your hacker. The payment process varies depending on your country, regulatory laws. Generally you can pay by most cards and common wallets.
Do I pay before the work?
Pay after the work. Your hacker will submit deliverables to our review team who reviews/verifies the work and then we issue a job invoice. Pay to the invoice instructions. We release payment to your hacker only after your approval.
Can I dispute if something goes wrong?
Yes ,Mention your Job Ref# and detail your issues of dispute. We try to resolve disputes within 48 hours. We practice fair trading between both parties of a trade.
Can Minor a job?
You must be 18+ to post a job or engage with a hacker in our site.
Do you provide proof of work?
We used to allow proof but many users took the proof and ran away or were confused by proof. We do not supply sample data, name, contact, photo or screenshot as some users exploit those to target victims without paying the hacker. Note that we release payment to the hacker after your express approval.
Do the victim know about the hacker
No the victim must not know. If the victim knows or is alerted, then we invalidate the job and report both parties of the trade. This rarely happens but the hacker’s job is incomplete and invalid in case of breach.
