Wednesday, 11 December 2019
Wifi Tools - Ehtools Framework
Wi-Fi tools keep getting more and more accessible to beginners, and the Ehtools Framework
is a framework of serious penetration tools that can be explored easily from within it. This
powerful and simple tool can be used for everything from installing new add-ons to grabbing
a WPA handshake in a matter of seconds. Plus, it's easy to install, set up, and utilize.
Download from here :- http://gestyy.com/w6zU4y
Saturday, 7 December 2019
Wednesday, 20 November 2019
Sherlock - Find usernames across social networks
Sherlock - Find usernames across social networks
Sherlock - Find usernames across social networks
Download from here :- https://github.com/sherlock-project/s...
DISCLAIMER
THIS CHANNEL DOES NOT
PROMOTE OR ENCOURAGE ANY
ILLEGAL ACTIVITIES.
ALL CONTENT PROVIDED BY
THIS CHANNEL IS MEANT FOR
EDUCATIONAL PURPOSE ONLY.
Friday, 23 August 2019
Sunday, 18 August 2019
Saturday, 10 August 2019
Friday, 9 August 2019
Wednesday, 7 August 2019
Thursday, 1 August 2019
Sunday, 7 July 2019
Friday, 5 July 2019
Thursday, 27 June 2019
Facebook Hidden Phone Numbers
Facebook Hidden Phone Numbers
Facebook is a giant social network king with millions of users. Almost everyone is familiar about Facebook. Lets jump to the main thing I will be not wasting your time if you don't understand watch the video below. Every time we create Facebook account it asks us to fill a form to join Facebook. The form contains the Phone number and email id every Facebook id has own email and phone number. Facebook is good in collecting data there is no privacy it doesn't exist. Facebook is free have you ever questioned yourself how they make money? They make money by selling your data e-commerce sites. You search for product in google you will get the same advertisement in Facebook. Amazon Flipkart Shopclues pay Facebook for showing these ads to boost their sales. Lets go back to our topic How to get Hidden Facebook phone Numbers and Email id. For this you have to download a tool called FBI Available on GitHub.( FBI ===>>> Download)
Note:- This tutorial is only for educational purpose use this with your own risk the Author or the Channel is not Responsible for any misuse. After you run this tool you will get the list of all the hidden Facebook phone number and email id. To be safe always create a separate email id for personal and for professional use. Disposable email and phone numbers can be used to prevent this. Android apps like 2nd line provides this type of services. Never ever share your private data to anyone or to upload any sensitive data that can be used to harm you in future.
A Question??
Just a general Question Many girls are sending NUDES on Facebook. If a hacker or any person gets your personal data what they can do we can't even imagine. What you guys this think what we can do to prevent this. Comment below your thoughts on this... This will only work best on Linux distributions tested on Kali Linux and parrot-sec. How to Install FBI$ apt update && apt upgrade
$ apt install git python2
$ git clone https://github.com/xHak9x/fbi.git
$ cd fbi
Setup
$ pip2 install -r requirements.txt
$ python2 fbi.py
Hidden Eye Kali Linux Tutorial
Hidden Eye Kali Linux Tutorial | Most Advanced Phishing Tool
How are you all today we will be discussing about Hidden Eye. It is the most advanced phishing tool on the internet today. It has more than 30 templates including Gmail, Facebook, Instagram etc. This Phishing tool is best compatible with Linux operating systems. The best result one can get is in Kali Linux. Some who doesn't know about phishing let me explain. So what is phishing? In simple terms phishing means replicating or duplicating a website. For example creating a fake Facebook page and and send that fake Facebook link to the victim. If the victim opens that link and enters his username and password. When he logins he will be automatically redirected to the original Facebook page. Thus giving you the access to his account the username and password will be stored in the page that you have set. Download Hidden Eye Here :- Hidden Eye
How to Install Hidden Eye? And run Full tutorial and guide in the video below.
Follow the Above tutorial if you have any questions or idea which you would like to share just comment below. Tip :- How you can know a page is fake or someone is Phishing you? Just look a the URL bar of your browser the URL will be different. For example Facebook original page url will like https://facebook.com. A fake page will be like http://Faceboook.com or http://Focebook.com something different read your URL carefully before doing a banking transaction. Share if you Like be safe.
GNOME vs KDE
GNOME vs KDE Comparison Kali Linux
Hello guys how are you all? Today i will be comparing two desktop environments. One is KDE and other GNOME. I have been using Kali Linux for more then a year. This comparison will be based on my needs and wants your must be different. A quick comparison between GNOME vs KDE.
What is Desktop Environment?
This is nothing but how your desktop will look the folders icons font styles menus etc. Speed is also depends upon the Desktop environment not much but the software launch time. It depends how it is customized.
GNOME v/s KDE
GNOME is a clean and simple environment most of the hackers and pentesters prefer GNOME over KDE the reason behind is GNOME is clean and simple Desktop Environment. Whereas KDE gives you good feel and looks but there are some disadvantages of using KDE. The truth is it lags and secondly you have to customize it to work with.
If you are a person who wants fancy and stylish look on Desktop go for KDE my personal choice is GNOME clear and simple.
Below is the ScreenShot of.
GNOME
KDE
For beginners i will recommend you to go with GNOME it is simple and easy to use. All files are in one place easy to access tools and software's.
Using different Environment not only look but also some tools are changed for example screen recorder in kali linux you will get different in these two and in KDE you also get the benefit of Software center.
So whats your choice which Desktop environment do you like comment below. To get some clear picture of these two desktop environment i have uploaded a video down just go through the GNOME vs KDE video. You will get to know better about these two widely used desktop environments.
Any doubts and Questions Comment Below.
Android as keyboard and Mouse
Using Android as keyboard and Mouse
Use your old android phone as wireless keyboard and mouse. Here is a quick guide how you can use your android as keyboard and mouse.
Requirements
1.Working Windows pc
2. Any android phone
Lets start first you have to download a app for your android and install it on your phone. Download mouse server and install it on your windows computer. Link below direct download it from google drive.
Download from here Android Mouse And Keyboard
After Successfully Installing both the software on your android and pc. Enable hotspot from your phone turn on WiFi from your computer and connect to your hotspot. After that run mouse server as administrator in windows pc. And open the android app in your phone you will get name of your pc or desktop just click on it and enjoy.
Now you can able to control your pc with android phone within WiFi range. To make it more simpler i have uploaded a step by step guide on YouTube you can refer that video and understand it in better way.
If you like this post then subscribe our channel cybertwist on youtube. If you have any questions the comment below.
Kali Linux in Android
Kali Linux in Android phone without root access
In this tutorial i will be showing you how you can install Kali Linux in your android phone without root access. Android is the used by most of as you can turn your phone into a hacking machine.
Requirement
Android phone Working internet connection How to install?- Download Termux from the play store.
- Download Andronix from play store.
- Download VNC from play store.
Step 1.
Open Termux and type apt-get update and hit enter.
Now type apt-get upgrade and hit enter if its asks for confirmation then type y and hit enter.
Step 2.
Open andronix and select the Kali Linux icon and click on first copy button. The code will be copied open termux and paste it and hit enter. After the process completed type in termux command ls it will list all the file you will see a kali linux file. just use this command and hit enter ( ./Kali-start.sh) after ./ symbol add name of the file which is listed and hit enter.
Again open Andronix and copy desktop environment LXDE MATE etc. of your choice click on it after copying the code paste the code back on termux and hit enter.
Step 3.
After completing above step type vncserver-start in termux and hit enter. After that open vnc in your phone click on add button in the address bar type 127.0.0.1:5901 and name anything and click on connect your kali linux will start.
if you have not subscribed to our YouTube channel please subscribe to find out our new videos on hacking you may also like to read how to become a hacker. If you have any questions comment below or have any suggestion be free comment below.
To make it easier watch the video below how to install kali linux in android in below video.
Kali Linux Tools Top 5 on Github
Top 5 Kali Linux Tools
Today i will
show you top 5 kali linux tools which is available on github to
download. This tools are personally selected by me and are not installed
in kali Linux in default. This tools are categorized on the basis of
popularity which are used by most of the hackers. This list will be
different you have seen in many sites they start with metasploit, Nmap,
sqlmap etc. Same thing repeated in all other sites but this tools i will
be categorizing will not be available on Kali Linux preinstalled. Lets
begin our top 5 kali linux tools.
Top Kali Linux tools
1. HiddenEye
:- HiddenEye is the most advance phishing tool developed by DarkSec it
has more then 30 templates including famous social networks sites like
Gmail, Facebook, Instagram, Twitter, etc. And in advance it has
integrated with Ngrok so you can send phishing link worldwide on
Internet. What this tool do? This tools creates a fake site for you for
example Facebook if you create fake Facebook site and send it to the
victim if the victim opens that site and enters its credentials the
username and password it will be automatically redirected to the
original site and you will get his credentials.
2. BeeLogger :- BeeLogger it is in number two position in our list as the name gives us a hint logger which will log all the details to us BeeLogger is a keylogger. What this tool do? This tool is used to hack windows devices or windows computer it will generate a PDF or microsoft word document and sent it to the victim if the victim opens that file you will get the all the information what he types. It records all the keystrokes from the keyboard and mails to your gmail account.
3. Fluxion :-
Fluxion is the wifi hacking tool currently the best tool i will suggest
you to hack WPA2 networks. What Fluxion does? Fluxion will scan all the
available WiFi for you. Select the network you want to hack. Then
Fluxion will automatically block that WiFi and create a Fake access
point from the same name. When the victims computer disconnects from the
WiFi he will automatically connect to the fake WiFi that fluxion has
created. Thinking that it is the victims WiFi the victim will connect to
the fake WiFi the fluxion will pop up dialog box saying enter your
password for upgrade. When the victim enter his WiFi Fluxion will show
you the password.
4. FBI ( Facebook account Information)
:- This tools helps you to gather information from Facebook this tool
helps you to get all Facebook phone numbers and email id
of the user.
5. Lazy Kali
:- As the name suggests lazy this script helps you to automatically run
the tools and download hacking tools automatically
without typing any command.
How to become a hacker?
How to become a hacker? Wonder how you can do it.
Hello guys cybertwist here today i will tell you how you can become a hacker. A quick guide for becoming a hacker being a hacker or becoming a hacker is not a easy task it requires lot of patience and hard work and time and mainly creativity and will power to achieve your task. If you follow my tutorial i guarantee you that you can achieve your goal.Who is a Hacker?
A person who uses a computer in a different manner. That a normal user can’t do for example a normal user want to use a WiFi he cant use unless he has password. In same situation the hacker will try to bypass the security or use his skill to get password. He can hack your social accounts bank etc. This skill are not genetic one can achieve it by hard work and practice.
Types of Hacker
In this community there are three types of hacker. categorized in 3 types.
1. White hat Hacker :- This people are like angels they help people and protect their account and privacy. This people hack with full authority to hack. To recover password trace criminals and help company to strengthen their security.
2. Black Hat Hackers :- They criminals they hack for money and commit crime. They jack bank accounts black mail people online and get away without getting caught.
3.Grey Hat Hackers :- This type of people hack for fun. They hack for getting some thrill and experience they are not white hat or black Hat. They have their own purpose to Hack.
What type of Hacker you want to become. Choose wisely the path is not Easy.
Kinds of Hacker.
Elite Hackers :- This are professional Hackers they know how to code and they don’t depend upon others for programs. They make their own program and execute.Intermediate Hackers :- They are in process of learning and know how what is going on behind a process.
Script Kiddies :- They don’t know what is going on they just use programs develop by other programmers.
Now you got an idea how it is And how it works.
Requirements For Becoming A Hacker
- The most important is learn programming without it you will not able to program. if you are beginner go for C programming. Easy to learn and core of all languages. good start for becoming a hacker.
- Networking without it you will not know what is going on and how to execute your program. Learn TCP/IP.
- Learn different operating system go for Linux.If you are beginner use Linux mint or go for kali linux it has set of different hacking tools in built.
- The last and least requirement is patience without it you cant succeed just learn practice and repeat.
Now you have got an idea what you want to do just read different e-books programming languages. Use different operating system.if you want to ask any questions comment below. You can make a career in this just don’t stop hard work pays. Just follow your goal and you will become a hacker have patience.
Monday, 21 January 2019
spynote download
spynote download free
SpyNote is a light weight Android remote administration tool (RAT) to hack into a smartphone device remotely. It gives you the power to establish control over android devices with an easy to use GUI and all the features you need to monitor them. Build a custom APK or bind the payload to an already existing APK such as a game or social media app. After the great introduction of spynote v3.2 and spynote v4, a newer version is available. Download spynote v5 full version free of cost.
FEATURES:
- Bind your server APK with any other Game or App.
- Explore Files with full access.
- Read/Write Messages.
- Make a call, record a call and browse call logs.
- Read and write contact list.
- Capture photos and videos.
- Listen live conversation through mic, record mic sound live.
- Check browser history.
- Get GPS Location.
- Check installed apps.
- Get phone’s information (IMEI, WIFI MAC, PHONE CARRIER).
- Fun Panel (Show messages, shake the phone etc)
As the version upgrades, the features of Spy Note become increasingly powerful, and bring more serious harm to victims. Although Spy Note now seems to have no large-scale use by hackers around the world, today anyone can download it for free means its extensive use may be just a matter of time.
Download spynote from here
SpyNote is an Android remote access trojan (RAT) that was leaked on malware discussion forums in mid-2016. It is similar to Android RATs OmniRAT and DroidJack. SpyNote has the ability to update itself, download and install new apps, view SMS messages, access the phone’s last GPS location, listen to and record audio from the device’s microphone, access the video camera, listen to calls, make calls, retrieve contact lists, and access technical details such as the device IMEI number, WiFi MAC address, and carrier details.
You may also like whatsapp hacking tool.
whatsapp hacking tool
Top whatsapp hacking tools
- Whatscan
Whatscan is a whatsapp scanner app for android. You just have to scan the QR code of your friend or Girlfriends phone. Whatscan is the best whatsapp hacking tool for android.
About whatscan
Turn your mobile phone into a powerful QR code reader and scanner by downloading WhatScan, an app made for fast and effortless scanning. From now on, you can redeem all the discounts you want and save some money. You can even do that while messaging your friends. Using the WhatScan Web App, you can use your phone as a scanner and chat with your friends.
The scanning process is fairly simple. What’s great about it is that it is lightning-fast, and it can read QR codes even if they’re blurry.
To start scanning, activate the app, hover the camera right above the item you wish to process and wait until it provides you with the information you need. After it decodes, you get a set of commands to choose from. You will have the option to search a website, get to know a certain product, or see the raw data. WhatScan keeps previous records so users can browse through them if needed.
Download whatscan whatsapp hacking tool from here
2. SpyNote
SpyNote is a light weight Android remote administration tool (RAT) to hack into a smartphone device remotely. It gives you the power to establish control over android devices with an easy to use GUI and all the features you need to monitor them. Build a custom APK or bind the payload to an already existing APK such as a game or social media app. After the great introduction of spynote v3.2 and spynote v4, a newer version is available. Download spynote v5 full version free of cost.
FEATURES:
- Bind your server APK with any other Game or App.
- Explore Files with full access.
- Read/Write Messages.
- Make a call, record a call and browse call logs.
- Read and write contact list.
- Capture photos and videos.
- Listen live conversation through mic, record mic sound live.
- Check browser history.
- Get GPS Location.
- Check installed apps.
- Get phone’s information (IMEI, WIFI MAC, PHONE CARRIER).
- Fun Panel (Show messages, shake the phone etc)
As the version upgrades, the features of Spy Note become increasingly powerful, and bring more serious harm to victims. Although Spy Note now seems to have no large-scale use by hackers around the world, today anyone can download it for free means its extensive use may be just a matter of time.
Download spynote from here
3. MetaSploit
The Metasploit Project is a computer security project that provides information about security vulnerabilities and aids in penetration testing and IDS signature development.
Its best-known sub-project is the open-source Metasploit Framework, a tool for developing and executing exploit code against a remote target machine. Other important sub-projects include the Opcode Database, shellcode archive and related research.
The Metasploit Project is well known for its anti-forensic and evasion tools, some of which are built into the Metasploit Framework. It can be used to take full control of phone as can be used as whatsapp hacking tool in linux.
Metasploit is built in Kali linux.
Subscribe to:
Posts (Atom)