Posts

How To Send Fake Messages To Anyone

Image
Today we will learn how to send fake messages to anyone else. Requirements:- backtrack 5 ==>> you will also use kali Linux and any hacking operating system. Internet your brain to learn (most important) Step 1 Step-1 > Fire Up BackTrack & Start Social Engineering Toolkit (SET) Let’s begin by firing up Backtrack 5 and then navigating to Applications -> Exploitation Tools -> Social Engineering Tools -> Social Engineering Toolkit (SET), then select “set” as I have done in the screenshot below. This will start the SET opening screen as seen below. SET is capable of numerous social engineering attacks. previously used SET to spear phish in BackTrack, but the one we want this time is “SMS Spoofing Attack Vector.” To begin this attack, Select  #7 . In the following screen, we are asked whether we want “Perform an SMS Spoofing Attack” or “Create a Social Engineering Template.” Select  #1 . Once you have made that selection, you will be queried wheth

How to Make Calculator In C Language

How to make calculatoR in C Lanuguage #include<stdio.h> #include<conio.h> main() { float num1; float num2; char opt; float result;  clrscr(); printf("enter the first number:"); scanf("%f",&num1); printf("enter the operation:"); scanf(" %c",&opt); printf("enter the second number:"); scanf("%f",&num2); switch(opt) { case'-': result =num1-num2; printf("%f",result); break;  case'+': result =num1+num2; printf("%f",result); break;  case'*': result =num1*num2; printf("%f",result); break;  case'/': result =num1/num2; printf("%f",result); break; default : printf("the operator is not valid");  } getch(); } #HS_Creations #Kepp_Visiting

These are the Top 5 Publicly Available Hacking Tools Mostly used By Hackers

Image
These are the Top 5 Publicly Available Hacking Tools Mostly used By Hackers Cyber Criminals are using various malicious tools for cyberattacks based on the target’s strength to infiltrate the sensitive data and more often nowadays Publicly Available Hacking Tools are mainly used by threat actors for various attacks around the world. Today in the cyberworlds hacking tools are openly available with various functionalities and freely available that can be accessed by anyone from cybercriminals and get it from various hacking forums and dark web marketplace. Also, these tools have been used to compromise information across a wide range of critical sectors, including health, finance, government defense, and many other sectors. Day by day threat actors learning new tactics and techniques to find new ways and developing new sophisticated tools to maintain their persistence and evade the security systems. Here we can see the most used top 5 publicly available hacking tools by threat act

Share Market Kya Hai Aur iss Se Paise Kaise Kamaye.

Image
Doston Apna paisa sahi jagah invest karna kon nahi chahta sab yahi sochte hain kr Lakho rupay mahina kamane ke liye paise kaha invest kare lekin un ko invest karne ka kuch khaas pata Nai Hota Agar aap bhi apna paisa invest karne ke liye koi platform dhund rahe hai to aapko share market ke bare me zarur janna chahiye.  Share marketing se aap ghar baithe lakho rupees kama sakte hen.Magar iske liye aapko share market ki puri maloomat honi chahiye. Aapko iska jitna experience hoga aap utni hi jyada kamai kar sakoge. Ager Aap ko iss ke baare men khaas Nai pata to koi baat nai Aaj ka ye Artical issi ke hi baare men hai. Ek Baat Or Batata Chalo Aap Ko ke jis tarah log internet se lakho rupay mahina kamate hain usi tarah log ghar baithe share market me paise invest kar ke bhi lakho rupay kama sakte hain.  Magar internet se paise kamane me nuksan ka koi dar nahi hai  jab ke stock marketing me dar hota hai. Share market me paise invest karne ke liye sahi waqt ka intzar karna part

How to hack Facebook account using termux (password guessing method)

Hi Guys!  So today I will tell you how to hack Facebook account. This is very simple attack. If you read my previous article then you can easily perform on this attack. This is bruteforce attack. Requirements  :- 1. ANDROID DEVICE (version upto 5.0) 2. Termux Application (Available on playstore) H ow to hack  :- 1. Open termux app 2. enter the following commands ☆ apt update && apt upgrade ☆ pkg install git ☆ pkg install python ☆ apt install python2 ☆ pkg install pip ☆ pip2 install mechanize ☆ git clone https://github.com/hnov7/mbf ♡ if u want to use this tool in English then use this link https://github.com/und3f1n3/budiman/blob/master/englishtutorial.md ☆ cd mbf ☆ ls ☆ python2 mbf.py 3. Now enter 1    ☆ enter your email     ☆ enter your pass in next line      ☆wait for login 4.  Enter y 5. in next line you have to enter any pass (minimum 6 digit). If you read my previous article so you can easily enter any 6 digit. That can be a victim

Whatsapp message bombing app

Image
Today we will learn how can perform message bombing in android without turmax and other terminal services. In message bombing we send bulk messages to whatsapp chat and if the victim's smartphone have low ram and cpu the it will crash victim's whatsapp and slow down the smartphone speed. Using this trick you can irritate the whatsapp user and able to crash his whatsapp app. How to perform message bombing Follow the steps 1 - Download the whatsapp looper app 2 - Install and open the app 3 - Give the accessibility permission 4 -  Now open app and write message and send to a whatsapp contact. Download -  ---+++Download App+++----

How to track a person | Find location | Get details

Image
If you want to track a person then you are in the right place here you will learn how to track a person any unknown person, scammers, fake peoples. We are using IP tracking technology for finding the location of any scammer and fake person. In the present time, there are many types of scammers on the internet and they will scam you anytime, so for your security, we will teach you how to track a person using a simple link. How IP tracking links work We recently played with a fake job recruiter scam.  We knew from the beginning that this was a scam, but we wanted to confirm the location of the scammer.  They said they were in the United States, but were they?  We check it by tracking your IP with a link . There is nothing special about this: when someone accesses an online resource, the server sees their unique IP address.  And IP addresses are linked to approximate geographic areas. But the most popular web services do not usually show that person's IP address,