Home Blog Page 3

SHELL PHISH TOOL

What is shellphish?? Shellphish means that if we send a link and they login and login, we will...

GOOGLE DORKS

What is Google Dorking? Google Dorking is a computer hacking technique used by Google search and other Google applications to locate security...

HOW TO BROWSE DARK NET

You haven't heard of The Dark Net ... It's a platform that can buy people....... Dark...

HAKKU PENATRATION TESTING TOOL FOR ANDROID

ഈ ടൂൾ ഉപയോഗിച്ച് നിങ്ങൾക്ക് penatration ടെസ്റ്റ് നടത്താനായി സാധിക്കും 20 modules അടങ്ങിയിട്ടുള്ള ഒരു വലിയ ടൂൾ ആണ് ഇത് ഇത് ഇൻസ്റ്റാൾ...

HOW TO CREAT A WORDLIST IN TERMUX

Do you know that is WORDLIST ..... The Wordlist is a collection of passwords that require Bruitforce …

TERMUX FOR 1 ST TIME USERS

If you do TERMUX for the first time, then come I'll help you. First I...

PRANK APPS FOR HACKERS

You can be addressed as a hacker in front of you friends ….. Let's learn a few tricks to...

CREATOR OF THIS APPLICATION

ARJUN ARZ (CYBER KALLAN) Malayalam YouTuber, penatration [email protected] Pvt©...

EVIL URL

This tool is used mostly for cloning websites. Often when we use phishing, the URL that comes in will be the...

TERMUX STYLING

TERMUX MADE MORE ATTRACTIVE AS WE HAVE SEEN IN THE VIDEO ….. THIS IS TERMUX STYLING !! T-Header...

APLICATIONS

WhatsApp jammer .. how to make

Today I have come up with a trick to silence whatsapp of others All you have to do...

HIDDEN EYE

HACK MIC OF AN SMART PHONE

HOT NEWS