Posts

please don't forget to subscribe

hack cameraa with andriod in termux

To Hack the Front camera of The victim we will have to install a tool from the GitHub repository. The tool we are using is Wishfish by using this tool we will be able to Generate a Link and using that link we get a picture from the front camera of the victim. How Wishfish tool works? Create a Link using this tool. Send the link to the victim. when the victim will click on the link you will get the picture from Victims camera to your phone. Move the Pictures in your internal storage to see the pictures. NOTE: This post is only for educational purpose. I and this site do not support any criminal activity. If you are doing any sort of misuse of this information This site is not responsible for that. THIS SITE ONLY SUPPORT ETHICAL HACKING. How to install Wishfish tool in termux? Step 1: Update and upgrade the termux So that we will not get errors while installing the Wishfish tool.

HOW TO HOST YOURR OWN WEBSITE WITH WAMPSERVER

Image
  How to host your own website on WAMP Server Terms and Conditions About Contact ...

Facebook Brute Forcer In Shellscript Using TOR – Facebash

  WARNING: Facebook blocks account for 1 hour after 20 wrong passwords, so this script can perform only 20 pass/h. Features Save/Resume sessions Anonymous attack through TOR Default Password List (+39k) Usage: git clone https://github.com/thelinuxchoice/facebash cd instashell chmod +x facebash.sh service tor start sudo ./facebash.sh Install  requirements  (Curl, Tor): chmod +x install.sh sudo ./install.sh Download Facebash

how to lauch DDos attack

How do attackers launch DDoS? First, hackers need to get the DDoSTool onto your system. To that end, cybercriminals rely on a whole bag of tricks to enslave your PC, Mac, Android, iPhone, or company endpoint into their botnet. Here are some common examples: •An email attachment. In a moment of bad judgment, you click on either an attachment or link to a website that the attacker controls, and which hosts the malware it sends you. •Your social network or messaging app. Like emails, they can include links that attackers want you to click on, again, to trigger download of a DDoSTool. •Drive-by downloads or click scams. If you surf on a legitimate—albeit infected—website, you don’t even have to click on anything to have the malvertising download botnet malware. Or you fall prey to a pop-up that displays an “urgent” message that prompts you to download some allegedly necessary antivirus security (it’s malware). After the DDoSTool infection takes root, your computer remains seemingly unch...

what is DDos attack?

Imagine a mob of shoppers on Black Friday trying to enter a store through a revolving door, but a group of hooligans block the shoppers by going round and round the door like a carousel. There’s lots of pushing and shoving and griping, and the legitimate shoppers can’t get in to buy anything. Business comes to a standstill. This is DDoS, or Distributed Denial of Service, which is a malicious network attack that involves hackers forcing numerous Internet-connected devices to send network communication requests to one specific service or website with the intention of overwhelming it with false traffic or requests. This has the effect of tying up all available resources to deal with these requests, and crashing the web server or distracting it enough that normal users cannot create a connection between their systems and the server. To pull off a DDoS attack, hackers need an army of zombie computers to do their bidding. Hackers use what we call a DDoSTool to enslave computers and build t...

what is hacking?

Hacking refers to activities that seek to compromise digital devices, such as computers, smartphones, tablets, and even entire networks. And while hacking might not always be for malicious purposes, nowadays most references to hacking, and hackers, characterize it/them as unlawful activity by cybercriminals—motivated by financial gain, protest, information gathering (spying), and even just for the “fun” of the challenge. Many think that “hacker” refers to some self-taught whiz kid or rogue programmer skilled at modifying computer hardware or software so it can be used in ways outside the original developers' intent. But this is a narrow view that doesn't begin to encompass the wide range of reasons why someone turns to hacking. (For an in-depth look at hackers, read “Under the hoodie: why money, power, and ego drive hackers to cybercrime” by Wendy Zamora.) Hacking is typically technical in nature (like creating malvertising that deposits malware in a drive-by attack requirin...