>>1582522>get onto her wifi network using aircrack +zenmap>route all entry node network traffic trough her routerfrom this point she'll experience slower internet
>calibrate it to be a TOR entry node and relayby also creating it as a relay, it will be a target for both Dutch police and the FBI.
>using the newly created entry node, open and use TOR without a VPN>visit various CP sites (if you need some, they're very to find if you don't fall for the honeypots)this will make the entry node show up on the feds' radar.
>on a different computer connected to your personal network, use se-toolkit to send a metasploit RAT to automatically execute when an email is opened (encrypted, ofc)>send it from a cock.li server disguised as Apple, Microsoft, or Google tech support (whatever she uses, you should be spying on her by now)this will give you her info, as well as remote shell access to her computer
>install TOR on her computer, routed through her router (the entry node)>go to more CP sites, but this time start downloading either the free CP samples, or tumble your BTC and buy small amounts>fill her hard drive>destroy any evidence of any computers ever existing in your house>report her to the FBI using her contact info after reporting her to local policesit back and enjoy, anon