Posts

Network Protocol Terminologies Part 1

Image
Network Protocol Terminologies Part 1 LAN: LAN stands for “Local Area Network” and refers to a network that is not publicly accessible by the internet. Examples of this are home or office network. WAN: WAN stands for “Wide Area Network” and generally refers to large dispersed networks and, more broadly, the internet. ISP: ISP stands for “Internet Service Provider” and refers to the company responsible for providing you access to the internet. NAT: Network Address Translation allows requests from outside your local network to be mapped to devices within your local network. Firewall: A firewall is a piece of hardware or software that enforces what type of network traffic is and is not allowed. This is generally done by establishing rules for which ports should be externally accessible.

HOW I HACKED INTO MY FRIEND’S CCTV CAMERA WITH JUST MOBILE?

Image
HOW I HACKED INTO MY FRIEND’S CCTV CAMERA WITH JUST MOBILE? Let’s Begin Note that all the CCTV cameras are operated and connected to the Wi-Fi network. so if I wanted to hack into CCTV camera system I must get into the Wi-Fi network. Now there are a lot of easy ways and articles with which you can find on how to hack Wi-Fi networks. So I will skip this step. After getting access to a Wi-Fi network the first thing I did is I typed the router address into the browsers URL.    192.168.1.1  If you are not sure about whats the IP address for the specific router you can simply look for a router, it’s brand and just simply Google it. Like if I want to know the IP address [Admin Panel address] of a TP-link router I will Google “TP Link admin panel IP address” that’s it and you will get it. ! Now moving towards all I have to do is to get into the router setting now most of the time people don’t change the default username and password for the router so you can alw...

30+ READYMADE PHISHING PAGES FOR HACKING, SPAMMING

Image
​​ 30+ READYMADE PHISHING PAGES FOR HACKING, SPAMMING Today I'm sharing a collection of phishing pages of different sites including PAYPAL, INSTA, FACEBOOK, GOOGLE, SPOTIFY, NETFLIX and many more.  DOWNLOAD PHISHING PAGES -   https://get.itscybertech.com/phishing-pages Most Of you already know how to use and setup phishing pages. But if you dont know how to setup it then read below guide. SETUP PHISHING PAGES Step 1 -Register a free webhost. I am using 000webhost . Click here to register free webhost.     000webhost Step 2 - After you clicking above link. It will display a Sign Up page , Fill it with your Email , Password Give some Website Name.  • Email - Your any Email. • Password - What you like  • Website Name - link name for your phishing site. Step 4 - After successful Registration, You MAY see the dialog box  Step 5- Now click Awaiting Email Confirmation and confirm your email address. (open your mail and click confirm) Step 7 - N...

20 Ways to Secure Data, Passwords, Financial & Personal Information on Internet

20 Ways to Secure Data, Passwords, Financial & Personal Information on Internet Always turn on data backup Update your device software regularly Always turn off your PC after use Always Protect your Password Delete files properly Always turn off Bluetooth and Wi-Fi when not in use Protect Your Device With Security Lock Reset Your Device Properly Before Selling Don’t share personal information on random calls, SMS, or emails Be careful while shopping online Don’t share your personal information publically on social media Take care of the privacy settings of your device Don’t add any random person to your friend list on social media sites Avoid using Public wifi for personal browsing and online banking. Always sign out from important sites Always use two-way authentication Don’t open random links on email and WhatsApp Turn on SMS or email service for bank transactions Always use antivirus for your device Don’t let everybody use your device

HOW HACK FACEBOOK ACCOUNTS USING KEYLOGGER

Image
  HOW HACK FACEBOOK ACCOUNTS USING KEYLOGGER  STEP 1: Create Server for Hacking Passwords First of all, for hacking any Facebook account password, we have to create our keylogger server that will run on the victim’s machine, capturing his keystrokes and emailing us the record. The keylogger server building process consists of several steps: 1. First of all download the Keylogger and a good binder. Binders are easily available via a Google search.  2. Extract the RAR file. Now you will get one folder and three files. 3. Open the Keylogger file. Here you will need a gmail ID and password. For safer use, create a fake Gmail account. 4. Click on server settings as shown. Here, enter the time at which you want to receive reports; it’s always preferable to use a 20 minute timer for receiving files. Click on the Output box to choose the location of the file and give it a name. We recommend using a system process name to make it undetectable, like svchost, or check an...

How Do I Protect My Computer From Bots?

Image
How Do I Protect My Computer From Bots? 🤖 ━━━━━━━━━━━━━  It’s very possible to protect your computer from bots, but it takes diligence and knowing what to look for. Use the following tips to keep your computer safe: Install firewalls to block malicious attacks and never turn them off. Use a long and complicated password that contains numbers and symbols. Never use the same password for multiple programs. Install quality anti-malware software such as Norton Security to protect your device. Ensure software is up to date, and never ignore system updates. Refrain from using flash drives, or thumb drives, in an infected computer. ━━━━━━━━━━━━━

​​4 Proven Ways To Find a Website's IP Address

Image
​​4 Proven Ways To Find a Website's IP Address   This tutorial teaches you how to find the IP address of a website. You can do this by using your computer's built-in "traceroute" function, or by downloading and using a free traceroute app for your iPhone or Android. #1 ON WINDOWS  • Open your PC and click on start menu. Search For "cmd" (Without quotes) • Right Click on cmd and click on "Run as administration" • Now enter a command -               ping website address -t    Ex. - ping google.com -t • Now hit enter. You will get it. =============================== # 2 ON MAC OS • Open Spotlight (Click the magnifying glass-shaped icon in the top-right corner of the screen.)  • Search for Network Utility and open it. After that Click on Traceroute tab in network utility. • Now Enter website address in input box and click on trace button You will see the IP address of website ================================ #3 ON ANDRO...

Get Verified PayPal , And Create Multiple Accounts (No Limit)

⚜ Get Verified PayPal , And Create Multiple Accounts (No Limit)  How to create a PayPal stealth Account Download a VPN. You need a VPN that is only for you, thus no NordVPN or shit. Use something like IPBurger to get a dedicated VPN (Or just google this) Use a Website like https://fake-it.ws/ to get a fake Address Get a new Phone Number. Either buy a Prepaid Sim in a shop for $10 or use any other service like TextMe. Get a Prepaid/Virtual Credit Card. I always used SecondEye for this, its $15 for a VCC, but its really worth it to make fake bank statements in case your PP gets limited/locked. Use another Browser than you use for your normal paypal. Alternatively create another User on your PC or use a VPS/RDP. If your account somehow gets locked because you where to stupid to follow this guide, use SecondEye to create a fake credit card statement or an bank statement. Can also create Fake IDs/Passports there, just print them out and make a Picture for Paypal. How avoid limiting Rea...

Oppo Reno5 5G series will come with a trio of chipsets from Qualcomm and MediaTek

Image
Oppo Reno5 5G series will come with a trio of chipsets from Qualcomm and MediaTek We've been seeing details about Oppo's upcoming Reno5 5G series for a while now. Oppo PEGM00/PEGT00 Now, well-known Chinese blogger Digital Chat Station confirmed we'll see versions of the Reno5 5G series with Qualcomm's Snapdragon 865 and 765G chips as well as Mediatek's Dimensity 1000. Digital Chat Station post We already know the Reno5 5G series will pack 65W fast charging.  ━━━━━━━━━━━━━ ⌨️

8 HACKING APPS TO CONVERT YOUR ANDROID INTO HACKER’S LAB

Image
8 HACKING APPS TO CONVERT YOUR ANDROID INTO HACKER’S LAB 1:- Fасеnіff Allows уоu to sniff аnd intercept wеb session рrоfіlеѕ over the WiFi thаt уоur mobile іѕ connected tо. It is possible to hіjасk sessions оnlу whеn WiFi іѕ nоt using EAP, but it should wоrk over any рrіvаtе networks. 2:-Nmар​: Nmap (Network Mарреr) is a ѕесurіtу scanner originally wrіttеn bу Gоrdоn Lуоn uѕеd to dіѕсоvеr hosts аnd ѕеrvісеѕ on a computer nеtwоrk, thuѕ сrеаtіng a “map” оf the nеtwоrk. Tо accomplish its gоаl, Nmар ѕеndѕ specially сrаftеd packets tо the tаrgеt hоѕt and thеn аnаlуѕеѕ thе rеѕроnѕеѕ. (Donwload for Android from below link) 3:-SSHDrоіd​: SSHDroid іѕ a SSH server іmрlеmеntаtіоn fоr Android. This аррlісаtіоn wіll let уоu connect tо уоur dеvісе frоm a PC аnd execute commands (like “tеrmіnаl” and “аdb ѕhеll”) оr edit files (through SFTP, WіnSCP, Cуbеrduсk, etc). 4:-Wifi Analyzer Turns уоur android phone іntо a Wi-Fi аnаlуѕеr. Shоwѕ thе Wi-Fi сhаnnеlѕ аrоund you. Hеlрѕ you tо fіnd a lеѕѕ...

A way Of Black Hat - Hacking Book

Image
Learn about blackhat, social engineering. Get software commonly used by hackers and learn about what their purpose/utility Link:- http://get.itscybertech.com/blackhat-book  Private Paid  Book For free 

Types Of Digital Footprints

 Types Of Digital Footprints   ━━━━━━━━━━━━━ Digital footprints can be classified into two broad categories — active and passive footprints — which depends on how your information is acquired.  Active Digital Footprints  ━━━━━━━━━━━━━ Active digital footprints consist of the data you leave when you make deliberate choices on the internet. For instance, posts you make to your social media channels are a form of active footprint. When you are logged into a project management or similar site, changes you make that are connected to your login name are also part of your active footprint. Here are a few examples of active digital footprints. Posting on Facebook, Instagram, Snapchat, Twitter, and other social media platforms. Filling out online forms, such as when signing up to receive emails or texts. Agreeing to install cookies on your devices when prompted by the browser. Passive Digital Footprints  ━━━━━━━━━━━━━ Passive digital footprints are those you leave behind...

​​LifeHack : How to Delete WhatsApp Messages After Sending (Even After 68 Minutes Have Passed)

Image
If you got too emotional and wrote some stuff you shouldn’t have written, or made an unforgivably stupid spelling mistake in a word, don’t be sad! You can delete messages on WhatsApp regardless of whether they have been read or not. After you sent a message, you have 68 minutes to delete it. When this time passes, there will be no turning back but its we can bypass this limit and can delete message from everyone any time Lifehack: how to delete a message after 68 minutes have passed Classically, you only have 68 minutes to delete a message for both sides. But you can trick this rule and delete even older messages if you carefully read our articles. You can find a lot of useful tips for them. To do this, open Settings on your gadget and turn airplane mode on. If you are an iOS user, choose Date & Time in General settings. Android users have this option in the main settings menu. Turn off the automatic time detection, and then manually change the date and time to the peri...

How To Get Free Stream Keys

How To Get Free Steam Keys   Download :- http://www.mediafire.com/file/d2xvjcia1zy6ljw/SteamKeys.rar  Step 1: Start Up SteamKeyGen.exe And Put In How Many Keys You Would Like To Generate. The Keys Will Be Saved To Your Desktop As A .txt File. Step 2: Load Up SteamBulkActivator.exe And Paste In Your Keys That You Have Just Generated. Click The Register Keys Button And The Keys Will Be Scanned. Once The Keys Have Been Scanned, It Will Show You The Valid Keys! Step 3: Go To Steam And Activate Your Keys! Use A VPN As You Will Get An Error Every 20 Keys Saying "Too Many Activation Attempts, Please Try Again Later.If You Use A VPN, This Error Will Not Occur

Few tips to staying safe online and preventing identify theft

Image
Few tips to staying safe online and preventing identify theft ▪️Share documents while at home ▪️Stay clear of sending sensitive data across public Wi-Fi networks ▪️Use double verification systems ▪️Do not share your passwords or leave them lying around ▪️Keep an eye on your credit score ▪️Watch out for phishing websites and fake campaigns ▪️Use an antivirus program on desktop and mobile ▪️Shop only at reputable websites ▪️Keep data divulging on social networks to a minimum ▪️Only download software from reputable sources ▪️Be wary of social media-spread fake contests and links

Image Payload Creating and Injecting Tools

Image
Image Payload Creating and Injecting Tools  Features: • Bypassing CSP using polyglot JPEGs • Encoding Web Shells in PNG IDAT chunks  • Hidden malvertising attacks (with Polyglot images) • XSS payload revisiting (in PNG and IDAT chunks) • XSS Facebook upload (Wonky and PNG content) Tools: bmp.pl, gif.pl, jpg.pl, png.pl Requirements: GDString::CRC32Image::ExifTool Install Clone the repo: $ git clone https://github.com/chinarulezzz/pixload.git Note: Debian users need to install the following packages: $ sudo apt install libgd-perl libimage-exiftool-perl libstring-crc32-perl Pixload Usage Examples BMP Payload Creator/Injector Usebmp.pl to create BMP Polyglot image with custom/default payload, or inject payload into existing image: $ ./bmp.pl [-payload 'STRING'] -output payload.bmp  If the output file exists, then the payload will be injected into the existing file. Else the new one will be created.  GIF Payload Creator/Injector $ ./gi...

How to get access to people's snapchat memories and download them efficiently

Image
How to get access to people's snapchat memories and download them efficiently  This tutorial is not very difficult and probably nothing new, but I haven't seen anything of this methond on this forum yet and some people created threads asking about Snapchat hacking related stuff. Maybe for some of you this is no big deal, but I think not everyone knows that this is possible. This tutorial should also show an efficient way of this method. Keep in mind that this method is for getting the data of random people, not a specific victim. First of all, Snapchat provides the opportunity to log into your account via browser on  https://accounts.snapchat.com/accounts/login Once you are logged in you can go to "My Data" and Snapchat creates a ZIP file for you which contains various information about your Snapchat account. The ZIP file also contains a link with which you can download the memories of that Snapchat account via browse What is even the use of getting the me...

HOW TO EASILY BACKUP YOUR RDP TO PREVENT/MINIMIZE DATA LOSS

HOW TO EASILY BACKUP YOUR RDP TO PREVENT/MINIMIZE DATA LOSS  All RDPs can fail either because of the user's error or the RDP going unstable. There are certain ways by which you can avoid any loss of data or minimize the losses. Method Prerequisite : A Google account with ample space , Data to backup 1. Download and install Backup and Sync - A free Google Tool https://www.google.com/intl/en-GB_ALL/drive/download/backup-and-sync/ 2. Login into your Google Account (if using an EDU Account, please use the login using browser method. 3. Choose the Folders you wish to back up and save   4. Disable the syncing of Drive on the RDP 5. Click on start and the selected folders will start getting backed up. Note: It's advisable to close the backing up while you are using a checker as it can hinder with the checker. One can run the backup and sync every few hours and thereby, minimize the losses.

HOW TO MAKE SHORT COMBOS EASY AND QUICK for cracking

Image
HOW TO MAKE SHORT COMBOS EASY AND QUICK for cracking   (Because many people having issue in using sql)  (By this method you can crack easily HotStar Ganna saavn etc... Account )  1. Visit  Link- https://keywordtool.io 2. Search keywords related to your combo.. {Like you have to crack HotStar then search HotStar there}  3. Now copy all keywards... 4. Now open slayer leecher 0.6 version will drop that below this tutorial 5. Now paste all keywards in the keywards option  6. Now after pasting all keywords in the place of keywords now click start button. 7. Now wait for sufficient resultants... Around 5-10k  8. Now filter them 9. click on Grab now!  10. now click on pass to leecher... 11. Now put proxy that you have Like http or socks  If you don't have scraped one download proxies from  Link- https://proxyscrape.com/free-proxy-list 12. Then click start button! You will start getting combos there... After getting combos save...

How To Make Combos

How To Make Combos   Steps 1 - Download Good dorks 2- Download Sqli Dumper v8.3 3- Download Good proxies 4- Open SQLI Dumper and go to the proxies tab and put your own proxies in it [ Tools and settings ====> Proxies ]4 5- return back to the Url Tab and Put your own dorks in the blank white paper 6- click on start scanner and make sure to make the 1 value into 10 for better scanning 7- let it some time until you collect maybe 10,000 urls 8- stop scanner and go to exploitables and Click on start exploiting 9 - it will search for some website that are injected with the exploit 10 - after you collect maybe 20 Website 11- go to Injectables and click on the same button 12- It will scan for the websites which have databases [ combos ] 13- once you collect maybe 5 website start dumping  14- Congratulations your combos is Ready

HACKING ANDROID COURSES

Image
  HACKING ANDROID COURSES  Part 1: Penetration Testing  https://mega.nz/folder/CY0zUACT#OVODsvO2PkC5Biv43i__NQ Part 2: Setup Your Lab    https://mega.nz/folder/TM1jyABL#40eUd_dpLEchdUAxbXPEiQ Part 3: Finding Your way around Kali  https://mega.nz/folder/fVl3hI7J#tKsrQ4rjzd97b7sah6gwYw Part 4: IMPORTANT TOOL     https://mega.nz/folder/fB9T0CAD#6jdad6-5XW-fSFhuhYO7Uw Part 5: Exploitations    https://mega.nz/folder/fElDXIwA#y6qSr6jMk5dTkXUaDeEe_w Part 6: Hacking Android Devices  https://mega.nz/folder/HJ8BwQrI#JiQhByO7NvsuU_nRslRhZw Part 7: Social Engeneering    https://mega.nz/folder/vUshmAgD#lJpAwyKwLss9ogVZzrnFvw Part 8: Hacking Using Android Devices     https://mega.nz/folder/aVsFzQ4S#MYrQ9rc3pjDjq2pjVHCtoA

Ethical Hacking for Mobile Phones, Facebook Social Media

Ethical Hacking for Mobile Phones, Facebook Social Media 1. What Is Ethical Hacking And Penetration Testing, And How Can You Use It 2. Introduction From Your Co-Instructor Snehil Khare about Ethical Hacking 3. Environment setup lecture 4. Stealing facebook credentials via phishing  5. How to defend against phishing attacks 6. User Browser hacking using Beef exploitation framework 7. How to defend against browser attacks 8. User machine hacking via word and excel documents 9. Hacking android phones for fun and profit  10. Backdooring android apps for Profit 11. How to defend against android attacks 12. Chaining multiple commands together 13. Download and build the target 14. Hacking with Kali Linux your target system Link https://drive.google.com/file/d/1e8IhYxkmpTGE32vutY2EHK4BzqY60r-B/view

Dedsec All Courses Free Download

Dedsec All Courses BlackHat Hacking Course By DedSec Antivirus Evasion Course By DedSec Complete Course Of Android Hacking By DedSec Complete Course Of Kali Linux By DedSec Complete Course Of WiFi Hacking By DedSec ERC Course By DedSec Facebook And Instagram Hacking Course By DedSec Online Account cracking Course By DedSec Reverse Engineering Course By DedSec Dedsec Latest Fud Ransomware Spamming Course  DOWNLOAD LINK:-  https://drive.google.com/drive/u/0/mobile/folders/1k_GdJtXMC-xyG-Rk-H0qEnqxZwX1R1p3

​​Kali Linux - Complete Training Program from Scratch

​​Kali Linux - Complete Training Program from Scratch   [ Grand Of 2020  ] WHICH COST $2000k But now [100% Free.] Link : https://bit.ly/3dWUGby Follow the website instructions to download course.

The Complete Dark & Deep web Basic To Advance Course.

Image
The Complete Dark & Deep web Basic To Advance Course. [ Trending of 2020 ] WHICH COST $28000k But now [100% Free Of Cost.] DOWNLOAD LINK  : https://bit.ly/3bPnnVV Bee care full very powerful content. Very useful courese for hacking to go next level Noob to Pro.  Also you get advance course of how to enter darkweb safely just using ur Android or ISO devices. Follow the website instructions to download course.

The Complete Android Ethical Hacking Practical Course C | AEHP

Image
 The Complete Android Ethical Hacking Practical Course C | AEHP Download and enrol for free! https://gluv.in/OP/bnykdlsnpuf

3 GB Cyber Security Ebooks , Collected from google

Image
  3 GB Cyber Security Ebooks , Collected from google  Download : https://mega.nz/folder/h6RFQCZb#L3K86i4-qbrpsQ5Wg4rAZw Library content 🧾 ├───Group 0 [ Miscellaneous ] │      01 The Tagled Web A Guide to Securing Modern Web Applications.pdf │      02 [Michal_Zalewski]_Silence on the Wire A Field Guide to Passive Reconnaissance and Indirect Attacks.pdf │      03 Metasploit-The Penetration Tester s Guide.pdf │      04 the car hackers handbook.pdf │      05 practical forensic imaging.pdf │      06 [Nikolay_Elenkov]_Android_Security_Internals-_An_I(b-ok.cc).pdf │      07 gray hat c sharp.pdf │      08 Practical_Malware_Analysis.pdf │      09 iOS Application Security_ The Definitive Gude for Hackers and Developers - David Thiel.pdf │      10 Black Hat Python Python Programming for Hackers and Pentesters.pdf │   ...

The Complete Angular 9 Course for Beginners (Step by Step)[Expire In Two Days]

Image
The Complete Angular 9 Course for Beginners (Step by Step) [Expire In Two Days] https://gluv.in/OP/bn8kdlaqc62

Passive income for programmers (expires in one day)

Image
Passive income for programmers [Expire In One Day] https://gluv.in/OP/bn2kdlaqbza

SEO Domination Training Masterclass Course [Expire In Two Days]

Image
SEO Domination Training Masterclass Course  [Expire In Two Days] Download https://gluv.in/OP/bn2kdl5lrc5