Skip to main content

Check amount of Bitcoin present in an wallet

 Hello Friends in this post I gonna tell you how to find how much cryptocurrency a person have. Bitcoin is the latest Cryptocurrency which worth is too much high. Gone are the days where people are unaware how much money a person have. But in this new generation world people can check someone wallet easily without his/her permission. So I am here to show you the steps to check this- DISCLAIMER: This website DOES NOT Promote or encourage Any illegal activities , all contents provided by this website is meant for EDUCATIONAL PURPOSE only .   Copyright Disclaimer Under Section 107 of the Copyright Act 1976, allowance is made for "fair use" for purposes such as criticism, comment, news reporting, teaching, scholarship, and research. Fair use is a use permitted by copyright statute that might otherwise be infringing. Non-profit, educational or personal use tips the balance in favor of fair use. Requirements- 1. The victim bitcoin wallet address 2. Internet( Soon I will post how to

How to manually do p0rt forwarding?

 In this post we are going to discuss what is port forwarding and how to use it?

So port forwarding is a method where you can use a payload out of network. Let us assume you forward a port 80 on your ip. When the victim install your payload you will get connection through that port.

next How to do port forwarding?

There are several ways to do port forwarding. But I am going to discuss the 100% working one. You can use on any network.

DISCLAIMER: This Website DOES NOT Promote or encourage Any illegal activities , all contents provided by This website is meant for EDUCATIONAL PURPOSE only .

Copyright Disclaimer Under Section 107 of the Copyright Act 1976, allowance is made for "fair use" for purposes such as criticism, comment, news reporting, teaching, scholarship, and research. Fair use is a use permitted by copyright statute that might otherwise be infringing. Non-profit, educational or personal use tips the balance in favor of fair use.

Here are the steps:-
1. Go to https://portmap.io/ and click on register.


2.Use fake details and temp-mail.org(fake Mail) to register as shown.

Login- Use any username you want
Email- Address- Use temp mail 
Password- Your password
Confirm password-Repeat the password above.
Check mark the two boxes and fill Captcha and Register.

3. Go to the mail site(temp-mail.org). You have recieved an activation mail. Activate your account through that link.As shown below-



4. After clicking on the link you will be redirected to the config page. Click on create configuration.


5. Create config as shown below.

Name- Enter any name
Type-OpenVPN
Proto- tcp( Change udp to tcp)
Comment- Temporary (Put port on which it will be forwarded)
And finally click on generate.

Finally click on download so it will be your config file.

6. Install OpenVPN software from here-(https://openvpn.net/community-downloads/)

Choose you architecture, download and install it.

7. Now click on Create rule as shown below.

8. Click on Create New Rule

9.Change Port on PC to 80 and leave everything as usual
And click on Create

10.And you can see your rule is created.

In this  tcp://hackingart-57770.portmap.io:57770 => 80
Ip forwarded-hackingart-57770.portmap.io
Port forwarded-57770
Port forwarded to-80

11. Work on Portmap site is now over. Now time to connect the VPN

Now right click on the PC type icon and import the file you have downloaded in 5 steps

12.Finally Click on Connect as shown-


13. It will do it process and successfully connect it. BOOM - Port forwarding is done.Now you can easily hack android out of network using above mentioned ip and port.

Enjoy!!

DISCLAIMER: This Website DOES NOT Promote or encourage Any illegal activities , all contents provided by This website is meant for EDUCATIONAL PURPOSE only .

Copyright Disclaimer Under Section 107 of the Copyright Act 1976, allowance is made for "fair use" for purposes such as criticism, comment, news reporting, teaching, scholarship, and research. Fair use is a use permitted by copyright statute that might otherwise be infringing. Non-profit, educational or personal use tips the balance in favor of fair use.

Comments

Popular posts from this blog

#5 H0w t0 cr3at3 a simpl3 c0nfig (Without capture)

How to Create an simple OpenBullet Config (Without capture) In this post, we will learn how to create config’s inside of OpenBullet. The config’s we will be making today are OpenBullet . DISCLAIMER: This website DOES NOT Promote or encourage Any illegal activities , all contents provided by this website is meant for EDUCATIONAL PURPOSE only .   Copyright Disclaimer Under Section 107 of the Copyright Act 1976, allowance is made for "fair use" for purposes such as criticism, comment, news reporting, teaching, scholarship, and research. Fair use is a use permitted by copyright statute that might otherwise be infringing. Non-profit, educational or personal use tips the balance in favor of fair use. How to Create OB config Requirement- 1. Pc with internet connection 2. Opebullet software 3. A good working account of that website. 4. Patience and english knowledge to read this blog. :) Steps- 1. Go to the config tab in OpenBullet and press «New». Give a Name and author to it. (Now

Hotstar 0TP Trick(Phishing)

This post is for advance user. Who know what cracking is and what phising is?. If you don't know what phising is wait till next post. HOTSTAR OTP (TFO) BYPASS  TOOL HOTSTAR HACKING TOOL  With the help of this tool you can bypass Two Step Authentication Security   Must Use As Super User DISCLAIMER: This website DOES NOT Promote or encourage Any illegal activities , all contents provided by this website is meant for EDUCATIONAL PURPOSE only . Copyright Disclaimer Under Section 107 of the Copyright Act 1976, allowance is made for "fair use" for purposes such as criticism, comment, news reporting, teaching, scholarship, and research. Fair use is a use permitted by copyright statute that might otherwise be infringing. Non-profit, educational or personal use tips the balance in favor of fair use. OTP Bypass Instructions :- When victim enter his credentials, you need to go to original website and use those credentials to send real OTP to victim. Once he enter that OTP such OTP w

How to get Microsoft Office 365 for free

In this post we are going to discuss how to get Microsoft 365 for free. Many people were asking how to get Microsoft Office 365. So this post is for them. Follow the steps carefully to get Microsoft 365 for free. DISCLAIMER: This website DOES NOT Promote or encourage Any illegal activities , all contents provided by this website is meant for EDUCATIONAL PURPOSE only .   Copyright Disclaimer Under Section 107 of the Copyright Act 1976, allowance is made for "fair use" for purposes such as criticism, comment, news reporting, teaching, scholarship, and research. Fair use is a use permitted by copyright statute that might otherwise be infringing. Non-profit, educational or personal use tips the balance in favor of fair use. Steps 1. Connect your VPN to germany.(If you don't know visit my last post-  click here  ) 2. Go to  https://outlook.live.com/owa/  . And click Create Free account. 3. Enter any name you want to create account for as shown and click "next". 4. Cr