Tech Byte
4.65K subscribers
254 photos
3 videos
87 files
192 links
Tech tricks, news, hacking tutorials and dark web guides.

Admin : @anonyguy
Download Telegram
lua code for an app that prints the tallies of numbers.
Unfortunately you have to test this one with the lua scripting apk
.
.
banner = "Written in lua by H.H"
Screen:Print('Tally 1.0')
Screen:Print(banner)
function tally(num)
Screen:Print(num..':')
num = tonumber(num)
if nil == num then return end
line = ""
while 4<num do
line = line.."++++\t"
num = num-5
end
for v=1,num do
line = line.."l"
end
num = 0
Screen:Print(line)
end
function go()
tally(input:GetText())
end
input = GUI:AddEditText(150,250,200,50,"")
print = GUI:AddButton(200,300,100,75,"Tally")
print:AddEventHandler("OnTouchUp",go)
--Timestamp 190219. Teaching tallies
.
.
we wish to see your projects too
@Roml3n @anonyguy
Stream Samsung Galaxy Unpacked event live on YouTube

https://youtu.be/ISjiJQGJ72o
inbox me @anonyguy
Arun (youtube.com/mrwhosetheboss) & Filip (youtube.com/everythingapplepro) are hosting a mega international giveaway of 5 8GB + 128GB Samsung Galaxy S10s. Click the link below to enter the giveaway. It's FREE!

https://wn.nr/R5FQG8
the difference between white hats and black hats. Black hats don't care if they destroy everything as long as they get what they came for. But white hats have to be careful so they don't break anything. The people who hire them just want to "test" the network not destroy it.
In short black hats don't care about saving you.
This is why blackhatting is stronger. They get to test their skills in all waters without having to worry about breaking anything.
The lack of this wreckless ness however limits whitehats and keeps blackhats a step ahead.
.
I have also said there are no whitehats or blackhats.
If china fought Russia in a cyberwar, Russia would see the Chinese to be the blackhats instead of themselves. The Chinese would also think the same
Do stop tagging yourselves with hats
And...
.
#hack_teh_world
#for_teh_lulz
~halo
OnePlus is holding a mobile filmmaking contest

3 winners will be picked;
1st place gets US$10000, 2 OnePlus devices and a gimbal
2nd place gets $4000, 2 OnePlus devices
3rd place gets $2000 and a OnePlus device

See more about this contest and how to sign up through the link below

https://forums.oneplus.com/threads/mobile-filmmaking-masterclass-part-1-whats-your-idea.1006641/
The Benefits Of Spoofing MAC Address?
It Allows You To Take Over Another Device's Identity.
It Can Be Used To Get Free WiFi (From Neighbors Or Public WiFi Spot).
️It Enables You To Evade Network Intrusion Detection systems.
Copied
Want everything in black!? Go to the link below and check out the products.
Use the code ROML3N to get 20% off everything

💲 matteblackeverythin.com
SHOULD I ROOT MY FON?
.
Rooting your phone gives you access to more features. But most importantly it voids your warranty. This means that if the FON is new, you can't return it for a new one after you brick it.
So lets be realistic
.
Google does not allow us to use Android with ROOT by default because they are trying to protect the users. We here are hackers. We need ROOT. We don't need protection. In fact it's the others ;) who need protection. You probably bought your FON from someone else or stole it like me. Bottom line is even if you plan to return it, you don't have a receipt right now. So forget about warranties and seriously ROOT UR DEVICE. u are doomed anyways.
.
Anyway install termux a Linux shell for Android. We will install a c compiler along with nmap for port scanning, netcat and ssh for connecting to our target.
So uh, I hope ur serious this time. A new series where I teach a little c (Jack has already taught the majority of it) will come up.
Stay tuned...
~halo
If a class was filled with every programming language, who would each programming language be? 😅
Assembly: He’s the nerd. He speaks very quickly and uses short sentences. Very few people talk to him. He’s considered to be an autist asperger by a majority of the class because he finishes the exams so quickly it’s insane and he faces a lot of difficulties in speaking with others. He’s at school but already dressed like an engineer.
Ada: She’s a foureyes nerd. When she gets the answer she’s doesn’t make any mistake. Ada often corrects the teacher when she writes a line a little ambiguous. She’s building a rocketship in her backyard and she’s always speaking about this weird hobby.
Python: He’s Mr Popular. He likes skate, brags about all the parties he’s invited to. He’s good in all the subjects taught in class but he’ll do them a bit slower than the others. Everyone loves him because he explains things so well, sometimes the teacher herself asks Python to explain some part of the course. He’s dressed with a hoodie, a baggy and glasses on the top of the head ;)
Java: She is one of the toppers of the class and very popular. She’s very good in all the topics. The teacher loves her but she’s a very talkative person.
Scala/Kotlin: They are twin sisters and the best friends of Java. Unfortunately, they are not as popular and it’s often Java who takes the lead in the group. It’s very difficult to distinguish one from another. Both are far less talkative than Java but Scala speaks a bit differently than Kotlin and Java.
C: He’s the topper of the class. He’s so fast in completing the exams that the teacher really thinks he’s copying Assembly’s work. He has a little brother C++ and they share a lot in common together. He’s the chess major and often plays chess with Assembly and his big brother.
Go: He’s the new kid on the bloc. He doesn’t like C++ and his friends and he wants to prove he can do better than them. Of course, he prefers playing Go over Chess.
APL: He’s a lonely guy. No one understands him when he speaks. Even the teacher is surprised when APL shows a correct answer after several lines of incomprehensible pictograms. People think that he was born in a foreign country… or a foreign planet ?
HTML/CSS: These twin brothers are very different. One is dressed in black and white and the other is dressed with everything except black and white. HTML is very talkative and annoying and the CSS is very artistic. CSS is the best student in Art lessons and HTML performs well in written expression.
LaTeX: She’s friend of HTML. The teacher likes her because she has a gift of writing. LaTeX likes the mathematical courses because she can draw fancy greek letters. The teacher knows this well and she is often asked to write a formula on the black board.
VBA: He’s in the back, looking through the windows. Not really interested in the courses taught in class. In the exams, he answers always with a table.
C#: He’s in the back playing yet another game on his smartphone. He likes being next to the windows also.
JavaScript: People often mix up Java and JavaScript because they have a similar name. But they are definitly not the same. Javascript spends a lot of time with HTML and CSS. He’s as artistic as CSS but he prefers things that move. He likes actions and movies. CSS dreams to be a painter wheras JavaScript wants to be a film-maker.
Haskell: He’s a goth. Dressed up in dark. Doesn’t talk to anyone. He doesn’t understand why others write pages when he can write a couple of lines to answer the same question.
Julia: She’s the newest student here. She doesn’t have any friends yet but her secret aim is to be as popular as Python and as fast as C.
Lua: Little Johnny.
And there is ++++[++++>---<]>-.---[----->+<]>-.+++[->+++<]>++.++++++++.+++++.--------.-[--->+<]>--.+[->+++<]>+.++++++++.
I hope I didn’t gone too far! It was really fun to write
By : Udobad Mikado Edidiong
paypal loading running for 50% minimum $50 for $25 Worth BTC/LTC @anonyguy
i) Defense is more difficult than offense. For defense you have to find and close 100 doors which an attacker can use to get into the Server, For offense the attacker has to find one single way to get in.

ii) WebApplications now days have became extremely complex with new features being added on daily basis. It's almost impossible to achieve complexity and Security at the same time.

iii) Automated Scanners and Web Application Firewalls won't necessarily protect your Webapplications. As both of them do not understand Business Logic of the Application. Defense in depth principle should be followed where Security should be ensured at all layers. Independent Securtiy Researcher Rafay Baloch
Are you wondering about all the data that google stores? Are you tired of copy pasting all of your gmail's messages to add to a offline drive? Or do you want to download all files from google drive? It even includes google maps data, history, locations, bookmarks, and whatnot.
https://takeout.google.com
Google, always taking your stuff. Atleast now you know how to get it back..
Check the above picture .The paypal Vuln Going Order Order Order @anonyguy
Got together with a group of other hackers where we hacked a site using sqli
We found out the passwords in the dB were salted before hashing cos even when we shared them amongst ourselves to brute force, it took a lot of time
Then one of the guys had a brilliant suggestion
Instead of wasting time cracking the admin password, we should just change the reset email
We did that and went to forgot password
The reset link was sent to my email which we used to 'take ctrl from da admin'
Now we could deface the site but that's not what we came for anyway, so we grabbed the loot (booty) and got out if there
;)
Working in a team can speed things up
#for_teh_lulz
this is jhonny
Your PC doesn't have enough juice yo run Photoshop? Or maybe you don't have a PC to make cool Photoshop edits? Worry no more. Visit the link below to edit your photos with ease online, without the need to pay a single dollar, or a PC.

https://www.photopea.com/
Send me @romL3N your email address and I'll recommend you to get 2 free months of premium skillshare, with unlimited access to 17000+ online courses on anything. You can cancel anytime.

Alternatively, you can use my link: https://skl.sh/2G8Zj3r