Skip to main content

Posts

Password cracking techniques

✨There are a number of techniques that can be used to crack passwords. We will describe the most commonly used ones below ; 🌀Dictionary attack – This method involves the use of a wordlist to compare against user passwords. 🌀Brute force attack – This method is similar to the dictionary attack. Brute force attacks use algorithms that combine alpha-numeric characters and symbols to come up with passwords for the attack. For example, a password of the value “password” can also be tried as p@$$word using the brute force attack. 🌀Rainbow table attack – This method uses pre-computed hashes. Let’s assume that we have a database which stores passwords as md5 hashes. We can create another database that has md5 hashes of commonly used passwords. We can then compare the password hash we have against the stored hashes in the database. If a match is found, then we have the password. 🌀Guess – As the name suggests, this method involves guessing. Passwords such as qwerty, password, admi

How to unsubscribe all your YouTube Channels with just a single click

 🔰 🔰 ➖➖➖➖➖➖➖➖➖➖➖➖ [You can only do this with a pc ] 1⃣ https://www.youtube.com/feed/channels Click or type this link in your web browser   (in pc only) 2⃣ Right click on the page  and click on inspect and go to console section 3⃣ copy and paste this code 👇 Code: var i = 0; var count = document.querySelectorAll("ytd-channel-renderer:not(.ytd-item-section-renderer)"); myTimer(); function myTimer () {     if (count == 0) return;     el = document.querySelector('.ytd-subscribe-button-renderer');     el.click();     setTimeout(function () {         var unSubBtn = document.getElementById("confirm-button").click();         i++;         count--;         console.log(i + " unsubscribed");         console.log(count + " remaining");         setTimeout(function () {             el = document.querySelector("ytd-channel-renderer");             el.parentNode.removeChild(el);             myTimer();         }, 250);     }, 250); } 4. Now Hit E

HOW TO GET OLD TO NEW EARPHONE 100% Free

 🔰 Hy, there i am human i will teach you how to get free earphones . Everyone has old broken earphone at Thier cuboird  make it clean and ready so let,s start our tut🤛🤜 1.  Go to Flipkart or Amazon  2. Select earphone you want 3. Order it 4. After product received. call thier customer care and say Hey sir the product i received recently is not working only one side bud is coming pls return it ,thnku. 5. Take the new product box and fit old earphone 6. Delivery boy will come and take old earphone  7. Boom enjoy. That,s 100 working trick Tips As i suggest order from.flipkart for good performance And make sure that your new earphone match like old earphone little bit not compalsary.

ᴄᴏᴅɪɴɢ | ʜᴏᴡ ᴛᴏ ᴍᴀᴋᴇ ᴀ ᴘʏᴛʜᴏɴ ʜᴏsᴛ ᴄʜᴇᴄᴋᴇʀ ғᴏʀ ʟɪɴᴜx

 📕 ᴄᴏᴅɪɴɢ ɪs ᴛʜᴇ ᴇᴀsʏ ᴘᴀʀᴛ. ʙᴇɢɪɴ ғʀᴏᴍ ɪᴍᴘᴏʀᴛɪɴɢ sʏs ᴀɴᴅ sᴏᴄᴋᴇᴛ, ᴛʜᴇɴ, ᴡʀɪᴛᴇ ᴛʜᴇ ғᴏʟʟᴏᴡɪɴɢ ᴄᴏᴅᴇ: import os # Importing main libs import sys start = "" # Setting up variables range1 = 0 range2 = 0   for carg in sys.argv: # Checking for arguments     if carg == "-s":         argnum = sys.argv.index(carg)         argnum += 1 start = sys.argv[argnum]     elif carg == "-r1":         argnum = sys.argv.index(carg)         argnum += 1         range1r = sys.argv[argnum]         range1 = int(range1r)     elif carg == "-r2":         argnum = sys.argv.index(carg)         argnum += 1         range2r = sys.argv[argnum]         range2 = int(range2r)   print ("[*] Host Scanner launched!") # Informs user about initialize   if start == "": # Checks if all the information is provided     print ("[E] No host provided") elif range1 == 0:     print ("[E] No range1 provided") elif range2 == 0:     print ("[E] No range2 prov

How to open .onion links without onion browser (Tor)

 How to open .onion links without onion browser(Tor)?⚠️ You all know about onion extension and to open them you are required to install onion browser also called tor. But did you know that you can open them in your normal browser.  Yeah! It's true here are the steps you need to follow and open your desired site without tor. 🔺Method 1 - Using Onion.ws Gateway Change your website extension to .onion.ws Why? & how ! replacing .onion with .onion.ws in your browsers url bar, press go and you will be redirected to that darknet site without the need to download or configure any new software such as Tor and I2P. 🔺Method 2 - Using .onion chrome plugin/extension. #Open Google Chrome and then go to your settings #You will have to open chrome web store and download a plugin called "OnionLink .onion plugin" Now you can easily surf onion links without any external browser. 🔺Method 3 - Using Tor2web gateway Whenever you see a URL like http://duskgytldkxiuqc6.onion/, that's a

How to watch Amazone Prime videos without any payment

 Create unlimited Prime Video access  Create your own private amazon prime video account. 1. Open amazon.co.uk/ (No vpn Req) IP: India  2. create an account normally (No Tempmails) 3. now go in menu in left corner and click try prime 4. you will see option to sign up for 30 days trial click on it 5. Now enter card information  6. Open new tab and enter namso-gen.com 7.  Enter *529750* in blank arrow and click anywhere it will appear like this.  BIN:- 529750xxxxxxxxxx 8. now click on generate cards in bottom 9. Copy any of the card details and put in amazon sign up trial nd click next 10. Enter any fake information of india and click on sign up it will show u some error but click on try now pay later,you can add your address that's not a problem 11.Now,U got the amazon prime account. 12.Now, enable 2FA/2SV,After making that it won't ask otp your device anymore. Note:- To change and  watch videos in india just open primevideo.com in desktop mode in mobile  and enter information.

HOW TO HACK FACEBOOK ACCOUNTS USING KEYLOGGER

HOW TO HACK FACEBOOK ACCOUNTS USING KEYLOGGER STEP 1: Create Server for Hacking Passwords First of all, for hacking any Facebook account password, we have to create our keylogger server that will run on the victim’s machine, capturing his keystrokes and emailing us the record. The keylogger server building process consists of several steps: 1. First of all download the Keylogger and a good binder. Binders are easily available via a Google search.  2. Extract the RAR file. Now you will get one folder and three files. 3. Open the Keylogger file. Here you will need a gmail ID and password. For safer use, create a fake Gmail account. 4. Click on server settings as shown. Here, enter the time at which you want to receive reports; it’s always preferable to use a 20 minute timer for receiving files. Click on the Output box to choose the location of the file and give it a name. We recommend using a system process name to make it undetectable, like svchost, or check any process name

Anandu Aman

Anandu Aman

എന്താണ് OneAd അപ്ലിക്കേഷൻ: പണം സമ്പാദിക്കാനുള്ള നല്ലൊരു പ്ലാറ്റ്ഫോമാണോ ഇത്?

കുറച്ച് പണം സമ്പാദിക്കാനുള്ള വഴി നൽകുമെന്ന് അവകാശപ്പെടുന്ന മറ്റൊരു ഓൺലൈൻ പ്രോഗ്രാം അവലോകനം ചെയ്യാൻ ഇന്ത്യൻ ഓൺ‌ലൈൻ ഇൻ‌കം ടീം തയ്യാറായിക്കഴിഞ്ഞു. ഈ പോസ്റ്റിൽ, ഞങ്ങൾ “OneAd അപ്ലിക്കേഷൻ” അവലോകനം ചെയ്യാൻ പോകുന്നു. OneAd- ന്റെ ബിസിനസ്സ് മോഡലും നിയമസാധുതയും ഞങ്ങൾ ചർച്ച ചെയ്യും. ഞങ്ങൾ അവലോകനത്തെ പോയിന്റുകളായി വിഭജിച്ചു- *യഥാർത്ഥത്തിൽ എന്താണ് OneAd? *ഉടമസ്ഥാവകാശ വിശദാംശങ്ങൾ *ഇത് നിയമാനുസൃതമാണോ അതോ അഴിമതിയാണോ? *ഞങ്ങളുടെ ശുപാർശ OneAd അപ്ലിക്കേഷൻ എന്താണ്? ഫാഷൻ, യാത്ര അല്ലെങ്കിൽ മറ്റ് തരത്തിലുള്ള ഓൺലൈൻ ഷോപ്പിംഗ് അല്ലെങ്കിൽ സേവനങ്ങൾക്കായി തത്സമയ ഓഫറുകളും ഡിസ്കൗണ്ട് കൂപ്പണുകളും നൽകുന്ന ഒരു Android അപ്ലിക്കേഷനാണ് OneAd. 1 2 3 4 മുമ്പത്തെ അടുത്തത് മൾട്ടി ലെവൽ മാർക്കറ്റിംഗ് രീതിയും OneAd ഉപയോഗിക്കുന്നു. ഈ അപ്ലിക്കേഷനിൽ 10 ലെവൽ ഡീപ് റഫറൽ പ്രോഗ്രാം ഉണ്ട്. ഓരോ തവണയും ഒരു ഉപയോക്താവ് മറ്റൊരാളിലേക്ക് അപ്ലിക്കേഷൻ റഫർ ചെയ്യുമ്പോൾ അത് ഒരു ചെയിൻ സിസ്റ്റം (പിരമിഡ് സിസ്റ്റം) ആരംഭിക്കുന്നു, ഓരോ റഫറലും റഫറലിന്റെ റഫറലും ഉപയോക്താവിന്റെ വരുമാനം 10 ലെവലുകൾ വരെ വർദ്ധിപ്പിക്കുന്നു. ഇത് നിയമാനുസൃതമാണോ?