Posts

How to recover deleted image or video from android (internal storage) without root ?

STEP 1: DOWNLOAD AND INSTALL JIHOSOFT ANDROID PHONE RECOVERY AT YOUR COMPUTER. You could download the Windows version (Android Recovery , Mac version Android Recovery for Mac .) After download, you will be lead to install the app at your computer. STEP 2: SELECT DATA GENRE THAT YOU NEED TO SCAN After installation, run the app at your PC. You will see the interface show you four options: “Mul”, “Database”, “WhatsApp”, “All”. Tap One of it according to your own demand. STEP 3: IDENTIFY ANDROID PHONE OR TABLET BY COMPUTER. First, connect your android device to computer via USB cable. Then, turn on USB debugging at android equipment. If the app failed to identify your equipment, install related USB driver at your computer. STEP 4: SCAN ANDROID DEVICE AND EXPECT THE RESULT After identification, click "Start" for scanning. Please be patient about the process. STEP 5: PREVIEW DATA THAT LISTED ON THE RESULT. You will be able to review all the details o

​​HOW TO UNBLOCK YOURSELF ON WHATSAPP IF SOMEONE BLOCKS YOU

Step 1: Write down your blocker’s phone number If you have the contact that blocked you saved on your phone, write it down somewhere and delete it from your phone. Step 2: Back up your chats I believe you already know how to back up your WhatsApp chat (both messages and media files). Well, if you don’t then here is a quick guide to creating a Google Drive backup: ✔️ Open WhatsApp. Go to Menu Button > Settings > Chats > Chat backup. ✔️ Tap Back up to Google Drive and set up the backup frequency to your liking. ✔️ You will be prompted to select a Google account that you will back up your chat history to. If you do not have a Google account, tap Add account when prompted. Please remember the Google account you are using for the backup. ✔️ Tap Back up over to choose the network you wish to use for backup. Please note that backing up over cellular may result in additional data charges. Step 3: Delete your WhatsApp account ✔️ Go to account settings o

How to Capture & Exfiltrate Screenshots Remotely

Screenshots taken from a compromised computer can provide hackers with access to private emails, photographs, and information found in sensitive documents. This data can be used by the attackers to build profiles of a target for social engineering attacks and blackmail or even just to release the information out in the wild. While getting a backdoor established on a target computer is no easy task, once a hacker has done so, he or she can perform a variety of covert attacks. They could easily steal saved Chrome and Firefox passwords, capture all of the keystrokes typed in by the user, listen to audio through the computer's microphone, and more. In this guide, we'll cover how attackers can capture screenshots of a compromised computer remotely and exfiltrate them into their hands. Once a hacker creates the payload and exploits the target system, in our case, a Windows 10 system, they can use Metasploit to start their post-exploitation of screenshots. It's helpful to a

Folder Lock With Password Without Any Software

Image
if EXIST "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}" goto UNLOCK if NOT EXIST Locker goto MDLOCKER :CONFIRM echo Are you sure u want to Lock the folder(Y/N) set/p "cho=>" if %cho%==Y goto LOCK if %cho%==y goto LOCK if %cho%==n goto END if %cho%==N goto END echo Invalid choice. goto CONFIRM :LOCK ren Locker "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}" attrib +h +s "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}" echo Folder locked goto End :UNLOCK echo Enter password to Unlock folder set/p "pass=>" if NOT %pass%== type your password here goto FAIL attrib -h -s "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}" ren "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}" Locker echo Folder Unlocked successfully goto End :FAIL echo Invalid password goto end :MDLOCKER md Locker echo Locker created successfully goto End :End Paste the code given above

Hacking Facebook or Instagram

Requirements 1.Live internet connection 2.Phone,computer STEPS ๐Ÿ”ท  Launched your web browser and Open this website Click here to proceed to shadow wave ๐Ÿ”นBeing a new user click on sign up.Fill the form Now select sign up and wait for the page to load ๐Ÿ”ท Now select any of the option available: Facebook profile Facebook app Now create your page and fill ๐Ÿ”ท After filling the form select create and  select click here ๐Ÿ”ท  Copy the link and send it to your victim ⚠️ Make a smart link human hacking ๐Ÿ˜Š Eg. click on this link login into your Facebook account and get 500 likes on your photo After sending links  you wait to get a victim if someone falls in the trap.

How to keep your internet traffic safe and secret

Image
​​Option #1 Tor The Onion Router (Tor) is a specially designed Internet routing system that routes traffic while encrypting the IP address of where it came from. To enable routing, only the last and next IP addresses are available at each hop. The original and all other hops along the way are encrypted and can only be decrypted by a Tor router. Tor can evade detection from nearly everyone except the most powerful state-owned surveillance machines. Even then, the NSA has some challenges in breaking Tor, but they have and still can. In general, Tor is safe for most traffic, but if someone or some agency wants to spend the time and resources to watch you, they can and will. You can access the Tor network by using the Tor browser, which is simply a plug-in to the open-source browser Firefox. ​​Option #2 Proxies Using proxies is a tried and true method of obscuring your identity on the Internet. Although your traffic is not encrypted and can be sniffed, the traffic ca

How to Recover WiFi Password On Android (Without Root)

Image
1. First of all, you need to install this application WIFI WPS WPA TESTER in your android (recommended). 2. Now simply launch the app from app drawer and you will see app will start scanning all the wifi networks around you. 3. Now you will see the list wifi networks the application found. Now the only thing you to do here is checking the color of the right side lock if the lock is green colored that means the wifi is hackable and if red then it’s not. 4. Now when you get the network with green lock sign at right then simply tap on that network. 5. Now an info popup will appear and there simply click on connect option. 6. Now on the next popup, you will have two option Root or No root. Now simply select the NO ROOT method there. 7. Now on the next popup, you will see a list of Pin which will help to get into the wifi networks, choose one of them and select Connect(root) option. 8. Now pin attack will start and it will take some seconds to complete. 9. If the PIN e