Category Archives: Hacking Tricks

cybersecurity exam | Vulnerability assessment

Cybersecurity is a term that means to protect online or offline assets from certain threats. In order to pass your cybersecurity exam many things, you have to clear in your mind. Cybersecurity: It is a practice to protect digital assets from digital attacks. Digital assets include systems, networks, and programs. Vulnerability: Vulnerability means weaknesses in… Read More »

How To Be 100% Anonymous In 2018

How To Be 100% Anonymous In 2018 Hello Hacking World Members! In this thread, I will be talking about ways to be anonymous from my knowledge! This thread will help a lot of you noobs! You can put all these ways together at once and you will be like 98% anonymous while hacking and doing… Read More »

Abbreviation of some hacking terms

Abbreviation of some hacking terms   Are you new to the realm of hacking? Do you feel dumb when you don’t know the meaning of a certain term? Well, then this will certainly help you out! If you are ever unsure about anything, simply scroll down and find that specific word, then read the definition.… Read More »

hacking terms

List of terms used in the field of hacking. Following are the list of hacking terms: Adware − Adware is software designed to force pre-chosen ads to display on your system. Attack − An attack is an action that is done on a system to get its access and extract sensitive data. Backdoor − A… Read More »

How to Unlock the Micro SD/Memory Card

How to Unlock the Micro SD/Memory Card In this article, I will show you that how to Unlock the Micro SD/Memory card. So I have listed below all the steps so follow all the steps below If you have any problem then you can comment below.    STEPS Following are the steps to remove password from… Read More »

Basic commands of Termux

Basic Commands Of Termux   Module-2 {Command : Function } cd: used to change directory cd / : change to root directory cd..: change current directory to parent directory cd-: move one directory back from where you are now cp -r : used to copy any directory [including hidden files] cp -f : force copy… Read More »

What is Termux?

What is Termux? #Termux Module-1 Termux combines powerful terminal emulation with an extensive Linux package collection. • Enjoy the bash and zsh shells. • Edit files with nano and vim. • Access servers over ssh. • Develop in C with clang, make and gdb. • Use the python console as a pocket calculator. • Check… Read More »

Advance commands in Termux

Advance commands in Termux #Termux   {Command : Function} apt search [qurey] : to search any package locate [query] : find all path names contains a pharse du : display directory space usage df : display disk usage. cal : To display calender whoami : it shows your login name uname -a : used to… Read More »

How to become a Hacker

How to become a Hacker Hacking is an engaging field but it is surely not easy. To become a hacker one has to have an attitude and curiosity for learning and adopting new skills. You must have a deep knowledge of computer systems, programming languages, operating systems and the journey of learning goes on and… Read More »

How To Remove Write Protection From Any Pendrive Or Memory Card

How To Remove Write Protection From Any Pendrive Or Memory Card..?? METHOD #1 Open Registry editor of your PC For this you should type command “regedit” on run. Successively navigate to following linkHKEYLOCALMACHINE\SYSTEM\Currentcontrolset\control\storatedevicepolicies( Note: if you can’t find ” storatedevicepolicies ” after “control” folder then you need to create it. For that follow instructions mentioned… Read More »

HOW TO RECOVER DELETED MESSAGES ON ANDROID

HOW TO RECOVER DELETED MESSAGES ON ANDROID Following are the steps to recover deleted messages of your Android Step 1. First of all in your windows PC download and install the tool Android Data Recovery. Step 2. Now you have to enable USB debugging in your android for that you have to go to Settings ->… Read More »

What is MAC address spoofing?

  What is MAC address spoofing? The device that you’re looking at right now has a network interface controller (NIC), the thing that’s responsible for allowing you to connect to a network, like an internet. All devices capable of networking (smartphones, laptops, routers) have one of these. Each NIC is assigned a unique hard-coded MAC… Read More »

How To Change User Password 

How To Change User Password 1. cmd ( Run as Administrator ) A. Write this on Cmd –> net user <USER> <PASSWORD> * Example: net user admin * ( whatever u write is hidden ) 〰〰〰〰〰〰〰〰〰 2. Computer Management –> Local Users And Groups A. Type this in Run = ” lusrmgr.msc ” B. Users… Read More »

How To Remove Shortcut Virus From Your Pc

How To Remove Shortcut Virus From Your Pc  Method 1. – Clean up and remove Shortcut Virus by CMD – 1. Click on Start and select Run; 2. Type: CMD and Hit Enter to open Command Prompt; 3. Type the drive letter of your hard drive partition in PC or USB flash drive and hit… Read More »

Who are black hat hackers?

Who are black hat hackers? BLACK HAT HACKERS Like all hackers, black hat hackers usually have extensive knowledge about breaking into computer networks and bypassing security protocols. They are also responsible for writing malware, which is a method used to gain access to these systems. Their primary motivation is usually for personal or financial gain,… Read More »

How do Hackers Hack your Passwords?

How do Hackers Hack your Passwords? Here are some ways that hackers use to hack your passwords Many of you might have been victims hackers taking over your Facebook, Gmail or other email accounts. Some of you may have lost some money to hackers after they took hacked your credit card information. Most of the… Read More »

How To Be 100% Anonymous In 2018

How To Be 100% Anonymous In 2018 Hello Ethical  Hacking World Members! In this thread, I will be talking about ways to be anonymous from my knowledge! This thread will help a lot of you noobs! You can put all these ways together at once and you will be like 98% anonymous while hacking and… Read More »

Download Ethical hacking Tools

Download Ethical Hacking Tools Ethical hacking tools have the 84MB size you can it easily if you have any problem with downloading you can contact me or comment below I am happy to reply you   Download Now