• image01

    Creative

  • image02

    Friendly

    Motivated

  • image03

    Tranquilent

    Tips

  • image04

    Tech

    Secured

  • image05

    Update

    News

Wednesday, 27 February 2019

BabyShark Malware Delivered through Malicious Excel Macro Documents


Threat actors distributing Visual Basic based BabyShark malware that delivered through spear phishing emails. The emails sent from a public email address disguised to be from nuclear security expert in the U.S.

Palo Alto Networks Unit 42 researchers first identified the campaign in November 2018 and it is having connections with past North Korean activities such as KimJongRAT and STOLEN PENCIL.


Monday, 25 February 2019

Google Announces New Web Domain for Developers



Google has made its .dev top level domain (TLD) available as part of its Early Access Program. The domain is dedicated to developers, and is aimed at allowing them to build communities, teach newer technologies, and showcase projects, amongst other potential applications.

"Till February 28, .dev domains are available to register as part of our Early Access Programme, where you can secure your desired domains for an additional fee. Beginning on February 28, .dev domains will be available at a base annual price through your registrar of choice," Ben Fried Vice President, Chief Information Officer (CIO) and Chief Domains Enthusiast, Google, wrote in a blog post on Monday.

Xiaomi's New Note 7 Pro will be Launched Next week In China



Redmi President, Lu Weibing, has announced that the much talked-about Redmi Note 7 Pro will be launched next week in China. The exact date is still under wraps, but is expected to be revealed in the days ahead.

The Note 7 Pro is expected to be a more powerful version of the Note 7, sporting a faster processor and better cameras. The device has been confirmed to ship with the Snapdragon 675 SoC and the 48MP Sony IMX586 camera sensor instead of the Snapdragon 660 and the Samsung ISOCELL Bright GM1 chip found on the standard Redmi Note 7

How To View Saved Wifi Passwords In Android Using File Managers


✅First of all, you need a file explorer that gives you the read access to the root folder. If your default File manager doesn’t give you the read access to the root folder, then you can install Root Explorer or Super Manager which will grant superuser permission to you to access the system folder

▪Go to data/misc/wifi folder, and you will find a file named wpa_supplicant.conf.

▪Open the file and make sure to open the file in built-in text/HTMLviewer for the task. Now in this file, you will be able to see the network SSID and their passwords next to it.

▪Now note down the network name and its password. In this way, you will be able to view all saved WiFi password on the Android device.

  ❗️Note: Please do not edit anything in wpa_supplicant.conf as it can alter your device working or it will have the effect on your WiFi connectivity.

☑ ES File Explorer:

▪Download and Install ES File Explorer App on your Android device and open the app.

▪Now you need to enable the “Root Explorer” option in ES File Explorer.

▪Now you need to move to the Root folder in ES File Explorer, and you need to find a directory called “Data.”

▪under the “Data” you need to locate the folder “Misc”

▪Now under the WiFi folder, you need to locate the file with name wpa_supplicant.conf. Simply open the file with ES File Explorer’s built-in text/HTML viewer.

▪Now you can see all your SSID (network name) along with PSK (Password) next to it and close the file.

✅ That’s it! You are done, this is how you can find saved WiFi password using ES file explorer.

How To Select All Unread Mails As Read In Gmail


▪First of all, you need to Log into your Gmail Account.

2▪Now in search box Type “unread”

▪Now to select all the unread emails as read you have to select “All”

▪And then after you have selected that “All” now move to the next Phase as “Select all conversations that match this search”

▪Now you need to select the option of “More” and from the drop down you have to select the option of “Mark As Read”

▪Now if you have numerous unread emails, Then a pop-up will appear which will ask you to “Confirm Bulk Action” simply tap on ok.

✅ That’s it you are done! You just have to wait for few seconds. Now you will see all your unread emails are marked as read.

How To Backup Your Text Messages To Gmail From Android



You can also use this method to restore text messages if you accidentally deleted them.

▪Login to your Gmail account from PC which is connected to your android device

▪After you logged in, you need to open “settings“

▪Then you need to Enable IMAP service in your google account that you can do by visiting.

▪ Now in your android device, download and install the app SMS backup+.  Launch the app and you will see the screen like below. Click on Connect option there and you will see your account just tap on it.

▪Grant the permission to the app to access google details.

▪Now click on backup on the popup appears and backup process will get started.

▪ Now you need to open your Gmail Account, you can see new Label “SMS” added on the Gmail menu. You can see all your SMS there.

Friday, 22 February 2019

How to Completely Reset Network Settings on Windows 10



 Steps

◾ First of all, we must tell you that the network settings for the Windows would all get removed and the total network preferences would change to default. Any kind of changes and amendments that you made to the network for the Windows shall go away as soon after processing this method. Each of the network drivers would also get removed and you would be all left with the clean and the all clear network processing on your windows.

◾To begin up with the method to reset the Windows 10 network settings, first of all, click on the Start button placed in the bottom corner. On clicking this button you would see the options and from there you need to click on the Cog button or generally known as the settings gear icon. This would launch up the settings panel on your screen from where you would be able to make multiple changes regarding every aspect of the PC.

◾As we are only considered about the network settings so we would be clicking on the Network and Internet option or the tab from the Settings panel/page. This would return you to the all available settings for the network of the Windows and you will get to see a number of options on the page. On the same page of this method, you need to click on the Status option that would be placed on the left side of the panel.

◾ After processing all of the above steps you would reach to the page where you will see the option named Network Reset, Just click on this option to reset all the network related settings and the drivers on your Windows 10. Make sure that all other processes are closed on your device because this process may demand you to restart your computer. Just utilize this great function on your computer and hence get the benefit of the network reset so as to resolve any kind of issues related to the network on your device.

 That’s it, you are done! Just restart your computer to make the changes

How To Track All Your Google Contacts On Google Map



 This tracking is very easy and depends on a cool google chrome extension that will let you to see all the locations of your google contacts on your google maps. You can check out multiple user’s location at once using this. So read out the complete steps below to proceed.

✅Steps To Track All Your Google Contacts On Google Map :

.First of all you need to have latest version of Google Chrome Browser in your computer.

.After installing the latest version of Google Chrome launch it in your PC and the open the extension Map My Contacts.

.click on Add to chrome there and then click on ok in the popup appears and the extension will get added to your chrome.

.click on Visit Website and this extension will require authorization as it tracks out the actual location give it the authorization needed.

 Now you will see all your contacts listed on Google maps according their postal address saved in their google accounts.

Thats is you are done , all your contact will be in front of you maped on the Google maps.

Thursday, 21 February 2019

How to use Edit Cookies Chrome Extensions in Android Mobile



If you want to run cookies of Netflix, amazon prime, ahref etc paid premiums account in your android mobile Here is a way for you.

Many people do not know this that why I posting this simple way to do That

Follow below steps

1. Go to play store. Download the Yandex Browser.

2. Yandex browser is the same browser like chrome in android but chrome don't allow you to add extensions.This browser allowed you to add any google extensions.

3. Now Go to this Edit cookies extensions through index browser and add it to your Yandex browser.

Edit this cookie-- https://chrome.google.com/webstore/detail/editthiscookie/fngmhnnpilhplaeedifhccceomclgfbg?hl=en

5. After adding this you can go to setting option whatever is that three dot. Find Extension then click on that.

6. You find edit cookies in that click on that it

7. Now you can import cokies of Netflix or other premiums account in it. After importing refresh the page you are login .

How to Make your Own Google Chrome Theme



 This trick is based on a cool google chrome extension that will let you customize your google chrome according to your wish. So just follow up some simple steps below to proceed.

 Steps To Customize Google Chrome With Your Own Theme

 First of all download and install My Chrome Theme extension in your google chrome.

Now it will be added as an app in your Google chrome it will hardly take few seconds to install(depends on your internet speed).

 Once installed, Firstly you will upload your image that you want to set as background.

On the next step, you will be setting the position, image effects of your selected background image

 Now proceed to next step and you will be setting the colours of new tab, current tab etc.

Now proceed to next step and at last step click on yes on the pop up appears. At very last you will be given the option of “Install my theme”.

 That’s it! your theme is ready and gets installed on your googlechrome

Hackers have put 620 million account details for sale on the Dark Web🔰


Just a week after hackers were found distributing 2.2 billion records on the internet another major data leak has been detected. In this latest breach, 617 million account details were stolen from 16 different websites and are now on sale on the dark web.

It was only last month that a major data dump called Collection #1 was spotted with more than a billion unique login credentials. Later, Collections #2 to #5 were reported a few weeks later with information on 2.2 billion records. A new revelation by The Register, suggests that 617 million account details will go on sale on the dark web from shortly.

List of sites that were hacked

- Dubsmash: 162 million

- MyFitnessPal: 151 million

- MyHeritage: 92 million

- ShareThis: 41 million

- HauteLook: 28 million

- Animoto: 25 million

- EyeEm: 22 million

- 8fit: 20 million

- Whitepages: 18 million

- Fotolog: 16 million

- 500px: 15 million

- Armor Games: 11 million

- BookMate: 8 million

- CoffeeMeetsBagel: 6 million

- Artsy: 1 million

- DataCamp: 700,000

I know that most of you not using this above app if anyone using than I recommended your changed your password

Crack Any WIFI Without Brute- Forcing And Anonymously


Requirenments:
Kali Linux
Fluxion ( Tool)
 Patience
Ok so how does fluxion work?

Fluxion is gonna to do 2 attack :
1. Deauthentication alias Deauth
2. Fake AP
Deauthentication- The attack will send hundreds or
thousands of deauthentications packets to a target to kick
him/her out of the WIFI you can even kick all the users on
it.
Fake AP- AP stands for Access Point when you connect to
a WIFI you connect to the AP of the router so like the
login page of it so fluxion will clone the WIFI by his
handshake and create an Fake AP so users will connect to it
thinking its the real WIFI alias AP but nah its not the
password will be sent back to us i mean you.
How will the attack go?

Fluxion will start capturing the handshake of the WIFI
like the MAC address(MAC addresses looks like this
“2D:K4:C4:5T”) after that he capture it he knows how
the AP looks like etc so he will clone it.
After that he will kick everyone of the WIFI by a
Deauthentication on everyone, then they will connect back
to the AP thinking they are connection back to the WIFI
big mistake the password they type will be
sent back to you, thats all.
Fluxion is a smart tool.
Lets install Fluxion!
1. step: Open your terminal and type this cd Desktop it
should says this “root@examplename:~/Desktop#”
.Then type git clone https://github.com/FluxionNetwork/
fluxion
. cd fluxion or go to file location and it's name
Type “root@examplename:~/Desktop/fluxion#”.
.chmod +x
ls
fluxion.sh

There now lets get this attack done!
So launch it by doing fluxion

1. Select your channel, channel means WIFI.
2. Select the WIFI you wanna to crack.
3. Select “ FakeAP – Hostapd ( Recommended)” its the
best for crack.
4. Select your handshake you wanna to use (Recommended)
to select “ pyrit“.
5. Select your capture handshake select “ Deauth all “.
6. Now you need to wait until he capture the handshake so
when its done it should have “ WPA handshake: ”
somewhere and after “ handshake:” it would have a
MAC address like this
68:C4:4D:85:AC:B8
7. After that select “ Check handshake“.
8. After this select “ Create a SSL certificate ”
9. Then select “ Web Interface“
10. Select the language the page will be in.
11. Then wait until she/he login and type the password
after that  You have successfully hacked WiFi

HOW TO DOWNLOAD YOUTUBE VIDEOS



You can download any YouTube video just by typing "ss" before the "youtube" part of a video's URL link in your address bar.

Original - www.youtube.com/watch?v=fRh_vg2dF
Add as to the link as shown below⬇

Download - www.ssyoutube.com/watch?v=fRh_vgSdF

Not only can you choose from different file types but also any resolution up to the original quality. Just remember downloading copyrighted content from the internet is illegal.

Wednesday, 20 February 2019

How to use RapidScan On UserLand

Rapidscan
install the many hacking tools used by RapidScan with the below apt-get command. It's worth noting that all of the below tools aren't required to run RapidScan. When running RapidScan, if a particular tool isn't found to be installed, it will intuitively move on to another tool.

$ apt-get install python screen wapiti whatweb nmap golismero host wget uniscan wafw00f dirb davtest theharvester xsser dnsrecon fierce dnswalk whois sslyze lbd golismero dnsenum dmitry davtest nikto dnsmap


The following additional packages will be installed:
  docutils-common docutils-doc gir1.2-glib-2.0 libgirepository-1.0-1 libnet-netmask-perl libpaper-utils libpaper1
  libpython-all-dev libstring-random-perl libxml-writer-perl nmap-common python-all python-all-dev python-bson python-dbus
  python-docutils python-entrypoints python-gi python-gridfs python-keyring python-keyrings.alt python-pip python-pip-whl
The following packages will be upgraded:
  nmap nmap-common python-pkg-resources wget


So type simply "Y" and enter.
This installation process can take up to an hour depending on network speed and the Android's CPU. Be sure to keep the Android charged while packages are downloading and installing. While this is happening, let's have a look at which tools are being installed.


Clone the RapidScan Repository
Now that we have a good idea of which tools RapidScan employs, let's clone the repository and start scanning websites.

$ git clone https://github.com/skavngr/rapidscan

Then, change (cd) into the newly created rapidscan/ directory.

$ cd rapidscan

And give it permission to execute in Kali.

$ chmod +x rapidscan.py



Start Screen (Optional)
When using Android and UserLAnd for long, time-consuming scans, the SSH connection might unexpectedly break. SSH breakages may cause in-progress scans to terminate and fail — usually without saving the accumulated scan results. RapidScan could also continue to run in the background with no way of reconnecting to the session to view the progress.

Screen will allow terminal sessions to persist if the SSH connection suddenly disconnects. To start a new Screen session, simply type screen into the terminal.

$ screen

Start RapidScan

                                         
                             
                     (The Multi-Tool Web Vulnerability Scanner)

Useful command:

        ./rapidscan.py example.com: Scans the domain example.com
        ./rapidscan.py --update   : Updates the scanner to the latest version.
        ./rapidscan.py --help 

Tuesday, 19 February 2019

Explanation of All Vulnerability Scanner Terms



WhatWeb:
WhatWeb is designed to identify website technologies and software version information. It includes over 1,750 plugins capable of recognizing blogger platforms, JavaScript libraries, web server fingerprints, and content management systems (CMS), to name a few.

DNSRecon:
Domain name resolutions involve converting domain names (like wonderhowto.com) into an IP address that servers and computers can interpret. DNSRecon is a comprehensive domain name service (DNS) enumeration and reconnaissance tool. It's able to carry out the following advanced tasks, to give you an idea of its power.

NS records for zone transfers:
checks Enumerate MX, SOA, NS, A, AAAA, and TXT records
Perform common SRV record enumeration
Check for wildcard resolution
Brute-force subdomains with a supplied wordlist
Identify cached DNS records for A, AAAA and CNAME Records

Nmap:
Nmap is a port scanner and network exploration tool. It's a full-featured tool adept at finding shared servers,

detecting CVEs, and performing a variety of advanced scanning techniques. As I mentioned previously, some of Nmap's features are not currently supported by UserLAnd. If you experience problems, be sure to open a new GitHub issue for assistance from the developers with this.

WAFW00F:
A web application firewall (WAF) detects and blocks malicious traffic transmitting to and from the web server its protecting. WAFW00F is able to fingerprint and identify web application firewall technologies by sending the website an HTTP request and analyses the response. It can currently identify over 45 popular web application firewall solutions such as CloudFlare, Sucuri, ModSecurity, and Incapsula.

GoLismero:
GoLismero is a web application framework that can audit websites and operating systems running Windows 10, Linux, and macOS (OS X).

DAVTest:
Web Distributed Authoring and Versioning (WebDAV) is an extension of HTTP that enables web servers to behave like file servers. It allows sysadmins to create and edit files remotely. DAVTest audits WebDAV-enabled servers by uploading executable files and enumerating command execution vulnerabilities. Using DAVTest, penetration testers can quickly identify if a given WebDAV server is exploitable.

Uniscan:
Uniscan is a simple tool created to discover remote and local file inclusion, as well as remote command execution vulnerabilities. It can also detect SQL and PHP CGI argument injections, crawl for hidden files and directories, and fingerprint web servers.

WHOIS:
WHOIS is a search and response protocol that is used by a variety of software and websites for querying domain owner information. The whois command line tool is used to easily access domain owner contact details and IP address assignments for information gathering purposes.

DIRB:
DIRB is a web application analysis and WebObject discovery tool that executes a dictionary-based attack against web servers.

Load Balance Detector (Lbd):
Load balancing refers to efficiently distributing incoming network traffic across a large pool (or "farm") of servers. To cost-efficiently provide consistent and reliable content to its visitors, large websites (like Facebook or Instagram) must use load-balancing solutions. Lbd attempts to detect if a given website employs a DNS or HTTP load balancing software by comparing server header responses.


Wapiti:
Wapiti is a website and web application auditing injection tool. It supports both GET and POST HTTP methods, generates verbose vulnerability assessment reports, and allows custom HTTP headers. Wapiti is capable of detecting a vast amount of vulnerabilities such as:

SQL and XPath injections
Cross-Site Scripting (XSS) injection
PHP command execution
CRLF injection
XML External Entity injection
Server-Side Request Forgeries (SSRF)
Apache .htaccess configuration bypasses
Sensitive file and information disclosures
Shellshock vulnerabilities
TheHarvester
TheHarvester is an open-source information gathering tool intended for penetration testers in the early stages of black-box and red team engagements. It features the ability to perform virtual host verifications, DNS enumeration, reverse domain searches, and IP lookups, as well as make Shodan queries.

XSSer:
Cross-Site Scripter (XSSer) is an automation tool that attempts to detect and exploit cross-site scripting vulnerabilities in web applications and websites. It also includes several options for evading XSS detection filters.

SSLyze:
Transport Layer Security (TLS; aka "SSL") is a cryptographic protocol designed to establish secure communications between computers operating over the internet. SSLyze analyzes the SSL configuration of a given website and reports misconfigurations and critical vulnerabilities.


DMitry:
DMitry is an information gathering tool that tries to collect as much information about a host as possible. It gathers subdomain information, email addresses, uptime information, open port details, whois lookup responses, and much more.

Nikto:Nikto is a vulnerability scanner which performs a myriad of comprehensive tests ag

ainst web servers. Among its many scanning features, it checks for outdated software, server misconfiguration, directory checks, weak HTTP headers, and has many available plugins for further enhancing its functionalities.

DNSmap:
DNSmap is another DNS enumeration tool meant to be used during the information gathering phase of a penetration testing engagement. Subdomain brute-forcing is a common and effective technique for discovering additional servers and IPs controls by a target website or company.

Wednesday, 13 February 2019

How To Lock External Hard Disk Drives

This is based on system settings that will allow you to lock your drive with password without any need of third party tool. Whereas, the other one requires a third party tool to password-protect your drives. Just follow up some simple steps below to proceed.

▪ Steps To Secure Your External Hard Drive With BitLocker:

* First of all, connect your external hard drive to your Windows PC and turn it on. Now click on Start button and then navigate to Control Panel -> BitLocker Drive Encryption.

* By default BitLocker will be “Off” you need to Turn On BitLocker for the drive that you want to encrypt.

* Now there tick on “Use a Password to Unlock the Drive” option there and enter the same password in both fields and then click “Next“.

* Now time to save your key somewhere for that click on “Save the Recovery Key to a File,” and then select any location where you want to save your key for future reference  and then proceed by clicking on next button.

 Now click on Start Encryption option and wait for the process to complete and it can take a time to complete depending upon drive size. Once finished

♻️ That’s it! you are done, now you drive will always a require a password to access files inside it

Tuesday, 12 February 2019

GIFTCARD CARDING TUTORIAL





       Okay So Now Here I'm Guiding you to Card Amazon Giftcards. It's My Private Method , Let's Go for The Tutorial.

- First Buy Fresh CC From Shop/Trusted Vendors

I'm suggesting to use bankomat and Unicc to buy Cc , You Can Use Any Bin

- Connect Rdp/911 vpn (highly recommended)

Connect rdp/911 vpn same as Cc Owner State. If Cc Owner from Texas use Texas IP

- Then clear History & Cookies (use jet cleaner / Ccleaner)

- Go To Outlook & Sign up a new email (Don't Use yopmail or tempmail service)

If Cc owner name john fernadez ,use signup email like this johnfernadez42@outlook.com

- Then Go To Amazon Create A New Account With The Cc Owner Details

- Then Try Amazon Prime Membership With The Cc

- Link Cc To Amazon then Cart A Product Below 40$ & leave for 48hours

Because with the newly opened account it's hard to do ...with the new account Amazon More Secured ;(

- Then After 48hours just Login Again Use Same State IP

- Now check out the carted Product

- Type billing address as shipping address

Means ship the carted product to real cc owner address

- 101% Amazon will Confirm the order unless you use dead Cc

- Then Just Surf On Amazon For Few min. And simply Cart More products(Dont Checkout)

- Then Go to amazon e-giftcards

- Choose e-Giftcard Amount Below 400$

- Then Mail The Giftcard to Your email Address (use that outlook mail)

- Hurrey!!!!! Now you'll Get Amazon E-giftcard you can sell it on paxful to exchange vs btc or buy product with the gift card.


▪️ Amazon Gifcard Generator + Checker ( With Video )

▫️ Generate , Check And Spam Giftcard

▫️ Download:
https://mega.nz/#!wc5BQIKR!zBKtBsrE4_TcO-9BPKJLooUwQied2YYf_jk8frFMplM

Google Play Store Carding


Carding Google play and Google play gift card As usual require clearing of your Cookies in browser using Ccleaner.

 go to play store and click any app that is paid and below like 2$ or less , go to payment info.

Get your live CC or buy from shop like unicc, jstash etc..,

Bin; I recommended 517805,372739 ,417409 or amex gold ,capital one bank (only USA cc)

If you want  public cc I recommend Amex,they are good for carding google play

If the card don't have name and zip you can choose any name and US zip because their bin are Non-AVS
[If you dont know what is Non-Avs / AVS the just click it to learn

Save the card and Proceed to payment.

Check If the payment is successful for that app,
 then go to buy google play credit and select your gift card 5$,10$,15$,25$ or 50$  .

It have a rate of 70% to 100% success  because of Non-AVS BIN(which is best).

If they declined the card after use, Google play can never charge back and card showing declined always work for small amount like 5$ after few weeks.

Thats it..!

BIN LIST:

 AMEX CARD:BIN: 372937××××××××××IP: USA

2. VISA CARD:

BIN: 409714×××××××××IP: ROMANIA

3. MASTER CARD:

BIN: 805715××××××××××IP: USA



How to Send Spoofed Emails Anonymously

One of the easy way to send a spoofed email is by using our own local SMTP server. In the past, I have tried SMTP servers like QK SMTP server. This method used to work successfully in those days, but as of now, it has a very low success rate since Gmail and Yahoo (all major email service providers) blocks the emails that are sent directly from a home computer.

♻️ How to Send Spoofed Emails?

In this post, I have come up with a new method of sending spoofed emails to anyone without having to worry about being blocked or filtered as spam. In order to accomplish this, all you’ve to do is use a “relay server” while sending the spoofed emails.

♻️What is a Relay Server?

In simple words, a relay server is an SMTP Server that is trusted by major companies as an authorized sender of the email. So, when you send an email using a relay server, the email service providers like Yahoo and Gmail blindly accept the emails and deliver it to the inbox of the recipient. If the SMTP server is not authorized, Google and Yahoo will reject all the emails sent from this SMTP server. This is the reason for which using our own SMTP server to send emails fail.

♻️So, How to Find a Relay Server?

Now, all we have to do is find a trusted SMTP server so as to send spoofed emails successfully. Usually, all the emails that are sent from web hosting providers are trusted and authorized. So, you have to find a free web hosting provider that allows you to send emails. But, most of the free web hosts disable the Mail feature and do not allow the users to send emails. This is done just to avoid spamming. However, all the paid hosting plans allow you to send any number of emails. Once you find a hosting service that allows to send emails from their servers, it’s just a cakewalk to send anonymous emails. All we have to do is just modify the email header to insert a fake From: address field into it.

I have created a PHP script that allows you to send emails from any name and email address of your choice. Here is a step-by-step procedure to setup your own anonymous email sender script:

♻️Login to your FreeWebHostingArea Account and click on File Manager.

Upload the sendmail.php, pngimg.php and bg1.PNG files to the server.

Set permissions for sendmail.php, pngimg.php and bg1.PNG to 777.

Now type the following URL:

http://yoursite.x10hosting.com/sendmail.php

‼️NOTE: yoursite must be substituted by the name of the subdomain that you have chosen during the registration process.

▶Use the script to send spoofed emails anonymously to your friends and have fun. Enjoy!!!

⏩☝WARNING: ALL THE INFORMATION PROVIDED IN THIS POST ARE FOR EDUCATIONAL PURPOSES ONLY. I AM NOT RESPONSIBLE FOR ANY MISUSE.

CALL SOMEONE FROM ANY NUMBER(CALL SPOOFING)


▪ Go to http://www.mobivox.com and register there for free account.

▪ During registration, remember to insert Victim mobile number in “Phone number” field.

▪ Complete registration and confirm your email id and then login to your account.

click on “Direct WebCall”.

▪ Lastly In “Enter a number” box, select your country and also any mobile number(you can enter yours). Now, simply hit on “Call Now” button to call.

That’s it. Enjoy 👍

❌ i'm not responsible for any damage or illegal activity , ønly for educational purpose 🙅

Cardable sites list 2019



US:
www.caliroots.com
www.footlocker.eu
www.fallenhero.com
www.truereligionbrandjeans.com
www.dilemaboutique.com
www.moonpig.com
http://www.fandango.com
http://www.thinkgeek.com
http://www.ticketmaster.com/
http://www.sixflags.com/magicmountain/index.aspx
http://www.halloweenhorrornights.com/
http://www.mmoxe.com/ - Phone Verification needed
http://www.walmart.com - Non-vbv or Amex/Disco
http://www.tubhub.com
http://www.livenation.com
http://www.hookahhookah.com
http://www.cigar.com
http://www.fleshlight.com
http://www.Skype.com - Fullz Needed
http://www.waleapparatus.com/
http://www.nbastore.com(shoes and clothing)
http://www.soccergarage.com(sports and stuff)
http://www.csrtechnologies.net(laptops and stuff)
http://www.motorcycle-superstore.com(motorcycle stuff)
http://www.dailycheckout(many stuff)
http://www.footballfanatics.com(clothing)
http://www.districtlines.com(clothing & cds)
http://www.focalprice.com(chinese elctronics)
http://www.gamersgate.com(pc games)
http://www.piperlime.com(shoes and clothing)
http://store.steampowered.com/(if you get an EA title , you can save the cd key.)
http://www.BeatPort.com
http://www.hobbytron.com
http://www.journeys.com
http://www.sentris.com/
http://www.extremepie.com
http://www.calpop.com
http://www.dormzy.com - Groceries
http://www.jbox.com - Japanese stuff
http://www.spacegrinders.com - Herb grinders, digital scales, etc.
http://www.matrixeyewear.com - Matrix movie sunglasses
http://www.deviantart.com - Art prints
http://www.vistaprint.com (business cards/ pens/ other shit) - dont even need a matching state sock5
http://www.thenorthface.com
http://www.lojack.com
http://www.newegg.com/
http://www.grasscity.com/
http://www.dominos.com/
http://www.gameservers.com/
http://www.minecraft.com/ - Order gets cancelled, you still get to keep premium.
http://www.enhancedaim.com/
http://www.offgamers.com/ - phone verification needed

Uk:
https://www.multiplay.co.uk/
http://www.mmoxe.com
http://www.ticketmaster.co.uk/
http://thinkgeek.com
http://www.asda.com
http://www.Play.com
http://www.discount-supplements.co.uk
http://www.asda-entertainment.co.uk
http://www.electricaldiscountuk.co.uk/
http://www.weedworld.co.uk/
http://www.b4utele.com/
http://www.dhgate.com
http://www.onlineshoes.com/
http://www.sendit.com/
http://www.landaustore.co.uk/
http://store.liverpoolfc.tv/
http://www.jessops.com/
http://www.jdsports.co.uk/
http://www.comet.co.uk
http://onlinestore.arsenal.com/
http://www.hamper.com
http://www.loserkids.com/
www.mainlinemenswear.co.uk
www.psyche.co.uk
www.cyclestores.co.uk
www.zuccionline.co.uk
www.interflora.co.uk

Ca:
http://www.ticketmaster.ca
/
http://www.bongoutlet.ca
http://www.directcanada.com/

De:
smart2phone.de iphone
http://www.podcenter.de/ iphone
www.amid-elektronik.de
www.mobilfire.de
www.mediatrend24.de
www.passau-2u.de
www.dehlwisch.de
www.tx-sports.com
www.phonestation.de
www.Stylefile.de
www.pumkus.de
www.golop.de kleidung rechnung
www.lloydstore.de
www.olympshop.de
www.rené-lezard-shop.de
www.strellsonshop.de
www.gantshop.de
www.styleon.de
www.com-tra.de
www.music-town.de
www.memshop.de
www.apfelvision.de/
www.shopping-phone.com
www.allaxis.de
www.uhrcenter.de/
www.pdamax.de
www.gorcon.de
www.techgalerie.de
www.mygamesale.com/
www.innicc.com
http://de.europe.creative.com/shop/
www.conrad.de
www.sonyericsson-shop.de
www.sonystyle.de
www.sheesha24.de
www.thehookah.com
www.uhrzeit.org
www.vodkahaus.de
www.sensiseeds.com
www.thalia.de
www.eukasa.de [HD]
www.pc-cooling.de
www.ipc-computer.de
www.messerundmehr.de
www.metaltix.com
www.nuclearblast.de
www.ichwillkaffee.de
www.angelsport.de
www.alternate.de
www.x-tra-x.de/
www.titus.de
www.sportloebl.de/index.php
www.games-workshop.com/gws
www.gwindi.net/
www.kotte-zeller.de
www.quelle.de
www.fleshlight-shop.de
www.ticket-online.de
www.elevator.de/
www.bankowski.de
www.jowenga.com/shop/
www.thejewellershop.com/
www.buyplanet.de [Iphone Shop]
www.sip-scootershop.de
www.scootercenter.de
www.racing-planet.de
http://www.wsdeal.com/

Top 12 WiFi Hacking Apps For Android




WPS Connect
WPS Connect is a popular WiFi hacking app for Android smartphones which you can install and start playing with the WiFi networks of the surroundings. Working on a rooted Android device, this application helps you disable other user’s internet connection. Its creator says that WPS Connect is primarily intended to use for verifying if your WiFi router is secure. Apart from default PINs, WPS Connect also includes algorithms like Zhao Chesung (ComputePIN) or Stefan Viehböck (easyboxPIN). Please note that this WiFi hacking app for Android works with Android 4.0 or higher.

— WPS Connect

 WIBR+
WIBR+ was created to test the security and integrity of WiFi networks. By using Bruteforce and dictionary attacks, this app answers your “how to hack WiFi” questions. Moreover, WIBR+ app for cracking WiFi passwords also lets you use custom dictionaries. Depending upon your priority and network, you can select different options–lowercase, uppercase, numbers, and special characters–for performing the attack. Depending upon your password strength, WIBR takes time and cracks the password.

— WIBR+
. Netspoof
Whenever we start any discussion on how to sniff someone’s WiFi using Android devices, the mention of Netspoof, or NetwoSpoofer, comes very soon. It’s a WiFi hacker app that lets you play with websites on other people’s devices using your smartphone. Licensed under GNU GPNv3, this mobile application runs on rooted devices with ease. You can also use a custom firmware like CynogenMod to use this app. Some of the major features of this app are redirecting websites to other pages, deleting random words from websites, changing all pictures to troll face, etc.’

— Netspoof

 WiFi Analyzer (a prank app)
WiFi Analyzer isn’t exactly a WiFi hacker app for Android, it’s a prank app. I thought it would be a good idea to end this list of WiFi hacking apps with an app that lets you pretend as if you’ve broken into your friend’s WiFi and gained access. It has a very professional look and a WiFi scanner that detects all WiFi hotspots nearly. So, if you’re simply interested in fooling your friends, give this a try.

— WiFi Analyzer

Other notable Android WiFi hacking apps:
Apart from the above-mentioned Android applications for penetration testing and security analysis, there exists an overabundance of other apps that you can download on your device and use. Some of such notable Android WiFi hacking tools are:



Shark for Root
Fing Networks Tools
Router Keygen
WiFi Inspect
Arpspoof
So, did you find our list of best apps to hack WiFi network useful? Give them a try and improve ethical hacking skills.

Thursday, 7 February 2019

Pubg Royale Pass 40 Rs Trick



Requirements:

 10 Gmail Id
Net banking(online Banking)
Pubg mobile

Step 1: Click on 60 UC for Rs 79 in pubg

Then it will ask you to login to Gmail. login to your Gmail account then

Step 2: Select payment Method as Net Banking, then select your bank

Then it will ask you to type your password of your Gmail account to make the payment

Step 3: (Very Important)

Type password then erase password (Don't login)

Then click on back button in your phone

Then a message of forgot password will come

Then click on NO THANKS

Then again click on back button in your phone.
Then it will show you will get rs. 75 off if you make payment within 24 hours

Then make the payment of Rs 4!

And yes you got 60 UC

To do it again clear your Google Play store data and cache and login with a fresh Gmail account and repeat the steps.

You Need 10 Gmail Accounts To add 60 UC <10 times, the same method but different Gmail>


This method works for different country,
Convert it to your country currency

Wednesday, 6 February 2019

How to Remove a Stubborn Program in Windows That just Won’t Leave

Note❗️: Before you start this process, keep in mind that the program which you want to uninstall should not be running in the background.

💠 Using Task Manager

⚜ The very first thing that you can do is if you don’t get your program uninstallation option anywhere, just press the window key combination “Ctrl + Shift + Esc” that will launch the Windows Task manager. Inside the Task manager panel, you will see up various different titled tabs, you will have to head on to the “Processes” tab from there. Check for the program which you wish to uninstall there on the list, if it is there then close it by right-clicking on it unless move on alike only. This will clear up the program from the background playlist and you can then try again to Uninstall that Program and it could be removed.

💠 Using Control Panel

⚜ Now there is another method through which you can uninstall the programs that won’t get removed properly. Just run the Windows in safe mode and then try to uninstall the program by the familiar methods only. You can try to uninstall that program from the control panel options also if the casual way out doesn’t work for you. In safe mode, the Windows can keep up the problems and difficulties apart that could be causing up the malfunctioning of the programs and the various functions hence it could be possible to remove any stubborn program from the Windows safe Mode easily.

💠 Using Program Install & Uninstall Troubleshooter

⚜ This is a troubleshooter program from the Microsoft itself made for the Windows so as to help up the users remove the installation problems or the uninstallation problems for the programs. It will scan the PC for the problems and will try to fix it automatically but in case there is no fix for the problem then you can manually select up the threat program from the list and then go for a vast troubleshoot which sometimes can give you a quick fix and hence you can easily uninstall that culprit program.

✅ That's it ,you are done. these are the 3 ways to remove stubborn program in windows that just won't leave. Hope you like this tutorial. Share with your friends but give credits

How to Know that that your account has been Breached/Compromised



 Yes There is way to know that is your account anytime has been include in leaked database .

 Link:-- https://haveibeenpwned.com

💠This website is the biggest website who collect all the data breached or leaked by a hacker💠

🛑You can  put your email in this website and can check is your email has been in data breach🛑

✅You can also check is your password has been compromised or has been in that leaked  database ✅

💠Tips For you💠

✅If you found that your email has been breached than asap you activate your 3 step  verification setting  of your email

✅If you found your pass has pawned  than change your password from all the site and never use that password again


How To Get Paypal Verified

  


     ●●●●●●●●●●●●

✍ This guide works best with PayPal US accounts. It WILL work for people that are not in the US, but US accounts have a higher success rate.

⚡️⚡️Guide:⚡️⚡️

1) Go to ETRADE.

2) Click on OPEN AN ACCOUNT.

3) Click “APPLY NOW” on “E*TRADE Complete Investment Account”.

4) Now you will need to fill in info. DO NOT put in your real info. Use Fake Name Generator (IMPORTANT: Get an identity from the US)! Also use an email that you can access. For the “Account Type”, pick “Individual account”.

5) For “Step 1: Choose Account Type”, pick “Cash Account Only”.

6) Put in the fake address and phone number that you got from Fake Name Generator, and make sure that both of the boxes unchecked!

7) Now you will need a Social Security number. As usual, DO NOT put in your real info. Use Fake Name Generator. Make sure it is in the state of where your fake address is. Also make sure you put your “Country of Legal Residence” as “United States” and click “US citizen”.

8 ) For your “Employment Status” just make up jobs. Make sure it is in the same city, state, zip, and country. DO NOT make the address of your Employer the same as where your “home” address is. Pick “No” for all the options.

9) For “Additional Account Preferences”, put in what I say. Put in “Income” for “Investment Objectives:“. Put in “Excellent” for “Investment Experience:”. Pick the first option for all the drop-down boxes and pick “No” for the selection.

10) Now for “Sweep accounts”, pick the first one and pick “No” for the rest.

11) Make sure that all the boxes are unchecked on “Select Documents for Electronic Delivery”.

12) Click I Accept and DO NOT check the box.

13) Now pick “No. I want to create a new user ID and password for this account.”.

14) Make an account that you can remember.

15) Now login to your account. Your account number should be in the middle of the page.

16) Now go to the “Add a Bank account” page in PayPal.

17) For routing number, put in: 056073573.

18 ) For account number, put in: your account number.

19) Now go to the next page and enter your login info.

20) Pick the Instant option on the page and wait a few mins.

21) Congratulations! Your PayPal is verified!

SERVERLESS COMPUTING



The serverless computing means that everyone can build and run application and services without thinking about servers and its implementation and management.It is made clear that serverless computing has servers but users and developers are unaware of it.


With severless computing,you can build any type of application and make it available.Whereas,Serverless computing is implemented on the Serverless architectures which are provided by different manufacturers  such as Google Cloud Functions,AWS Lambda,OpenWhisk,etc.

Severless Computing is the process of
deploying code into projects. measuring,
planning and maintenance operations can be hidden from the author (developer) or operator. Serverless code can be used in combination of deployed code in normal styles.

Read More




Saturday, 2 February 2019

How To Get Many Hours On Steam (Paid/FreeHours)



1.First Of All,Go To https://freehourboost.com/?r=blaxycs

2.Make An New Account.

3.After Confirmation On Email And More,You Can Boost Your Hours On Steam.

4.There Is A Free Plan Of 100 Hours,1 Game Allowed.

5.Now,Put Your Email Credentials And The Game/s That You Want To Hour Boost.

6.If You Need More Hours Or Games To Put To Farm Hours Buy A License,Is The Cheapest!

7.Enjoy 24/24h Boost On Steam!


Basecamp Endured a Brute Force Attack



Once again,another popular online portal fell victim to a cyber attack.However,this time,the targeted firm Basecamp effectively fought back against a credential stuffing attack affecting around 30,000accounts.Nonetheless,the company had to reset passwords of affected accounts.

Blog Archive

Popular Posts

Powered by Blogger.

Contact Form

Name

Email *

Message *

Labels

Carding (16) Cracking (2) Education (40) Hacking (35) News (39) technology (23) Tips & Tricks (11) Tips N Tricks (85)

Recent Post

Pages

Comments

Popular Posts

Tags

Carding (16) Cracking (2) Education (40) Hacking (35) News (39) technology (23) Tips & Tricks (11) Tips N Tricks (85)