Posts

sdsd

Google Hacking made easy

Image
  # Search for documents on popular clouds site:drive.google.com <searchterm> site:dl.dropbox.com <searchterm> site:s3.amazonaws.com <searchterm> site:onedrive.live.com <searchterm> site:cryptome.org <searchterm>  # Admins credentials  intext:company_keyword & ext:txt | ext:sql | ext:cnf | ext:config | ext:log & intext:"admin" | intext:"root" | intext:"administrator" & intext:"password" | intext:"root" | intext:"admin" | intext:"administrator" # Look for domains indexed by others website site:bgp.he.net inurl:ndd site:dnslookup.fr inurl:ndd # Get information on the internal organization sites:cadres.apec.fr direction <SOCIETE> # Financial reports "pΓ©rimΓ¨tre de consolisation"|"rapport de rΓ©fΓ©rence"|"rapport annuel" filetype:pdf # When you use the Google Dork:  site:*.example.com, NEVER forget to check site:*.*.example.com site:*.*.*.example.

LINKEN SPHERE V7.9 [MEGA] - Professional Anti-Detect Browser

Image
Do you know that all your activities in the Internet are traced and recorded? Whether you use search engines, read emails or communicate in social media, all your activities are always in full view. The global practice of online censorship causes offline problems is a commonplace today. What is our mission? We dream of a free world with safe Internet. With a right for everyone to private life and expression of one’s own opinion without fear for one’s freedom. Here is the safest tool for anonymous Internet surfing.    It is absolute security, anonymity and freedom.                       Hundreds of new identities                         just in one click!    + Features!    + PRICE?? No! it's free* Exclusive at xstring.cc [here.]      * The software has no server or any other bindings and  is absolutely free . All maintenance and improvement activities are done solely by voluntary donations of users.         +        DOWNLOAD [MEGA] LINKE

What is Hidden Eye? and Install!

Image
What is Hidden Eye? Hidden Eye is a tool that contain a variety of online attacking tools such as Phishing, Keylogger, Information gathering, etc. Hidden Eye used to perform plenty of online attacks on user accounts. By using Hidden Eye you can have your target live information such as IP ADDRESS, Geolocation, ISP, Country, & many more. Hidden Eye Tested on Following Platforms Kali Linux – Rolling Edition Parrot OS – Rolling Edition Linux Mint – 18.3 Sylvia Ubuntu – 16.04.3 LTS MacOS High Sierra Arch Linux Manjaro XFCE Edition 17.1.12 Black Arch Userland App (For Android Users) Termux App (For Android Users) What are Prerequisites for Hidden Eye Please verify the following installed and updated before you go for installation. Python 3 PHP sudo How to Install it on Linux Step -1 git clone https://github.com/DarkSecDevelopers/HiddenEye.git Step – 2 chmod 777 HiddenEye Step – 3 sudo apt install python3-pip Step – 4 cd HiddenEye Step – 5 su

OTP SYSTEM, πŸ”“

Image
    OTP SYSTEM, A RELIABLE SECURITY MECHANISM With the advancement in technology all those working online are really facing security threat, at any moment a person can hack your website and can have an access to your data. For combating this threat TWO FACTOR AUTHENTICATION (TFA) is used widely which works by sending an OTP (ONE TIME PASSWORD ) . What is two factor authentications AND (OTP)? Two factor authentications is basically a second layer of protection after your password. When a person creates an account online, in order to secure his data he is compelled to enable two factors authentication process besides his user name and password. Now when the user log in by entering  his user name and password the website or account send an OTP(one time password) on users mobile number or through any other registered mean . When the user enter that OTP he gets access to his data, OTP usually consists of 4 to 6 digits or alphabets. . DELIVERY OF OTP TO USER? It has di

BITCOIN TRADING! πŸ’°πŸ“Š

Image
           BITCOIN TRADING As we all know that Bitcoins are decentralized crypto currency that is not regulated by any central government and it has no physical form then How to start bitcoin trading? To start with bitcoin trading you have to Open an account on bitcoin exchange and verify your identity. Deposit money in your account. Start buying or selling bitcoins HOW TO ANALYSE BITCOINS PRICE No one really can predict that what will be the bitcoin price at the next moment but there are certain methods or techniques developed by the traders to assess the situation, namely two methods which are used for such analysis are; FUNDAMENTAL ANALYSIS: In this process usually the bigger picture is taken into account, regulations related to bitcoins around the world are observed that will effect bitcoin price e.g. when china declared bitcoin illegal it really affected its value in china. TECHNICAL ANALYSIS: Technical analysis is done by studying the market b

SPOTIFY PREMIUM CRACKED + SETUP [AD free, All premium features]

Image
No more shuffle-only mode The biggest reason to upgrade if you use Spotify's mobile app on your phone is the ability to play any song you want. With the free version, you're forced to listen in shuffle mode on your phone outside of 15 on-demand playlists . With Spotify Premium on your phone, you can, for example, end an evening with Poison's Every Rose Has Its Thorn and Motley Crue's Home Sweet Home without power ballads from Warrant, Whitesnake and Cinderella ruining the moment. (Spotify's free service does not restrict you to shuffle-only mode, it should be noted, when you're using the desktop or tablet app.) Unlimited skips You can skip only so many songs when listening to a shuffled selection of songs with Spotify's free service. With Premium, you can skip as many songs as you deem necessary. Double your bit-rate pleasure Spotify Free lets you listen at normal (96 kilobits per second) or high quality (160 Kbps). Spotify Pr