ββπ°ETHICAL HACKING USING ANDROID DEVICEπ°
π In This Course You Get Some Videos Tutorials For Learning Hacking Using Android Devices
βοΈL!NK:- https://mega.nz/folder/aVsFzQ4S#MYrQ9rc3pjDjq2pjVHCtoA
β οΈ Sorry for post again guys Antihyper Deleted this By Mistakeπ
β @Anonymous_CreeWβ
π In This Course You Get Some Videos Tutorials For Learning Hacking Using Android Devices
βοΈL!NK:- https://mega.nz/folder/aVsFzQ4S#MYrQ9rc3pjDjq2pjVHCtoA
β οΈ Sorry for post again guys Antihyper Deleted this By Mistakeπ
β @Anonymous_CreeWβ
This media is not supported in your browser
VIEW IN TELEGRAM
ββπ°4 Proven Ways To Find a Website's IP Address π°
This tutorial teaches you how to find the IP address of a website. You can do this by using your computer's built-in "traceroute" function, or by downloading and using a free traceroute app for your iPhone or Android.
β¨#1 ON WINDOWSβ¨
β’ Open your PC and click on start menu. Search For "cmd" (Without quotes)
β’ Right Click on cmd and click on "Run as administration"
β’ Now enter a command -
ping website address -t
Ex. - ping google.com -t
β’ Now hit enter. You will get it.
===============================
β¨# 2 ON MAC OSβ¨
β’ Open Spotlight (Click the magnifying glass-shaped icon in the top-right corner of the screen.)
β’ Search for Network Utility and open it. After that Click on Traceroute tab in network utility.
β’ Now Enter website address in input box and click on trace button You will see the IP address of website
================================
β¨ #3 ON ANDROID β¨
β’ Download and install PingTools Network Utility app then open it.
β’ Tap β°. It's in the upper-left corner of the screen. A pop-out menu will appear.
β’ Now tap Traceroute Enter Website address and click on trace button
=================================
β¨ #4 ON IPHONE β¨
β’Install and Open Inettools app
β’Click on Traceroute then Click on adress bar and input website address (e.g. google.com)
β’Click on start. You will see the IP address of website.
=================================
πNote - Do not try to find ip address of Government sites (.gov, .gov.in, ac.in etc)
Share And Support UsπΉ
β @Anonymous_CreeW β
This tutorial teaches you how to find the IP address of a website. You can do this by using your computer's built-in "traceroute" function, or by downloading and using a free traceroute app for your iPhone or Android.
β¨#1 ON WINDOWSβ¨
β’ Open your PC and click on start menu. Search For "cmd" (Without quotes)
β’ Right Click on cmd and click on "Run as administration"
β’ Now enter a command -
ping website address -t
Ex. - ping google.com -t
β’ Now hit enter. You will get it.
===============================
β¨# 2 ON MAC OSβ¨
β’ Open Spotlight (Click the magnifying glass-shaped icon in the top-right corner of the screen.)
β’ Search for Network Utility and open it. After that Click on Traceroute tab in network utility.
β’ Now Enter website address in input box and click on trace button You will see the IP address of website
================================
β¨ #3 ON ANDROID β¨
β’ Download and install PingTools Network Utility app then open it.
β’ Tap β°. It's in the upper-left corner of the screen. A pop-out menu will appear.
β’ Now tap Traceroute Enter Website address and click on trace button
=================================
β¨ #4 ON IPHONE β¨
β’Install and Open Inettools app
β’Click on Traceroute then Click on adress bar and input website address (e.g. google.com)
β’Click on start. You will see the IP address of website.
=================================
πNote - Do not try to find ip address of Government sites (.gov, .gov.in, ac.in etc)
Share And Support UsπΉ
β @Anonymous_CreeW β
This media is not supported in your browser
VIEW IN TELEGRAM
βββπ°Android Hacking Full Advance Professional Courseπ°
π’ Total Videos :- 31
π’ Language (
π’ Resolution :- 1920Γ1080 Full HD
π’ Videos Duration Time :- 6Hour.48Min.22Sec.
π’ System Used :- Kali Linux, Windows 8.1, And Windows 10
π’ Basic Knowledge Of Kali Linux And Windows
β»οΈ L!NK :- https://drive.google.com/drive/folders/1_G6kt5leGkmzMs_hveS0oUya591gVso2
β@Anonymous_CreeWβ
π’ Total Videos :- 31
π’ Language (
ΰ€Ήΰ€Ώΰ€ΰ€¦ΰ₯)π’ Resolution :- 1920Γ1080 Full HD
π’ Videos Duration Time :- 6Hour.48Min.22Sec.
π’ System Used :- Kali Linux, Windows 8.1, And Windows 10
π’ Basic Knowledge Of Kali Linux And Windows
β»οΈ L!NK :- https://drive.google.com/drive/folders/1_G6kt5leGkmzMs_hveS0oUya591gVso2
β@Anonymous_CreeWβ
This media is not supported in your browser
VIEW IN TELEGRAM
βπ° TOP Sites to Provide FAKE Identity !!! π°
π https://fakena.me/
π https://fauxid.com/
π https://www.fakexy.com/
π https://www.elfqrin.com/fakeid.php
π https://www.fakenamegenerator.com/
π https://www.fakepersongenerator.com/
π https://www.fakeaddressgenerator.com/
π https://datafakegenerator.com
π http://namegenerators.org
β @Anonymous_CreeWβ
π https://fakena.me/
π https://fauxid.com/
π https://www.fakexy.com/
π https://www.elfqrin.com/fakeid.php
π https://www.fakenamegenerator.com/
π https://www.fakepersongenerator.com/
π https://www.fakeaddressgenerator.com/
π https://datafakegenerator.com
π http://namegenerators.org
β @Anonymous_CreeWβ
This media is not supported in your browser
VIEW IN TELEGRAM
βββπ°BLACKHAT ACCOUNT CRACKING COURSEπ°
π This Course Will Teach You To What Is Cracking And How you Can Crack Premium Accounts With Some Software And Tools. In This Course You Will Get Knowledge About Cracking
β L!NK :-
https://mega.nz/folder/6pggnYwD#zncBEg-OKsWLs4soZGqwFg
β @Anonymous_CreeWβ
π This Course Will Teach You To What Is Cracking And How you Can Crack Premium Accounts With Some Software And Tools. In This Course You Will Get Knowledge About Cracking
β L!NK :-
https://mega.nz/folder/6pggnYwD#zncBEg-OKsWLs4soZGqwFg
β @Anonymous_CreeWβ
This media is not supported in your browser
VIEW IN TELEGRAM
This media is not supported in your browser
VIEW IN TELEGRAM
π Facebook Information π
FBI is an accurate facebook account information gathering, all sensitive information can be gathered even though the target converts all of its privacy to (only me).
βοΈ Installation:
$
$
$
$
$
$
βοΈ Usage:
$
$
$
Paste Any User ID, then it will show all you all information of that user. You can use dump_id to find ID or copy from User's Profile Link.
βββββββββββββ
FBI is an accurate facebook account information gathering, all sensitive information can be gathered even though the target converts all of its privacy to (only me).
βοΈ Installation:
$
apt update && apt upgrade$
apt install git python2$
git clone https://github.com/xHak9x/fbi.git$
cd fbi$
pip2 install -r requirements.txt$
python2 fbi.pyβοΈ Usage:
$
help (To see Commands)$
token (Login with Fake id)$
get_infoPaste Any User ID, then it will show all you all information of that user. You can use dump_id to find ID or copy from User's Profile Link.
βββββββββββββ
This media is not supported in your browser
VIEW IN TELEGRAM
This media is not supported in your browser
VIEW IN TELEGRAM
ββπΉ MAN IN THE MIDDLE ATTACKβ
Man-in-the-Middle (MITM) attack happens when a hacker inserts themselves between a user and a website.
Attackers have many different reasons and methods for using a MITM attack. Typically, theyβre trying to steal something, like credit card numbers or user login credentials. Sometimes theyβre snooping on private conversations, which might include trade secrets or other valuable information
πUsefull Types of Man-in-the Middle Attacks
β Wi-Fi Eavesdropping
If youβve ever used a laptop in a coffee shop, you may have noticed a pop-up that says βThis network is not secure.β Public wi-fi is usually provided βas-is,β with no guarantees over the quality of service.
However, unencrypted wi-fi connections are easy to eavesdrop. Itβs much like having a conversation in a public restaurant β anyone can listen in
Another Wi-Fi Eavesdropping attack happens when a hacker creates its own wi-fi hotspot, called an βEvil Twin.β They make the connection look just like the authentic one, down to the network ID and passwords. Users may accidentally (or automatically) connect to the βevil twin,β allowing the hacker to snoop on their activity.
β Email Hijacking
In this type of cyber security attack, a hacker compromises a userβs email account. Often, the hacker silently waits, gathering information and eavesdropping on the email conversations. Hackers may have a search script that looks for specific keywords, like βbankβ or βsecret Democrat strategies.β
Email hijacking works well with social engineering. Hackers might use information from a hacked email account to impersonate an online friend. They may also use spear-phishing to manipulate a user to install malicious software.
β Session Hijacking
This type of Man-in-the attack is typically used to compromise social media accounts. With most social media sites, the website stores a βsession browser cookieβ on the userβs machine. This cookie is invalidated when the user logs off. But while the session is active, the cookie provides identity, access, and tracking information.
A Session Hijack occurs when an attacker steals a session cookie. This can happen if the userβs machine is infected with malware or browser hijackers. It can also happen when an attacker uses a cross-scripting XSS attack β where the attacker injects malicious code into a frequently-used website.
Advance Tutorials On Man in the middle attack are coming soon stay connected with UsπΉ
β @Anonymous_CreeW β
Man-in-the-Middle (MITM) attack happens when a hacker inserts themselves between a user and a website.
Attackers have many different reasons and methods for using a MITM attack. Typically, theyβre trying to steal something, like credit card numbers or user login credentials. Sometimes theyβre snooping on private conversations, which might include trade secrets or other valuable information
πUsefull Types of Man-in-the Middle Attacks
β Wi-Fi Eavesdropping
If youβve ever used a laptop in a coffee shop, you may have noticed a pop-up that says βThis network is not secure.β Public wi-fi is usually provided βas-is,β with no guarantees over the quality of service.
However, unencrypted wi-fi connections are easy to eavesdrop. Itβs much like having a conversation in a public restaurant β anyone can listen in
Another Wi-Fi Eavesdropping attack happens when a hacker creates its own wi-fi hotspot, called an βEvil Twin.β They make the connection look just like the authentic one, down to the network ID and passwords. Users may accidentally (or automatically) connect to the βevil twin,β allowing the hacker to snoop on their activity.
β Email Hijacking
In this type of cyber security attack, a hacker compromises a userβs email account. Often, the hacker silently waits, gathering information and eavesdropping on the email conversations. Hackers may have a search script that looks for specific keywords, like βbankβ or βsecret Democrat strategies.β
Email hijacking works well with social engineering. Hackers might use information from a hacked email account to impersonate an online friend. They may also use spear-phishing to manipulate a user to install malicious software.
β Session Hijacking
This type of Man-in-the attack is typically used to compromise social media accounts. With most social media sites, the website stores a βsession browser cookieβ on the userβs machine. This cookie is invalidated when the user logs off. But while the session is active, the cookie provides identity, access, and tracking information.
A Session Hijack occurs when an attacker steals a session cookie. This can happen if the userβs machine is infected with malware or browser hijackers. It can also happen when an attacker uses a cross-scripting XSS attack β where the attacker injects malicious code into a frequently-used website.
Advance Tutorials On Man in the middle attack are coming soon stay connected with UsπΉ
β @Anonymous_CreeW β
This media is not supported in your browser
VIEW IN TELEGRAM
βββπ° Technical Sagar All Hacking Courses Collection π°
π₯MEDIA FIRE LINKS !!!!
βΎοΈ TechMaster Course
β¨οΈ Link: https://bit.ly/2YTVgSJ
βΎοΈ Quick Hack Course
β¨οΈ Link: https://bit.ly/2WrvhR6
βΎοΈ Money Making Course
β¨οΈ Link: https://bit.ly/3fMvNAO
βΎοΈ Deleted Video Course
β¨οΈ Link: https://bit.ly/2YVXHnK
βΎοΈHackStars Course
β¨οΈ Link: https://bit.ly/35QVMCv
β @Anonymous_CreeWβ
π₯MEDIA FIRE LINKS !!!!
βΎοΈ TechMaster Course
β¨οΈ Link: https://bit.ly/2YTVgSJ
βΎοΈ Quick Hack Course
β¨οΈ Link: https://bit.ly/2WrvhR6
βΎοΈ Money Making Course
β¨οΈ Link: https://bit.ly/3fMvNAO
βΎοΈ Deleted Video Course
β¨οΈ Link: https://bit.ly/2YVXHnK
βΎοΈHackStars Course
β¨οΈ Link: https://bit.ly/35QVMCv
β @Anonymous_CreeWβ
This media is not supported in your browser
VIEW IN TELEGRAM
π°SHUT DOWN YOUR ANDROID DEVICE BY MAKING CALL FROM ANOTHER PHONEπ°
ββββββββββββ
βοΈStep 1. First of all, download and install the Automateit app. This app needs root access. So, make sure to grant the root permission.
βοΈStep 2. Next, select βMy Rulesβ and tap on the (+) icon.
βοΈStep 3. In the next screen tap on the βCall State Triggerβ
βοΈStep 4. Now, choose the option βIncoming Callβ
βοΈStep 5. In the next step, select the contact. You can choose from saved contacts or can create a new one.
βοΈStep 6. Now tap on βNextβ and on the next screen, select βShutdown Device Actionβ
βοΈStep 7.Now you need to provide the name for the rule and save the rule.
Now you just need to make a call from the contact you specified and your Android device will be shut down.
β£SHARE π€ SUPPORT β£οΈ
ββββββββββββ
ββββββββββββ
βοΈStep 1. First of all, download and install the Automateit app. This app needs root access. So, make sure to grant the root permission.
βοΈStep 2. Next, select βMy Rulesβ and tap on the (+) icon.
βοΈStep 3. In the next screen tap on the βCall State Triggerβ
βοΈStep 4. Now, choose the option βIncoming Callβ
βοΈStep 5. In the next step, select the contact. You can choose from saved contacts or can create a new one.
βοΈStep 6. Now tap on βNextβ and on the next screen, select βShutdown Device Actionβ
βοΈStep 7.Now you need to provide the name for the rule and save the rule.
Now you just need to make a call from the contact you specified and your Android device will be shut down.
β£SHARE π€ SUPPORT β£οΈ
ββββββββββββ
This media is not supported in your browser
VIEW IN TELEGRAM
ββπ° Install Kali Linux In Any Android Without Root π€©
π Hello Guys today i will teach you how you can use linux distribution on your android device
πBy this method you can install
β Distributionsβ’ Kali Linux ,ubantu ,debian
β Browsersβ’ Firefox ( desktop)
β Desktopβ’ Lxde Xfce
β Developmentβ’ Python Ide, Git
π on your Android smartphone without any root access π€©
π£ Steps To Setup -
β½ Step#1 First You need to download two Apps on your android device
β’UserLand - Free Download
β’VNC Viewer - Free Download
β½Step#2 After Download Install Them Normally
β½Step#3 Open Userland App Now you will see the list of above metioned distro, and other things
β½Step#4 choose any which you want to install on your device
β½Step#5 it will ask you to create a username and password, just create any username and pass and keeo them in mind
β½Step#6 Now choose connection type "VNC"
β½Step#7 it will prepare environment automatically for you
β½Step#8 after that just click on that distro which you chooses in step#4 and you will connect to it in vnc viewer app, vnc will ask password simply put there which we created in step#5
Enjoy Now π you can install multiple things its depend on you β€
Support Anonymous HackerZπΉ for more awesome tricks and hacks.
π¨Leechers Give credit to hcktech
β @Anonymous_CreeWβ
π Hello Guys today i will teach you how you can use linux distribution on your android device
πBy this method you can install
β Distributionsβ’ Kali Linux ,ubantu ,debian
β Browsersβ’ Firefox ( desktop)
β Desktopβ’ Lxde Xfce
β Developmentβ’ Python Ide, Git
π on your Android smartphone without any root access π€©
π£ Steps To Setup -
β½ Step#1 First You need to download two Apps on your android device
β’UserLand - Free Download
β’VNC Viewer - Free Download
β½Step#2 After Download Install Them Normally
β½Step#3 Open Userland App Now you will see the list of above metioned distro, and other things
β½Step#4 choose any which you want to install on your device
β½Step#5 it will ask you to create a username and password, just create any username and pass and keeo them in mind
β½Step#6 Now choose connection type "VNC"
β½Step#7 it will prepare environment automatically for you
β½Step#8 after that just click on that distro which you chooses in step#4 and you will connect to it in vnc viewer app, vnc will ask password simply put there which we created in step#5
Enjoy Now π you can install multiple things its depend on you β€
Support Anonymous HackerZπΉ for more awesome tricks and hacks.
π¨Leechers Give credit to hcktech
β @Anonymous_CreeWβ