Inject Payload in any file

Inject Payload in any file In this article, I will show you how to inject a payloads of .exe into other files. Hope it will bring you a useful knowledge. Hello friends…If you want to learn something, you will have to work veryhard for it. Can not learn any work easily. Computer itself is very […]

What is Metasploit?

Introduction Metasploit is one of the most powerful tools used for penetration testing. Most of its resources can be found at − www.metasploit.com. It comes in two versions: commercial and free edition. There are no major differences in the two versions, so in this tutorial, we will be mostly using the Community version (free) of Metasploit. […]

Best apps for hacking an Android mobile

I suggest you Best apps for hacking an Android mobiles In many websites and blogs you will get lots of references of many android hacking Apps, But most of them hardly works, And almost all of them have some hidden tricks to make them work. In my site I have enlisted 7 Best Free Hacking […]

Definition of ‘Trojan’

Definition: Trojan or Trojan horse is the name given to a computer virus. It is a type of computer software that is camouflaged in the form of regular software such as utilities, games and sometimes even antivirus programs. Once it runs on the computer, it causes problems like killing background system processes, deleting hard drive […]

The Truth behind Facebook Hacking Software “007 facebook hack v1.0”

Truth behind Facebook Hacking Software Are you looking for this software called “007 Facebook hack v1.0” also known as “James bond Facebook hack” that can hack your friends Facebook password in minutes? If yes then you are at the right place. According to this Software, you just need to input your friends profile id and the email id he has used […]

What is a Keylogger: A Brief on a Dangerous and Malicious Tool

What is a Keylogger What is a keylogger? At its most basic definition, a keylogger is a function which records or keystrokes on a computer. Taken at this basic level, a keylogger looks absolutely harmless. In the hands of a hacker or a cybercriminal, a keylogger is a potent tool to steal away your information. […]

Types of Computer Viruses

Types of Computer Viruses What is a Computer Virus ? A potentially damaging computer programme capable of reproducing itself causing great harm to files or other programs without permission or knowledge of the user. Types of viruses :- The different types of viruses are as follows- 1) Boot Sector Virus :- Boot sector viruses infect […]

HIDDEN WIKI DEEP WEB LINKS

HIDDEN WIKI DEEP WEB LINKS Hiddien Service lists and search engines http://3g2upl4pq6kufc4m.onion/ – DuckDuckGo Search Engine http://xmh57jrzrnw6insl.onion/ – TORCH – Tor Search Engine http://zqktlwi4fecvo6ri.onion/wiki/index.php/Main_Page – Uncensored Hidden Wiki http://32rfckwuorlf4dlv.onion/ – Onion URL Repository http://e266al32vpuorbyg.onion/bookmarks.php – Dark Nexus http://5plvrsgydwy2sgce.onion/ – Seeks Search http://2vlqpcqpjlhmd5r2.onion/ – Gateway to Freenet http://nlmymchrmnlmbnii.onion/ – Is It Up? http://kpynyvym6xqi7wz2.onion/links.html – ParaZite http://wiki5kauuihowqi5.onion/ […]

hacking dangrous virus

Creating a dangerous virus using notepad

Here I give you instructions of making a highly dangerous virus using notepad!! This virus has very very dangerous properties :- 1.Copy itself into startup 2.Copy itself over one thousand times into random spots in your computer. 3.Hide its self and all other created files 4.Task kill MSN, Norton, Windows Explorer, Limewire. 5.Swap the left […]

cracking

How to Prevent Hacking

How to Prevent Hacking 1. Do not use public WiFi/free WiFi. 2. Use data encryption settings. 3. Always keep your device/system updated. 4. Avoid visiting harmful sites. Install Avast Antivirus or any other antivirus extension in google chrome browser. 5. Avoid installing third party app. 6. Turn off Bluetooth when not in use. 7. Be […]