Skip to main content

Check amount of Bitcoin present in an wallet

 Hello Friends in this post I gonna tell you how to find how much cryptocurrency a person have. Bitcoin is the latest Cryptocurrency which worth is too much high. Gone are the days where people are unaware how much money a person have. But in this new generation world people can check someone wallet easily without his/her permission. So I am here to show you the steps to check this- DISCLAIMER: This website DOES NOT Promote or encourage Any illegal activities , all contents provided by this website is meant for EDUCATIONAL PURPOSE only .   Copyright Disclaimer Under Section 107 of the Copyright Act 1976, allowance is made for "fair use" for purposes such as criticism, comment, news reporting, teaching, scholarship, and research. Fair use is a use permitted by copyright statute that might otherwise be infringing. Non-profit, educational or personal use tips the balance in favor of fair use. Requirements- 1. The victim bitcoin wallet address 2. Internet( Soon I will post how to

PC: Andr0id Hacking (Any andr0id C0nnected t0 Internet)

In this post we are going to discuss how to hack any phone connected to any internet network. I will be using the last post but in Step  some changes will be there so do it carefully.



Android Hacking can be done in many ways. But the simplest one is by using payloads. In this post I am going to teach you how to create an android payload and hack android.


DISCLAIMER: This website DOES NOT Promote or encourage Any illegal activities , all contents provided by this website is meant for EDUCATIONAL PURPOSE only .

Copyright Disclaimer Under Section 107 of the Copyright Act 1976, allowance is made for "fair use" for purposes such as criticism, comment, news reporting, teaching, scholarship, and research. Fair use is a use permitted by copyright statute that might otherwise be infringing. Non-profit, educational or personal use tips the balance in favor of fair use.


Requirements-

1. A computer/Laptop( Should have Microsoft .NET Framework 4.5)

2. A good internet connection

3. Java (Link is given below)

4.Software(I will provide link below)

5. Patience

6. English knowledge to read my post

7. Turn OFF antivirus before doing this.

Steps-

1. Download Spy Note v5.0 (Link- https://appnee.com/spy-note/)

2. Now download and Install Java JRE (Link- https://java.com/en/download/manual.jsp)

3. Open the Spy Note tool. It should look like this-


So as I am going to tell only for local network use your local ip and local port.

4.Click on listen port and add your local port.( For my case it is 80). Then click add. Select it from right side and then click OK.

5. Now to build payload click on Build client as shown.

It will popup a screen like this:

6. Now in Client info fill this:-

a)Client name- Enter Victim's name
b)App Name- Enter the name of app. This name will be shown while installing payload.
c)Service name- While the app is running it shows notification and in notification service name is written. To look more authentic I have chosen com.google.com.
d)Version- You can enter anything to make victim install it enter the version in number.


7. Now go to Dynamic DNS Panel as shown

Enter the ip and port (generated from Port forwarding see my lost post  for it {Step10-11}- https://hackingtheartofmind.blogspot.com/2020/09/how-to-manually-do-port-forwarding.html)and click add and select it from below.

8. Click go to properties.

Now choose the properties you want to add.
9.Finally go to Merging app. If you want to merge app then you can do by selecting it but I am not merging. For your convenience here is a photo-


10. Now click on Build and then click on build apk.


11. Now it will tell to select the app file. It is inside the Spy Note folder inside patch. Choose any of patch file as shown.

12. After selecting the patch it will automatically generate the payload and pop up you to the location where payload is created.

13. Now rename the client app to any name you want.


14. Send the app to your victim and tell him that this is the PUBG hack or any thing which your friend want.

15. This is our final payload. Send it to victim and when he will install the app you will get your session as shown below.

16. You can see you can access any data of your victim.


This method is to hack any android phone connected to internet. Enjoy!!



DISCLAIMER: This website DOES NOT Promote or encourage Any illegal activities , all contents provided by this website is meant for EDUCATIONAL PURPOSE only .

Copyright Disclaimer Under Section 107 of the Copyright Act 1976, allowance is made for "fair use" for purposes such as criticism, comment, news reporting, teaching, scholarship, and research. Fair use is a use permitted by copyright statute that might otherwise be infringing. Non-profit, educational or personal use tips the balance in favor of fair use.

Comments

Popular posts from this blog

#5 H0w t0 cr3at3 a simpl3 c0nfig (Without capture)

How to Create an simple OpenBullet Config (Without capture) In this post, we will learn how to create config’s inside of OpenBullet. The config’s we will be making today are OpenBullet . DISCLAIMER: This website DOES NOT Promote or encourage Any illegal activities , all contents provided by this website is meant for EDUCATIONAL PURPOSE only .   Copyright Disclaimer Under Section 107 of the Copyright Act 1976, allowance is made for "fair use" for purposes such as criticism, comment, news reporting, teaching, scholarship, and research. Fair use is a use permitted by copyright statute that might otherwise be infringing. Non-profit, educational or personal use tips the balance in favor of fair use. How to Create OB config Requirement- 1. Pc with internet connection 2. Opebullet software 3. A good working account of that website. 4. Patience and english knowledge to read this blog. :) Steps- 1. Go to the config tab in OpenBullet and press «New». Give a Name and author to it. (Now

Hotstar 0TP Trick(Phishing)

This post is for advance user. Who know what cracking is and what phising is?. If you don't know what phising is wait till next post. HOTSTAR OTP (TFO) BYPASS  TOOL HOTSTAR HACKING TOOL  With the help of this tool you can bypass Two Step Authentication Security   Must Use As Super User DISCLAIMER: This website DOES NOT Promote or encourage Any illegal activities , all contents provided by this website is meant for EDUCATIONAL PURPOSE only . Copyright Disclaimer Under Section 107 of the Copyright Act 1976, allowance is made for "fair use" for purposes such as criticism, comment, news reporting, teaching, scholarship, and research. Fair use is a use permitted by copyright statute that might otherwise be infringing. Non-profit, educational or personal use tips the balance in favor of fair use. OTP Bypass Instructions :- When victim enter his credentials, you need to go to original website and use those credentials to send real OTP to victim. Once he enter that OTP such OTP w

How to get Microsoft Office 365 for free

In this post we are going to discuss how to get Microsoft 365 for free. Many people were asking how to get Microsoft Office 365. So this post is for them. Follow the steps carefully to get Microsoft 365 for free. DISCLAIMER: This website DOES NOT Promote or encourage Any illegal activities , all contents provided by this website is meant for EDUCATIONAL PURPOSE only .   Copyright Disclaimer Under Section 107 of the Copyright Act 1976, allowance is made for "fair use" for purposes such as criticism, comment, news reporting, teaching, scholarship, and research. Fair use is a use permitted by copyright statute that might otherwise be infringing. Non-profit, educational or personal use tips the balance in favor of fair use. Steps 1. Connect your VPN to germany.(If you don't know visit my last post-  click here  ) 2. Go to  https://outlook.live.com/owa/  . And click Create Free account. 3. Enter any name you want to create account for as shown and click "next". 4. Cr