Sunday, November 2, 2014

Chicken Taco Soup





Chicken Taco Soup

3 boneless chicken breast, cooked and diced
5.25 oz can black beans
5.50 oz can dark kidney beans

5.50 oz can great northern beans
5.50 oz can pinto beans
5.50 oz can chili beans
5.25 oz can fiesta corn
15 oz can tomato sauce
28 oz can Rotel tomatoes
1 pkg taco seasoning
2 1/2 C water
2 t chicken soup base
1/2 onion chopped
2 jalapenos, diced

Place cooked chicken and all other ingredients in crock pot. Cook on low for 5 to 7 hours.  Mine was ready after 5 but we were not ready to eat so mine was in the crock pot on low for 7 hours.

Notes:  I used left over chicken I had already cooked so this was super fast for me to throw everything in the crock pot.  You can also use rotisserie chicken for this soup. If desired garnish with tortilla chips, sour cream or shredded cheese.


2 comments:

  1. Crock pot food is awesome because it takes minimal management to cook! :) Thanks for sharing all these recipes. Looks delicious! Access Deep Web Deep Web stories Deep Web Reddit Tor Browsers

    ReplyDelete
  2. 🟢Hire the best and fastest HACKERS on the web today. We give you HACKING SERVICES better than any HACKING group you can find in the internet. Our HACKERS are available for 24/7, always ready to attend to you at any time of the day, anywhere in the world.

    🟢 There are no limits to what we can do. Don’t be surprised we say this. Hacking isn’t as difficult as it sounds, as so many HACKING equipments(softwares, virus, spyware, Trojan) are made available in the dark web and this has made HACKING very easy to perform. There are different varieties of Hacking Service we offer, such a as-:

    ▪️Phone📱📲 Hack, cloning & Tracking✔️
    ▪️Computer 💻 Hacking ✔️
    ▪️Emails 📧 & Social Media account ✔️Hacks/password recovery✔️
    ▪️Tracking/Finging People✔️
    ▪️Raising Money 💰 using (Bitcoin Mining, Money Flip e.t.c)✔️
    ▪️Tracking Scammers and Spammers.✔️
    ▪️Recovery of deleted files e.t.c✔️
    ▪️Scam Money Recovery✔️

    🟢If you need hacking services, PYTHONAX are the group you should contact. We have a strong policy that covers our Clients Privacy. We do not ask our Clients Targets and intention for any job given to us, we simply do our job and provide a strong security to Clients so that our services can’t be traced to them.

    🟠Payment for our services will only be collected after Customers have certified and confirmed the completion of their job. For no reason do we collect upfront for services. But note that Customers will have to pay for Hacking Equipments if necessary before a job would be done.

    🔴Beware of FRAUDSTERS claiming to be HACKERS and ripping people of their money, they saying things and share false testimonies to Attract people and Lure you to them. They are everywhere in the internet and could even be here in this site, be careful of them. We have come across so many of this FRAUDSTERS Victims and some have been lucky to get back what was falsely taken from them.

    Below are list of our emails you can contact if you need our services
    Email-:
    pythonaxhacks@gmail.com
    pythonaxservices@gmail.com

    PYTHONAX.
    2020 © All Right Reserved.


    ReplyDelete