Skip to main content

Posts

Check amount of Bitcoin present in an wallet

 Hello Friends in this post I gonna tell you how to find how much cryptocurrency a person have. Bitcoin is the latest Cryptocurrency which worth is too much high. Gone are the days where people are unaware how much money a person have. But in this new generation world people can check someone wallet easily without his/her permission. So I am here to show you the steps to check this- DISCLAIMER: This website DOES NOT Promote or encourage Any illegal activities , all contents provided by this website is meant for EDUCATIONAL PURPOSE only .   Copyright Disclaimer Under Section 107 of the Copyright Act 1976, allowance is made for "fair use" for purposes such as criticism, comment, news reporting, teaching, scholarship, and research. Fair use is a use permitted by copyright statute that might otherwise be infringing. Non-profit, educational or personal use tips the balance in favor of fair use. Requirements- 1. The victim bitcoin wallet address 2. Internet( Soon I will post how to

#4 H0w t0 get Leeched c0mb0

In this post we will tell how to get leeched combo. Leeched combo are very low quality combos. Chances of getting hits in this type of combos is very very less. This are generally those accounts which are leaked by someone and you are using them as combo. No worry this is for noobs who don't want to go deeper. Let me call this method 1. I will post 3 method to get combo and this is the beginning. DISCLAIMER: This website DOES NOT Promote or encourage Any illegal activities , all contents provided by this website is meant for EDUCATIONAL PURPOSE only .   Copyright Disclaimer Under Section 107 of the Copyright Act 1976, allowance is made for "fair use" for purposes such as criticism, comment, news reporting, teaching, scholarship, and research. Fair use is a use permitted by copyright statute that might otherwise be infringing. Non-profit, educational or personal use tips the balance in favor of fair use. METHOD #1- Follow the steps carefully. Requirements- 1. A good pc wit

#3 H0w to get keyw0rds(Cracking) Part-2

 So this is the 3rd post. In this we will learn how to get UHQ Keywords. No need of anything just follow my steps properly. DISCLAIMER: This website DOES NOT Promote or encourage Any illegal activities , all contents provided by this website is meant for EDUCATIONAL PURPOSE only .   Copyright Disclaimer Under Section 107 of the Copyright Act 1976, allowance is made for "fair use" for purposes such as criticism, comment, news reporting, teaching, scholarship, and research. Fair use is a use permitted by copyright statute that might otherwise be infringing. Non-profit, educational or personal use tips the balance in favor of fair use. METHOD #2 Follow the steps carefully- Steps- 1. Open google chrome and search for the word as shown below. 2. Open notepad and type one by one and save it. 3. Now as this are very less we need more. So search for it and below you can find more 4.Type them one by one on the notepad then use the other keyword and make search like search for "ho

#2 H0w to get keyw0rds(Cracking) Part-1

So this is the 2nd post. In this we will learn how to get HQ Keywords. No need of anything just follow my steps properly. DISCLAIMER: This website DOES NOT Promote or encourage Any illegal activities , all contents provided by this website is meant for EDUCATIONAL PURPOSE only .   Copyright Disclaimer Under Section 107 of the Copyright Act 1976, allowance is made for "fair use" for purposes such as criticism, comment, news reporting, teaching, scholarship, and research. Fair use is a use permitted by copyright statute that might otherwise be infringing. Non-profit, educational or personal use tips the balance in favor of fair use. METHOD #1 Follow the steps carefully:- Steps- 1. Go to  keywordtool.io 2. Enter the account word you want to crack. For hotstar type hotstar and search as shown below. 3. Click the button to select all and finally click to copy on clipboard. 4. Open a Notepad and paste by using shortcut-"Ctrl+V" and save it. 5. Your keyword file is ready.

#1 Intr0ducti0n t0 Cracking

Cracking is when someone performs a security hack for criminal or malicious reasons, and the person is called a “cracker.” Just like a bank robber cracks a safe by skillfully manipulating its lock, a cracker breaks into a computer system, program, or account with the aid of their technical wizardry. On this blog onwards will will try to crack netflix, hulu, amazon, hotstar etc. From this post onward I will teach you Cracking from Beginner to Advanced for free(80%) So cracking refers to cracking accounts here using it you can get premium accounts of any website. As this is the first post. I will tell only the basic term of cracking. If you know them scroll down and download required files. If you know everything go to second post directly. DISCLAIMER: This website DOES NOT Promote or encourage Any illegal activities , all contents provided by this website is meant for EDUCATIONAL PURPOSE only .   Copyright Disclaimer Under Section 107 of the Copyright Act 1976, allowance is made for &qu

Android: Android Hacking using Metasploit and Ngrok

How to hack an android phone using Termux with Metasploit. In this post, we are going to learn about how to hack an android phone using termux with Metasploit. You can just copy-paste the commands one by one in termux app and it will work perfectly and if you are good in entering command enter manually. NOTE: This post is only for educational purpose. I and this site do not support any criminal activity. If you are doing any sort of misuse of this information This site is not responsible for that. THIS SITE ONLY SUPPORT ETHICAL HACKING. Requirements: 1. Termux (Play store link-  click here  ) 2. Metasploit Framework.(I will create another post for it otherwise this post will be 10-20 pages more) Port Forwarding using Ngrok in termux: If you wanna use Metasploit on Local Network then you can skip this step(if you and your victim is connected to same WiFi then you can skip this step). I have already created an post regarding port forwarding but in this post we are going to port forward i