• instagram
  • twitter
  • facebook
  • youtube
  • github
  • play store
  • Contact
  • YouTube Channel
  • Join Discord (Chat Here)
  • Spyboy Bot
  • Download Our Apps
    • Spyboy App
    • C Programming
    • C++ Programming
    • Java Programming
Skip to content

Spyboy blog

Learn ethical hacking , networking, social engineering, cyber security, pen-testing, linux, android, windows tricks.

  • Home
  • Tech hacks
  • Linux
  • Windows Tricks
  • Android Tricks
  • Networking
  • More
    • CEH
    • iphone
    • Programming
    • Virus Creation
    • Tweak windows
    • uncategorized
May 27, 2022 Android Tricks / Linux / Networking / Tech hacks / Windows Tricks

R4VEN – track user’s smartphone/pc ip And gps location.

The tool hosts a fake website which uses an iframe to display a legit website and, if the target allows

Continue reading

January 8, 2022 Android Tricks / Linux / Tech hacks

Use Kali linux On Android without root

Easiest way to install kali-linux on android using termux. you don’t need rooted phone. you can also use sudo (run

Continue reading

June 4, 2020 Linux / Networking / Tech hacks

How Hackers Send Fake Mail Using SETOOLKIT

The information security environment has changed vastly over the years. Now, in spite of having security policies, compliance, and infrastructure security

Continue reading

Featured

Hacking – Getting started

What is Hacking? Hacking is about identifying weaknesses and vulnerabilities of systems and gaining access to it. A Hackers gets unauthorized

Continue reading

February 19, 2023 Networking

HTTP Parameter Pollution

HTTP Parameter Pollution (HPP) is a type of web application vulnerability that affects the security of the web applications. It

Continue reading

February 18, 2023 Networking / Payloads

GraphQL Injection: A Guide to Protecting Your Applications

GraphQL is a modern and flexible query language for APIs, but with the increased usage of GraphQL, the risk of

Continue reading

February 17, 2023 Linux / Networking / Payloads / Programming

File Inclusion

File Inclusion is a type of vulnerability in web applications that allows an attacker to include or execute a remote

Continue reading

February 16, 2023 Networking / Payloads

Directory Traversal Attack: A Threat to Web Security

Directory traversal, also known as path traversal, is a type of vulnerability that allows an attacker to access files and

Continue reading

February 15, 2023 Networking / Tips

Denial of Service (DoS) Attacks Types

In today’s connected world, the availability and reliability of online services are critical for both individuals and businesses. However, these

Continue reading

February 14, 2023 Android Tricks / Linux / Networking

How to install wireless network adapter Kali Linux and on android phones.

Installing Wireless Network Adapter on Kali Linux: Kali Linux is a popular distribution for ethical hacking and penetration testing. In

Continue reading

February 13, 2023 Networking / Tips

The Art of Trapping Hackers: Honeypots

In the world of cybersecurity, trapping hackers can be a valuable tool for organizations looking to better understand the tactics

Continue reading

February 12, 2023 Android Tricks / Tips

Is there anybody hacking my phone?

Smartphones have become an integral part of our lives, and they store a significant amount of personal and sensitive information.

Continue reading

February 11, 2023 Uncategorized

Can I hire a hacker to get my account back?

No, hiring a hacker is illegal and unethical, and it can also lead to serious consequences for you. Attempting to

Continue reading

February 10, 2023 Networking

Protecting Yourself Against Man-in-the-Middle Attacks

In today’s digital world, we rely on the internet for a variety of activities, from online banking to shopping and

Continue reading

February 9, 2023 Tech hacks

What hacker attacks are you most likely to encounter?

Some common types of cyber attacks that individuals and organizations may encounter include: Phishing attacks: Attempts to steal sensitive information

Continue reading

February 8, 2023 Tips

Coding and Hacking: Understanding the Connection

What is coding in hacking? Coding in hacking refers to writing code (programming) to create and implement various hacking techniques,

Continue reading

February 7, 2023 Tips

How to use hacking in a good way?

“Hacking” is often associated with malicious activities, but there is also a positive side to it. Ethical hacking, also known

Continue reading

February 6, 2023 Tips

Hacking skills: what are they?

Hacking skills are a set of techniques used to manipulate, exploit, and compromise the security of computer systems, networks, and

Continue reading

February 5, 2023 Networking

The Parts of a Domain Name: What Are They?

A domain name is a unique name that is used to identify a website on the internet. It’s like an

Continue reading

February 4, 2023 reconnaissance

Methods of enumerating subdomains passively

Passive subdomain enumeration is a technique for identifying subdomains of a target domain without actively sending any requests to the

Continue reading

February 3, 2023 Bug Bounty

A Guide to Becoming a Bug Bounty Hunter

Becoming a bug bounty hunter involves the following steps: Gain knowledge: Learn about programming, web application security, and the basics

Continue reading

February 2, 2023 reconnaissance

Active Subdomain Enumeration

Active subdomain enumeration is the process of finding subdomains for a target domain through active reconnaissance methods, such as sending

Continue reading

January 28, 2023 Payloads

Dependency Confusion

Dependency Confusion is a vulnerability that allows attackers to exploit a weakness in the way that software dependencies are managed.

Continue reading

January 28, 2023 Networking / Payloads

DNS Rebinding

DNS rebinding is a technique used by attackers to gain unauthorized access to a target device or network by manipulating

Continue reading

January 28, 2023 Payloads

Command Injection

Command injection is a type of security vulnerability that occurs when an attacker is able to execute arbitrary commands on

Continue reading

January 14, 2023 Networking / Payloads

CSV Injection – the formula injection

CSV Injection, also known as formula injection, occurs when a malicious actor is able to inject a formula or malicious

Continue reading

December 20, 2022 Payloads / Programming / Tech hacks / Windows Tricks

fork-bomb

A fork bomb is a type of malware that can cause a computer to crash by using up all of

Continue reading

December 11, 2022 interview Questions

Top 20 Cyber Security JOB interview Questions 

What is pen testing? Penetration testing, also known as pentesting, is the practice of simulating a cyber attack on a

Continue reading

December 7, 2022 Networking / Payloads

Keylogger – log & send them to an email

Keyloggers are programs or hardware devices that track a keyboard’s activities (keys pressed). Keyloggers are spyware where users are unaware

Continue reading

December 6, 2022 Linux / Payloads

CSRF Injection: Cross-Site Request Forgery

Cross-site request forgery (CSRF), also known as XSRF, Sea Surf or Session Riding, is an attack vector that tricks a

Continue reading

November 30, 2022 Networking

Hacker Search Engines

List of Best Hacker-Friendly Search Engines General Search Engines Google Bing Yahoo! Yandex Ask Baidu You Servers Shodan – Search Engine

Continue reading

November 27, 2022 Networking / Tech hacks

GitHub user email addresses: how to find them

In this post, we will show you how to find the email address for most GitHub profiles (even if they

Continue reading

November 27, 2022 ctf-tools

CTF help

A curated list of Capture The Flag (CTF) frameworks, libraries, resources, software and tutorials. This list aims to help starters as

Continue reading

November 26, 2022 Payloads

CRLF Injection

CRLF – Carriage Return Line Feed When a browser sends a request to a web server, the web server answers

Continue reading

November 18, 2022 Payloads

Argument Injection – Vulnerabilities

Argument injection is a type of attack based on tampering with the input parameters of a page. This can enable attackers

Continue reading

November 6, 2022 Account Takeover / Payloads

Account Takeover Techniques

Account takeover attacks are on the rise, with an estimated 25% of adults in the world falling victim to this

Continue reading

November 3, 2022 Networking / Payloads

Web Sockets

The WebSocket API is an advanced technology that makes it possible to open a two-way interactive communication session between the

Continue reading

November 1, 2022 Android Tricks / Linux / Networking / Payloads / Programming / Tech hacks / Windows Tricks

Reverse Shell

A reverse shell is a type of session cyber attackers commonly use to open communication ports between their machines and the victims

Continue reading

May 27, 2022 Android Tricks / Linux / Networking / Tech hacks / Windows Tricks

R4VEN – track user’s smartphone/pc ip And gps location.

The tool hosts a fake website which uses an iframe to display a legit website and, if the target allows

Continue reading

April 24, 2022 Networking / Premium / Tech hacks

Know if your emails has been opened or not !!

March 14, 2022 Tech hacks

Read free without subscription

Bypass any paywall from website like medium.com and read free. (Paywall Removed) Works with your favorite websites EXAMPLE: this is

Continue reading

March 4, 2022 Linux / Networking

Proxychain

Proxychains is a UNIX program that allows us to mask our IP address by redirecting network traffic. It routes our

Continue reading

February 21, 2022 Tech hacks

Top 5 Mac mind mapping software to effortlessly organize your thoughts

Are you struggling with finding an idea or have several of them and don’t know where to start? This technique,

Continue reading

February 18, 2022 Programming

Install required packages automatically for a python script

it is a hard to install all the libraries one by one. Each time you have to find out the

Continue reading

February 17, 2022 Linux / Networking

Beef-XSS – Cloning websites

if you don’t already have Kali Linux you can download it here. If you are using an alternative Linux distribution

Continue reading

February 16, 2022 Linux / Networking

Reverse shell over TOR network using hidden services – Poiana

Features -> Create a hidden service -> Generate non-staged payload (python/meterpreter_reverse_http) -> Convert url using Tor2Web: a final extension .ws

Continue reading

February 15, 2022 Tech hacks

Recover an Overwritten File on Mac

#Recover overwritten files on Mac with an iCloud backup You can configure your Mac to backup files to iCloud, providing

Continue reading

February 1, 2022 Networking

Making Sure Your Cloud Solution Is Right for Your Business

Running a business can be very rewarding, but there are also lots of challenges that you have to overcome if

Continue reading

Posts navigation

1 2 3 … 14 Next Posts»
Advertisements

View our recent work on - spyboy.in

Blog Stats

  • 10,678,044 hits

Search this site

# Add Hacker's Bot Spyo - invte here

Discord Bots

# Hacker's server - chat here

Discord Server

C – Programming App

Get it on Google Play

C++ Programming App

Get it on Google Play

Java – Programming App

Get it on Google Play

Follow Us Here

  • Instagram
  • Facebook
  • YouTube
  • Google
  • Twitter
  • Discord

Subscribe to get access

Read more of this content when you subscribe today.

Subscribe
Log in

Categories

  • Account Takeover (1)
  • Android Tricks (87)
  • Bug Bounty (1)
  • CEH (9)
  • ctf-tools (1)
  • interview Questions (1)
  • iphone (3)
  • Linux (115)
  • Networking (282)
  • Notepad Tricks (38)
  • Payloads (15)
  • Pc Registry Tricks (16)
  • Premium (12)
  • Programming (100)
  • reconnaissance (2)
  • Tech hacks (277)
  • Tips (6)
  • Uncategorized (39)
  • Windows Tricks (167)
Advertisements

Recent Posts

  • HTTP Parameter Pollution February 19, 2023
  • GraphQL Injection: A Guide to Protecting Your Applications February 18, 2023
  • File Inclusion February 17, 2023
  • Directory Traversal Attack: A Threat to Web Security February 16, 2023
  • Denial of Service (DoS) Attacks Types February 15, 2023
  • How to install wireless network adapter Kali Linux and on android phones. February 14, 2023
  • The Art of Trapping Hackers: Honeypots February 13, 2023
  • Is there anybody hacking my phone? February 12, 2023
  • Can I hire a hacker to get my account back? February 11, 2023
  • Protecting Yourself Against Man-in-the-Middle Attacks February 10, 2023
  • What hacker attacks are you most likely to encounter? February 9, 2023
  • Coding and Hacking: Understanding the Connection February 8, 2023
  • How to use hacking in a good way? February 7, 2023
  • Hacking skills: what are they? February 6, 2023
  • The Parts of a Domain Name: What Are They? February 5, 2023
  • Methods of enumerating subdomains passively February 4, 2023
  • A Guide to Becoming a Bug Bounty Hunter February 3, 2023
  • Active Subdomain Enumeration February 2, 2023
  • Dependency Confusion January 28, 2023
  • DNS Rebinding January 28, 2023
  • Command Injection January 28, 2023
  • CSV Injection – the formula injection January 14, 2023
  • fork-bomb December 20, 2022
  • Top 20 Cyber Security JOB interview Questions  December 11, 2022
  • Keylogger – log & send them to an email December 7, 2022
  • CSRF Injection: Cross-Site Request Forgery December 6, 2022
  • Hacker Search Engines November 30, 2022
  • GitHub user email addresses: how to find them November 27, 2022
  • CTF help November 27, 2022
  • CRLF Injection November 26, 2022
  • Argument Injection – Vulnerabilities November 18, 2022
  • Account Takeover Techniques November 6, 2022
  • Web Sockets November 3, 2022
  • Reverse Shell November 1, 2022
  • R4VEN – track user’s smartphone/pc ip And gps location. May 27, 2022
  • Know if your emails has been opened or not !! April 24, 2022
  • Read free without subscription March 14, 2022
  • Proxychain March 4, 2022
  • Top 5 Mac mind mapping software to effortlessly organize your thoughts February 21, 2022
  • Install required packages automatically for a python script February 18, 2022
  • Beef-XSS – Cloning websites February 17, 2022
  • Reverse shell over TOR network using hidden services – Poiana February 16, 2022
  • Recover an Overwritten File on Mac February 15, 2022
  • Making Sure Your Cloud Solution Is Right for Your Business February 1, 2022
  • Kali Linux: Reset Password January 21, 2022
  • Use Kali linux On Android without root January 8, 2022
  • H1deM3 – hide messages in messages November 29, 2021
  • Doxing October 21, 2021
  • Hacking – Getting started October 19, 2021
  • Nmap – How to Use Nmap September 3, 2021
  • Website copier – clone any website September 3, 2021
  • Dnspeep – look what DNS Queries Your pc Is Making April 28, 2021
  • Use phone As Rubber Ducky Against Another phone April 28, 2021
  • 2021 – Best Ethical Hacking Tools & apps for Hackers April 28, 2021
  • ALL IN ONE Hacking Tool For Hackers April 28, 2021
  • Android PIN Bruteforce – Unlock Lockscreen PIN April 28, 2021
  • SSH for remote access on Linux February 17, 2021
  • Zint: QR codes Generator February 17, 2021
  • Open source VPN tools February 17, 2021
  • Instagram: Sites to Buy Followers February 4, 2021
  • RedRabbit : Pen-Testing & Post-Exploitation for Windows January 31, 2021
  • Zydra : Crack Password-Protected ZIP Files, PDFs & More January 29, 2021
  • Extend Context(right lick)-Menu in Windows January 26, 2021
  • Iron Man Jarvis AI Desktop Voice Assistant | in Python January 12, 2021
  • What is a Zero-Day Exploit? January 5, 2021
  • PhpSploit – post exploitation framework January 5, 2021
  • Create an Undetectable Payload,(hide the Payload) December 7, 2020
  • Create an Undetectable Payload (Bypass Antivirus) December 7, 2020
  • How to use a Router as a Wireless Adapter December 5, 2020
  • How to protect your server(website) from DDoS attacks December 5, 2020
  • DDoS attack using SlowHTTPTest (Slowloris) in Kali Linux December 5, 2020
  • Hulk DDoS : Installation & Usage with Examples December 5, 2020
  • Kali Linux Hydra Tool Example December 5, 2020
  • Top DDoS Attack Tools December 5, 2020
  • Automatically Post WordPress Posts to Discord December 5, 2020
  • Bot to fix Python indentation error December 5, 2020
  • Make a Persistent payload in Android Using Kali December 3, 2020
  • Installing Selenium and ChromeDriver on Windows December 1, 2020
  • Turn a Pen Drive into a USB Rubber Ducky November 30, 2020
  • Make A WhatsApp Spammer November 27, 2020
  • Gadgets for hacker November 21, 2020
  • Use SSH Tunnels to Forward Requests & Access Remote Routers November 15, 2020
  • How hackrs Brute-Force Almost Any Website November 15, 2020
  • Scan Web Applications for Common Vulnerabilities Using Metasploit’s WMAP November 15, 2020
  • Nikto – Scan Any Website for Vulnerabilities November 12, 2020
  • Customize your Mac terminal using figlet November 12, 2020
  • Termux !! Full Tutorial With Termux commands November 12, 2020
  • Make Cool linux Terminal Header November 12, 2020
  • How hackers Remotely access Android Using payload November 8, 2020
  • Make a Dead Man’s Switch to Delete & Encrypt Files if something happens to you October 30, 2020
  • How Hackers Break into Somebody’s Computer and Exploit the System October 19, 2020
  • Create Bootable USB with Persistence for Kali Linux October 19, 2020
  • How hackers Bypass Locked Windows Computers to Run Kali Linux from a Live USB October 19, 2020
  • Run Kali Linux on Windows without installing October 19, 2020
  • Make Your Own Evil USB October 19, 2020
  • Find Sensitive & ‘Deleted’ Files Remotely October 12, 2020
  • Capture Keystrokes & Passwords Remotely October 12, 2020
  • Remotely Record & Listen to the Microphone of a Hacked Computer October 6, 2020
  • How hackers Break into Somebody’s Computer Without a Password September 21, 2020
  • Different Types Of Hackers September 6, 2020
  • How to Manage Big Password lists September 6, 2020
  • How Hackers BruteForce Gmail, Hotmail, Twitter, Facebook & Netflix September 6, 2020
  • Google Hacking Tool – uDork September 6, 2020
  • Make All Your Internet Traffic Anonymized-TorghostNG September 4, 2020
  • Facebook Brute Forcer In Shellscript Using TOR – Facebash September 1, 2020
  • SocialBox – A Bruteforce Attack Framework (Facebook, Gmail, Instagram, Twitter) September 1, 2020
  • Instagram-Py – Simple Instagram Brute Force Script September 1, 2020
  • HiddenEye – Phishing Tool With Advanced Functionality (Support – Android) August 31, 2020
  • Stalk Your Friends social media accounts Using Image Recognition And Reverse Image Search – EagleEye August 30, 2020
  • How hackers access WiFi Passwords in Minutes – Fluxion August 23, 2020
  • Send and Receive Files Anonymously August 22, 2020
  • How to Hide a Phishing Link August 22, 2020
  • CEH – Enumeration August 14, 2020
  • CEH – Scanning August 14, 2020
  • CEH – Footprinting August 14, 2020
  • Best Websites For Free IP Lookup August 5, 2020
  • Top 10 Most Dangerous Viruses Of All Times August 5, 2020
  • Top 50+Penetration Testing Interview Questions Most August 5, 2020
  • CEH – Cryptography July 29, 2020
  • CEH – System Fundamentals July 29, 2020
  • CEH – Introduction July 29, 2020
  • CEH – Assessment Test July 24, 2020
  • Google Dorks For Bug Bounty Hunters July 24, 2020
  • [Fixed] No WiFi Adapter Found in Kali Linux July 19, 2020
  • A Web Path Scanner: DirSearch July 19, 2020
  • Best WiFi Adapter For Kali Linux in 2020 -WiFi Adapter with Monitor Mode July 18, 2020
  • How To Turn Your Android Device Into Full Functional Computer July 17, 2020
  • How to Customize the Right-click Menu on Windows 10 July 16, 2020
  • RUN CMD Commands With a Desktop Shortcut on Windows 10 July 15, 2020
  • Best Google Search Tricks & Tips July 15, 2020
  • Best Virtual Phone Number Apps For Account Verifications July 13, 2020
  • The Deep Magic: Dmitry July 12, 2020
  • Powerful Websites That Can Replace Your PC Software July 9, 2020
  • How To Install Multiple Bootable Operating Systems On One USB July 9, 2020
  • Torrent Proxy Sites List 2020 (100% Working Mirror Sites) July 9, 2020
  • Best Websites to Download Free Books July 9, 2020
  • Best CMD Commands Used By Hackers July 9, 2020
  • How To Activate the New Start Menu of Windows 10 July 9, 2020
  • Shodan — The Most Dangerous Search Engine July 8, 2020
  • Tech Behind Web Application: Whatweb July 6, 2020
  • Hide Secrets in Pictures: Steghide July 6, 2020
  • Port Forwarding using SSH July 6, 2020
  • Advanced Lazy Automated Phishing Script: ZPhisher July 5, 2020
  • How Hackers access Wi-Fi Networks: AirCrack July 4, 2020
  • Take Total Control on Android Remotely: HaxRat July 3, 2020
  • Advanced Phishing | Bypass Two Factor Authentication – Modlishka July 2, 2020
  • Trape: People Tracker On the Internet July 1, 2020
  • SpiderFoot: OSINT Reconnaissance Tool July 1, 2020
  • Recon-ng: Information Gathering with Open Source Intelligence June 30, 2020
  • How To Send Anonymous Text, Emails, Media Files using Utopia June 28, 2020

Buy Me A Coffee

Buy Me A Coffee

(^^)

500 ₹

Advertisements

like us on facebook

like us on facebook
Advertisements

Follow me on Twitter

My Tweets

Blog Stats

  • 10,678,044 hits

Enter your email address to subscribe to this blog and receive notifications of new posts by email.

Join 6,795 other subscribers

  • instagram
  • twitter
  • facebook
  • youtube
  • github
  • play store
Create a website or blog at WordPress.com
  • Follow Following
    • Spyboy blog
    • Join 2,880 other followers
    • Already have a WordPress.com account? Log in now.
    • Spyboy blog
    • Customize
    • Follow Following
    • Sign up
    • Log in
    • Report this content
    • View site in Reader
    • Manage subscriptions
    • Collapse this bar
 

Loading Comments...