Posts

Backdoor to Reset Administrator Password or Add New User in Windows

Image
Backdoor to Reset Administrator Password or Add New User in Windows As long as there is physical access to a computer, it is always possible to gain access to the operating system even if it is password protected. For example, you can use   Kon-Boot   to login to any user account in Windows with any password by booting up the computer with the CD or USB. If BIOS is secured with a password to prevent changing of boot order, you can change the jumpers or remove the battery from the motherboard to clear the CMOS settings. As long as you can boot up the computer with CD or USB, there are quite a lot of tools that allows you to reset the user account password even if you don’t know the original password. Here is an interesting method which I recently discovered that allows you to plant a backdoor to your Windows 7 operating system so that you can always reset or even add a new user account without even first logging in to Windows. This method is a bit restrictive because ...

Hema

  Saptiya enna panra good night

CRYPTO JACKING

CRYPTO JACKING Before getting into it... ill say u something... we all know hacking happening in our daily life and safety measures are taken... between we still feel like, • what these hackers can hack in my mobile or pc ! nothing i have...just some movies and images , softwares games.. if u wanna hack ..hack and take this useless stuffs.. we feel like this ☝🏼 But, This CRYPTOJACKING attack is not like that... The hackers who executing these type of attacks... doesn't need any of our data... they don't need any credentials... they don't need our bank acnts...they don't target business man's or big money ppls... they target normal ppls... BUT WHY !? and for what !! Lets see what is crypto jacking... crypto jacking means a type of attack.. they run some type of malware in our pc and start mining crypto currencies.. what is crypto currency !!? crypto currency mean online money... it creates in online by way called mining... while its generating...
Reasons for getting banned by whatsapp Reasons for getting banned by whatsapp 1.Sending too many messages to unknown users could get you on their bad list. Spamming, which is mostly encountered by many users today, is usually done by marketing teams. With numerous messages being sent out to unknown people by spammers. If you are one of those who keeps sending messages that are not related or important enough to an unknown recipient, you could enter the list for being banned. 2.Being blocked by many people is another cause of concern. Related to spamming, you could also end up being blocked by people who don’t have you on the contact list. Sending irrelevant messages or alike could get you blocked, and if you are blocked by too many people over a short period of time, could put your record on the ban list. 3.Creating too many groups is also an issue. Though you could create as many groups as you want, make sure you add people into the group who have you in their address b...

How to get 100% anonymity

⚠️How To Get 100% Anonymity   You can put all these ways together at once and you will be like 98% anonymous while hacking and doing blackhat activity... 1. VPN that DOES NOT keep any logs! I think MullVad VPN is best as it doesn't keep logs and its very cheap and fast! Can't beat that... A VPN will make sure your secure while hacking online. It hides your IP address and makes sure you can't be tracked. But a VPN isn't the ONLY thing you should use while blackhat hacking or trying to protect yourself. You should use other tools too to remain 99.9%! I recommend only buying a VPN with Bitcoin so the payment cant be traced. 2. Proxychains on a linux system like kali linux or Tails You should use proxychains to stay anonymous with everything else added too. you can get proxys by scraping or grabbing them. I highly recommend buying like a list of 25 "PRIVATE" socks5 proxy servers. Private ones don't keep logs but if you get free ones that do keep logs then only...

Protecting Against DDoS

Check your internet connection Protecting Against DDoS👇 The goal of any DDoS attack is to overwhelm a service to the point where it no longer works. While DDoS has historically been just an annoyance, there is usually a financial impact, such as lost sales or a spike in bandwidth costs. Cloud-hosted services, which charge by usage, are especially financially vulnerable to an onslaught of traffic. DDoS attacks use large numbers of computers simultaneously targeting a single service. The attack often comes from botnets, which are composed of PCs infected by a virus. Recently, DDoS has been used by political protesters, who crowdsource attackers through downloadable software. Older DoS attacks like SYN floods used limited numbers of attackers, so it was possible to use automatic per-client rate-limiting, or to block the IPs. Modern DDoS techniques try to avoid large amounts of traffic per attacker, and rely purely on large numbers. Many sites may think they’re too small to attract attent...

how to hack a a shopping website database and extract credit card informations of their Customers!

we will learn how to hack a a shopping website database and extract credit card informations of their Customers! Things required: Havij 1.16 ProSQLi-DBCarding Dorks(CLICK)Vulnerable Sites  How to find vulnerable sites? To find vulnerable sites, you need to use the SQLi-DB and the carding dorks. Copy one of the dorks and paste it in SQLi-DB Set up the setting and click on the "scan" button Once you the scanning starts, the result will be shown in the textboxt as below Click on Vulnerable to filter the result and only show the vulnerable results Exploiting and dumping data Now, you need to run Havij as administrator and follow the steps below Paste the vulnerable site in the  target TextBox on Havij and click AnalyzeOnce the process finished, you will see something (databse) on your Havij log boxClick on Tables>Get Tables and you will see all the tables that are in the database Now, look for a table named "Orders" or something similar. Tick the table and click on G...

HOW TO FIX ‘APPLICATION NOT INSTALLED’ ERROR ON ANDROID

👉HOW TO FIX ‘APPLICATION NOT INSTALLED’ ERROR ON ANDROID PHONES👈 ✌️A time comes when we try to install an Android app and we see the error “Application not installed”. This is very common with apk files downloaded from the wild. No matter how you try, you still get the same app not installed error. What could be the cause of this? We shall explore the common causes and possible solutions to this issue: Possible/Common causes of “Application not Installed” error 👎Insufficient storage space: Your storage space may have filled up with no more space to accommodate new apps. 👉👉Corrupted app or apk file: This is most common with apps downloaded from outside Google Play Store. The app is either corrupted or incompletely downloaded or copied as the case maybe. 👉Incorrect app install location: Some apps are meant to be only installed on phone memory while some others can be installed on both phone memory and SD card. Trying do otherwise with the former can bring up this errors. 👉Installa...

Hack Android using androrat

🤘HACKING A SMARTPHONE REMOTELY? ❤️REQUIREMENTS: Following are the requirements to get started. 🔥Java Installed PC 🔥AndroRat (Remote Administration Tool) 🔥Dynamic IP (noip.com host) 🔥DUC (noip.com client) 🔥Victim 🌟STEPS FOR HACKING A SMARTPHONE REMOTELY 🔥Download and install JAVA from Oracle official website. 💥Download AndroRat 💥Now we need a dynamic host/IP. Simply go to noip.com and sign up. After signup click on Add Host and enter any name for your host and click Save Host. 💥After creating host, download DUC . Now we need to port forward from our router’s settings. For this we need to know our gateway IP. Simply go to Command Prompt and type ipconfig. It will give your gateway IP. 💥Open up the browser and paste your gateway IP and hit enter. It’ll prompt for username and password. You can find username and password under your router. By default it’s admin for username and password. As you give username and password, you’ll see router settings page. Navigate to Port Forwar...
Image
Step 1: Go to https://free.nordvpn.com Use any of the following tempmail providers (More will get added): https://www.mohmal.com/en https://www.temp-mails.com/Email https://www.emailondeck.com Step 2: Copy an email from any of the above providers Step 3: Insert the email you got here: http://prntscr.com/jsmfz6 Step 4: Click on "Get Free Trial", and then "Send activation link" Then just following the instruction in the email you got from NordVPN and just rinse and repeat for free NordVPN accounts!   You have to repeat ever 3 days     Bypass url shoetners     For bypassing url shorteners and automatically progressing, do these steps.   1) Download the extension Tampermonkey on either Chrome or Firefox 2) Go to this website: adsbypasser.github.io 3) Install the elite version script (its free) and there you go.   Now you can visit any annoying shorte .st or any other url shortener and the script will bypass the time that you had to wait before   For t...