Posts

Showing posts from November, 2017

Make a program that you can plant into someone's computer and steal all their WiFi password

#wifi #hackpassword Check out how to make a program that you can plant into someone's computer and steal all their WiFi passwords👇👇👇
1) Open notepad and write in the following;
@echo off
Echo. > passwords
Echo Type in the WiFi name
Set /p w=
Echo >> passwords Netsh wlan show profiles %w% key=clear
(NB: everything starting from "Echo >>"  to  "key=clear" are on the same line)
2) Now save this as WiFi. bat and place it in a folder of your choice (must be empty for easy use)
3) Now run the program you made above and you should be prompted to type in the WiFi's name of the WiFi you want to get the password from (batch files are case sensitive) then hit enter
4) Cong's!!! Now you have a text document named password and if you did everything correctly you should get a long description, now head down to the settings section and search for the key section, there you will get the key

How to create a bootable flash drive?

To create a bootable USB flash driveInsert a USB flash drive into a running computer.Open a Command Prompt window as an administrator.Type diskpart.In the new command line window that opens, to determine the USB flash drive number or drive letter, at the command prompt, type list disk, and then click ENTER. The list disk command displays all the disks on the computer. Note the drive number or drive letter of the USB flash drive.At the command prompt, type select disk <X>, where X is the drive number or drive letter of the USB flash drive, and then click ENTER.Type clean, and the click ENTER. This command deletes all data from the USB flash drive.To create a new primary partition on the USB flash drive, type create part pri, and then click ENTER.To select the partition that you just created, type select part 1, and then click ENTER.To format the partition, type format fs=ntfs quick, and then click ENTER. ImportantIf your server platform supports Unified Extensible Firmware Inter…

HOW TO CREATE A HACKING PENDRIVE THAT CAN STEAL PASSWORDS FROM VICTIMS

*HOW TO CREATE A HACKING PENDRIVE THAT CAN STEAL PASSWORDS FROM VICTIMS*
In this tutorial as Steal Passwords I am going to show you that how to make a Portable Hacking device with a Pendrive that can hack most of the online passwords from victims computer and with the help of this program you can also help your friends and relatives to recover their forgotten passwords or you can say as Steal Passwords, Yes you heard it right after following this tutorial you can hack like a pro and the tutorial is very easy.HACKING PENDRIVE THAT CAN STEAL PASSWORDS FROM VICTIMS COMPUTERTHINGS YOU NEED:
1. Pen Drive
2. Computer/Laptop
3. Web Browser Pass View(Download)Step 1: Download Web Browser Pass views Zip file
Step 2: Insert your Pendrive to your Computer and then Quick Format It as NTFSStep 3: Create a New Folder in your Pendrive and name the folder as “USB” and then Extract the Web Browser Passview zip file into the USB folder.Step 4: Open a Notepad and then copy the things written below and t…

How to use WPA WPS tester?

*This is a tutorial on how to use WPA WPS tester*,```What you'll need first?```--> Clean install of WPS WPA tester
--> Rooted device(optional)-----------------------------------WPA WPS tester works on both rooted and non-rooted devices.If you've root privileges then you can see the password of the wifi otherwise it'll just connect to the network and won't show you password.Now let's start the tutorial,Step 1:- Install and open the appStep 2:- Tap on Scan button on the right of WPA icon -- Then it'll show you available networks -- If you see a green lock at the right side of the network, then it can be probably hackedStep 3:- Tap on the network you want to hack -- If you see  *Probably Compatible* then there are 60% chances that the network can be hacked-- If you see *Probably Not Compatible* then there are 40% chances that the network can be hacked Step 4:- Tap on *CONNECT AUTOMATIC PIM* --If your device is not rooted then it'll start connection using…

Steps to Hack Wifi

Steps to Hack Wifi password using cmd:
1: Open command prompt by going to start and click on run command or enter windows+r, then type cmd and hit Enter
2: In command prompt window, typenetsh wlan show network mode=bssid
3: This command will show all the available WiFi network in your area
4: This is the last step. Just type:netsh wlan connect name=(wifi name )netsh wlan connect name=Mynet Sata1 and you will be connected to that WiFi network.
5: To disconnect it, typenetsh wlan disconnect

MTN FREE BROWSING AND DOWNLOAD.

MTN FREE BROWSING AND DOWNLOAD.
-PC version*Disclaimer:*
_THIS IS FOR_ _EDUCATIONAL PUROSE_ _ONLY._
_CARE MUST BE TAKEN_ _WHEN USING_Requirements:
-modemCreate New APN :
google.com
Or
internet
, save and connect to the internetWith your regular internet data,
Download *psiphon 3*
Click *CONNECT* , wait to see it indicate *CONNECTED* in green color.
You are ready to browse for free.NOTE : Browsing speed my differ
HOW TO SETUP UP IDM TO ALLOW DOWNLOAD.> goto *Settings(Options)*
> *Proxy/Socks*
> click *Get from IE*
> click *OK*NOTE : Download speed depends on the Automatically selected IP by Psiphon

How to hack whatsapp?

Hacking Whatsapp..!
Part 1: How to Hack Someone's WhatsApp with Mac Address of the Target Phone
The first method on how to hack someone’s WhatsApp is by using the target phone's MAC address. In this method, we will need the MAC address of the target phone, the
BusyBox app, as well as the Terminal emulator . You can download both the BusyBox and the Terminal emulator from the Google Play Store. With these three necessities at hand, we can now proceed.
1: Using your smartphone, download, install, and run the BusyBox app. You will be required to create an account.
2: Take the target smartphone and obtain its MAC address. Follow these steps to get the MAC address “Settings> About Phone> Status> MAC Address. Write this address down as you are going to need it.
TIP: Please note that we must first spoof the MAC address of the target phone. To do so, we are going to use the Terminal app.
3: Launch the Terminal App and type $ su. Press "Enter".
4: In the next step, e…

How to  find direct download link for any movies, search “[movie name] –inurl:(htm|html|php|pls|txt) intitle:index.of “last modified” (mkv|mp4|avi)”.

Eg: avengers 2 -inurl:(htm|html|php|pls|txt) intitle:index.of “last modified” (mkv|mp4|avi)If you want to find music for your phone or computer, just change the last part (mkv|mp4|avi) to (mp3|wma|aac|flac). Now you an find any type of files from just typing your file format like rar, pdf, jpg, png, doc, and iso etc.

What is RFID?

Image
Radio-frequency identification (RFID) uses electromagnetic fields to automatically identify and track tags attached to objects. The tags contain electronically stored information.
       A (RFID) system is made up of two parts:
                       * a tag                         * a reader. 
RFID tags  are embedded with a transmitter and a receiver. The RFID component on the tags have two parts: a microchip that stores and processes information, and an antenna to receive and transmit a signal. The tag contains the specific serial number for one specific object.

To read the information encoded on a tag, a two-way radio transmitter-receiver called reader emits a signal to the tag using an antenna. The tag responds with the information written in its memory bank.

There are two types of RFID tags: passive and active. A Passive RFID tag will use the reader’s radio wave energy to relay its stored information back to the reader. A Active RFID tag is embedded with a small battery that pow…