Embarking on the journey of cyber security can be daunting, but fear not! I've curated a step-by-step roadmap, from fundamental principles to advanced techniques, ensuring a seamless learning experience.
️ Prerequisites:
To dive into this world, all you need is a clear mindset, a functioning...
1: Have access to target email(s).
2: Call the carrier support. Tell them to email you a new 6 digit pin. Not difficult at all as most reps are based in Asia and couldn't give a toss.
3: Once you’ve successfully changed the pin, you now need a second SIM pre paid or post paid.
DO NOT port to a...
MAC address spoofing is a technique for temporarily changing your Media Access Control (MAC) address on a network device. A MAC Address is a unique and hardcoded address programmed into network devices which cannot be changed permanently. The MAC address is in the 2nd OSI layer and should be...
PostShell is a post-exploitation shell that includes both a bind and a back connect shell. It creates a fully interactive TTY which allows for job control. The stub size is around 14kb and can be compiled on any Unix like system.
Why not use a traditional Backconnect/Bind Shell?
PostShell...
SMS-Bomber - software designed for mass sending (spam) SMS messages to a specified mobile phone number.
Installation for windows:
Download Python3.8
https://www.python.org/downloads/release/python-38
After that we need to download Impulse from GitHub'a
Now open cmd and go to the folder with the...
1: Dnsdumpster :- dns recon & research , find & lookup dns records
2: Verify email address :- Verify email address online using free email verification tool.
3: ZOOMEY :- find iot device and bugs in android WordPress PHPMyAdmin and much more
4: Search CVE List :- Common Vulnerabilities and...
Hack server with brute force it is to risky so i dnt suggest you to do this . we will use tool today is named hydra it is very popular tool we need kali linux to run it . and we will do it in ((ftp file transfer protocol)) the files saved on server we will hack that you know that website is...
*THIS IS ONLY FOR EDUCATIONAL PURPOSES! IM NOT RESPONSIBLE FOR YOUR OWN ACTION!
THIS IS TUTORIAL ON HOW TO BULK REPORT FACEBOOK ACCOUNT.FEEL FREE TO ASK WE CAN LEARN TOGETHER!
Open your cmd/termux/terminal
type below code one by one:-
$apt update && upgrade
$apt install python
$apt install...
Open your terminal write down:-
$ apt update
$ apt upgrade -y
$ pkg install git -y
$ git clone https://github.com/Devil-Tigers/TigerVirus.git
$ cd TigerVirus
$ bash TigerVirus.sh
After that screen will appear 2 option which was
1 Virus Application
2 Virus Message
You should select what you...
In this tutorial we need two thing it was IOS device and windows/MAC,etc...
-->First grab your iOS devices connect with cable to your desktop.
-->Then go to http://www.3u.com/ and install this software.
-->You'll need to initialized and allow all asked permission in your iOS devices.
-->Open 3u...
Scam emails most commonly originate from Eastern European countries, according to a study by Barracuda Networks.
Analyzing geolocation and network infrastructure across over two billion emails from its Threat Spotlight data, the researchers calculated the quantity of phishing emails as an...
A rights group is suing the US government over what it claims to be the latter’s secret purchasing of mobile phone location data to track individuals.
The GPS data used by many apps is regularly sold to other companies for marketing and other purposes.
However, the American Civil Liberties...
What is Blind SQL Injection:
Some Websites are vulnerable to SQL Injection but the results of injection are not visible to the attacker. In this situation, Blind SQL Injection is used. The page with the vulnerability may not be one that displays data but will display differently depending on the...
As a new developer, finding and fixing bugs can be difficult. You may be tempted to randomly use console.log() in an attempt to get your code working correctly. Not Anymore!
This article is all about debugging the correct way! You’ll learn how to use the Chrome Developer Tools to set up...
Recently, a new Android malware named MaliBot has been discovered by cybersecurity researchers. This malware is designed to steal personal and banking data from infected devices. In this article, we will discuss the details of this malware and how to protect yourself from it.
MaliBot is a new...
Microsoft has recently issued a warning to Android smartphone users regarding a new type of malware that is draining their wallets. The tech giant has identified an evolving toll fraud malware that is infecting Android devices and exploiting their calling capabilities to generate fraudulent...
It's unfortunate that some apps on the Google Play Store can be malicious and cause harm to users. If you have any of these apps installed on your device, it's recommended to immediately uninstall them.
In addition, it's important to take precautions when downloading apps from the Google Play...
Hacking has become increasingly prevalent in today's digital age. One of the most common ways hackers gain access to personal information is through backdoored or counterfeited Android phones. These devices are designed to mimic legitimate phones but contain vulnerabilities that allow hackers to...
Altogether, scientists have distinguished around 190 malware-contaminated games, some of which were intended to explicitly target Russian clients, though a few designated Chinese and unfamiliar clients.
Scientists from Specialist Web have shared subtleties of a portable mission that...