Posts

Showing posts from October, 2019

160*600

Create free UNLIMITED phone numbers [No TextNow or TextPlus] Works for FB, IG, Twitter.. Step 1. Go to Twilio . Com Step 2. Click on “Get free API key” Step 3. Sign up with a disposable o real email, enter fake contact details if you want. Step 4. Receive confirmation email and verify. Step 5. Verify a number, I think you can put a TextNow number but I recommend putting yours because you can reuse it if you want to make another account. Step 5. It will ask you if you can code, just say yes. Step 6. Then, it will ask you why are you using Twilio for, choose “Send and receive sms” Step 6. Choose JavaScript as your programming language. Step 7. Get a trial number. Step 8. Input your trial number on FB phone verification. Important Step: To see your messages go to the top right corner of your screen, and you will see a bug Icon, click on it and then “Go to debugger” https://imgur.com/gallery/0yUvWAG Then you will see the events like this https://imgur.com/gallery/AdxU6W6 Now click the mos
Image
How_To_Became_A_Great_hacker ? 1. Learn TCP/IP, Basic Information gathering, Proxies, Socks, SSL, VPN, VPS, RDP, FTP, POP3, SMTP, Telnet, SSH. 2. Learn Linux, Unix, Windows - You can do this using vmware or any virtual desktop utility. 3. Learn a programming language that's compatible with all OS - Perl, Python, C, ASM 4. Learn HTML, PHP, Javascript, ASP, XML, SQL, XSS, SQLI, RFI, LFI 5. Learn Reverse engineering and crack some programs for serials easy ones like mirc, winzip, winrar or old games. 6. Code a fuzzer for common protocols - ftp, pop3, 80, 8080 - Pick some free software like ftp server, mail server, apache or iis webserver or a webserver all-in-one pack, or teamspeak, ventrilo, mumble. 7. Code a tool that uses grep to sort out unique code in source codes. 8. Make a custom IPtable, IPsec firewall that blocks all incoming traffic and out going traffic and add filters to accept certain ports that your software or scripts use. 9. Pick a kernel in linux or unix, also pic
Image
HOW TO HACK WIFI HOW TO HACK WIFI     So Hi guys Now this tutorial gonna cover a most awaited and wanted topic Hacking A WiFi Network Yeah hacking a WiFi network is considered as one of the most wanted hacks of all the time this tutorial gonna cover it in complete detail SO lets start guys! For this tutorial you need Kali Linux or Parrot Sec OS or even Ubuntu will work You can get Kali Linux from kali.org and i am gonna use that in this tutorial So first of all we need to update our linux distro by typing this command apt update && apt upgrade -y If you are doing it in a VM or in a enviornment in which you cant connect to wifi or if your network card does not support packet injection than you need to buy a new one you can check by googling that either your card will work for wifi hacking or not The good choice is  this  you can get this for a cheap price So after the setup connect your wifi adapter with pc and than start the tutorial now type the
Image
🔰 Check If Your Email Is Hacked 🔰 This Guide Will Help U If Your Email And Pswd Leaked Or Hacked.. Steps :- Step 1 - Go To https://haveibeenpwned.com/ Step 2 - In The Mail Section, Put Your Email.. Then Click "Pwned" Important - If U Get A Red warning, Thts Means Your Email Has Already Hacked/Leaked.. If U Got Green Warning, That's Means Your Email Still Private And Not Leaked/Hacked How To Fix Leaking Of Email:- 1. Enable Two Steps Verification(Recommended) 2. If Find Your Mail Leaked, Go Directly Chng Pswd From Showed Websites 3. Always Use Strong Password.. And Always Use Different Pswd On Different Sites.. These Methods U Can Opt For Being Secure And Never Got Hacked..
Image
Google Chrome to start blocking mixed content by default gradually    Google Chrome’s stance on websites that haven’t fully migrated to HTTPS is said to get tougher. It will be blocking mixed content by default gradually starting with Chrome 79. The context Google’s developer page defines mixed content as, “Mixed content occurs when initial HTML is loaded over a secure HTTPS connection, but other resources (such as images, videos, stylesheets, scripts) are loaded over an insecure HTTP connection.” Browsers have been overlooking the problem of mixed content in the recent past, as long as the main domain was loaded in HTTPS. Google already displays a ‘Not Secure’ indicator on form fields loaded over HTTP. Also, browser downloads via HTTP are blocked, even if the website is loaded via HTTPS. Why it matters Using resources that load via HTTP weakens the security of HTTPS. This is because HTTP requests are vulnerable to man-in-the-middle attacks that