• instagram
  • twitter
  • facebook
  • youtube
  • github
  • play store
  • About Us
  • YouTube Channel
  • Join Discord (Chat Here)
  • Download Our Apps
    • Spyboy App
    • C Programming
    • C++ Programming
    • Java Programming
Skip to content

Spyboy blog

Learn ethical hacking , cyber security, computer programming, networking, android tricks and windows tricks.

  • Home
  • Tech hacks
  • Linux
  • Windows Tricks
  • Android Tricks
  • Networking
  • More
    • CEH
    • iphone
    • Programming
    • Virus Creation
    • Tweak windows
    • uncategorized

Category: Linux

January 5, 2021 Linux / Networking

PhpSploit – post exploitation framework

It is a post-exploitation tool capable to maintain access to a compromised web server for privilege escalation purposes. The obfuscated

Continue reading

December 7, 2020 Linux / Networking / Tech hacks

Protected: Create an Undetectable Payload,(hide the Payload)

There is no excerpt because this is a protected post.

December 7, 2020 Linux / Networking

Protected: Create an Undetectable Payload (Bypass Antivirus)

There is no excerpt because this is a protected post.

December 5, 2020 Linux / Networking

DDoS attack using SlowHTTPTest (Slowloris) in Kali Linux

Most of web administrators that doesn’t care properly about the security of the servers, are often target of attacks that

Continue reading

December 5, 2020 Linux / Networking

Hulk DDoS : Installation & Usage with Examples

HULK is a Denial of Service (DoS) tool used to attack web servers by generating unique and obfuscated traffic volumes.

Continue reading

December 5, 2020 Linux / Networking

Kali Linux Hydra Tool Example

Hydra is a pre-installed tool in Kali Linux used to brute-force username and password to different services such as ftp,

Continue reading

December 5, 2020 Linux / Networking

Top DDoS Attack Tools

DDoS stands for Distributed Denial of Service. This is a cyber-attack in which the attacker floods the victim’s servers with

Continue reading

December 3, 2020 Linux / Networking

Make a Persistent payload in Android Using Kali

We are going to show you how to make a persistent backdoor. Once you exploit some android device just do

Continue reading

November 30, 2020 Linux / Pc Registry Tricks / Tech hacks

Turn a Pen Drive into a USB Rubber Ducky

USB Rubber Ducky — a device which resembles a regular USB flash drive. When connected to a computer, it claims

Continue reading

November 21, 2020 Android Tricks / Linux / Networking / Tech hacks

Gadgets for hacker

Sometimes, during security audits, we may encounter a situation where everything is being managed correctly. In other words security patches, policies,

Continue reading

November 15, 2020 Linux / Networking

Use SSH Tunnels to Forward Requests & Access Remote Routers

Without admin privileges, installing additional software, or modifying the Windows 10 firewall, an attacker can alter a router and perform

Continue reading

November 15, 2020 Linux / Networking

How hackrs Brute-Force Almost Any Website

The tactic of brute-forcing a login, i.e., trying many passwords very quickly until the correct one is discovered, can be

Continue reading

November 15, 2020 Linux / Networking

Scan Web Applications for Common Vulnerabilities Using Metasploit’s WMAP

Having an efficient workflow is an integral part of any craft, but it’s especially important when it comes to probing

Continue reading

November 12, 2020 Linux / Networking

Nikto – Scan Any Website for Vulnerabilities

Nikto is a free software command-line vulnerability scanner that scans webservers for dangerous files/CGIs, outdated server software and other problems.

Continue reading

November 12, 2020 Linux / Networking / Programming

Termux !! Full Tutorial With Termux commands

Learn Termux for hacking !! first, understand what is Termux and follow how to install applications using Termux and the complete Termux command. In this article, I

Continue reading

November 12, 2020 Linux

Make Cool linux Terminal Header

you want your terminal to be customized with awesome script every time you fire it up, huh?! Well, look no

Continue reading

November 8, 2020 Linux / Networking

How hackers Remotely access Android Using payload

This is a tutorial explaining how to hack android phones with Kali. I can’t see any tutorials explaining this Hack/Exploit,

Continue reading

October 19, 2020 Linux / Windows Tricks

How Hackers Break into Somebody’s Computer and Exploit the System

After a hacker has configured Metasploit on a remote private server, created a resource script for automation, and created a

Continue reading

October 19, 2020 Linux / Windows Tricks

How hackers Bypass Locked Windows Computers to Run Kali Linux from a Live USB

It’s easy to run Kali Linux from a live USB on nearly any available computer, but many publicly accessible laptops and

Continue reading

October 19, 2020 Linux / Windows Tricks

Run Kali Linux on Windows without installing

Kali Linux is known as being the de facto penetration-testing Linux distribution but can be a pain to use as

Continue reading

October 12, 2020 Linux / Networking / Tech hacks / Windows Tricks

Find Sensitive & ‘Deleted’ Files Remotely

Deleted bank statements and private photos are still within an attacker’s grasp, so don’t think that emptying your recycling bin

Continue reading

October 12, 2020 Linux / Networking / Windows Tricks

Capture Keystrokes & Passwords Remotely

Using a keylogger to intercept keys pressed on an infected computer can circumvent encryption used by email and secure chat

Continue reading

October 6, 2020 Linux / Windows Tricks

Remotely Record & Listen to the Microphone of a Hacked Computer

The microphone in a Windows computer is accessible to most applications running on the device at all times and completely

Continue reading

September 21, 2020 Linux / Networking

How hackers Break into Somebody’s Computer Without a Password

A powered-off Windows 10 laptop can be compromised in less than three minutes. With just a few keystrokes, it’s possible

Continue reading

September 6, 2020 Linux / Networking / Tech hacks

How to Manage Big Password lists

In the penetration testing journey we must learn how to brute force attack. But the success of brute force attack

Continue reading

September 6, 2020 Linux / Networking

How Hackers BruteForce Gmail, Hotmail, Twitter, Facebook & Netflix

Install : pip install proxylist pip install mechanize Usage: BruteForce Gmail Attack python3 Brute_Force.py -g Account@gmail.com -l File_list python3 Brute_Force.py

Continue reading

September 6, 2020 Linux / Networking

Google Hacking Tool – uDork

uDork is a script written in Python that uses advanced Google search techniques to obtain sensitive information in files or directories, find

Continue reading

September 4, 2020 Linux / Networking

Make All Your Internet Traffic Anonymized-TorghostNG

TorghostNG is a tool that make all your internet traffic anonymized through Tor network. Rewritten from TorGhost with Python 3. TorghostNG was

Continue reading

September 1, 2020 Linux / Networking

Facebook Brute Forcer In Shellscript Using TOR – Facebash

Facebook Brute Forcer in shellscript using TOR Legal disclaimer:Usage of Facebash for attacking targets without prior mutual consent is illegal. It’s the

Continue reading

September 1, 2020 Linux / Networking

SocialBox – A Bruteforce Attack Framework (Facebook, Gmail, Instagram, Twitter)

SocialBox is a Bruteforce Attack Framework [Facebook, Gmail, Instagram,Twitter], Coded By Belahsan Ouerghi. Download Spyboy App Installation sudo apt-get install git sudo git

Continue reading

September 1, 2020 Linux / Networking

Instagram-Py – Simple Instagram Brute Force Script

Instagram-Py is a simple python script to perform basic brute force attack against Instagram , this script can bypass login limiting on wrong passwords , so basically

Continue reading

August 30, 2020 Linux / Networking

Stalk Your Friends social media accounts Using Image Recognition And Reverse Image Search – EagleEye

Stalk Your Friends. Find Their Instagram, FB And Twitter Profiles Using Image Recognition And Reverse Image Search.   This only

Continue reading

August 23, 2020 Linux / Networking

How hackers access WiFi Passwords in Minutes – Fluxion

Fluxion is a security auditing and social-engineering research tool. It is a remake of linset tool by vk496 which is not upgraded

Continue reading

August 22, 2020 Linux / Networking

How to Hide a Phishing Link

Nowadays people are smart enough. They don’t get trapped under phishing. Because the link does not look like the original

Continue reading

July 19, 2020 Linux / Networking / Uncategorized

[Fixed] No WiFi Adapter Found in Kali Linux

When we install Kali Linux on Desktop or Laptop we didn’t connect it with Wi-Fi. Sometimes internal WiFi adapter not

Continue reading

July 19, 2020 Linux / Networking

A Web Path Scanner: DirSearch

We are covering dirsearch tutorial in this post. it’s a simple command-line python based website directory/path scanner which can brute-force any targeted

Continue reading

July 18, 2020 Linux / Networking

Best WiFi Adapter For Kali Linux in 2020 -WiFi Adapter with Monitor Mode

Kali Linux WiFi Adapter The all new Kali Linux 2020 was rolling out and we can simply use it as

Continue reading

July 12, 2020 Linux / Networking

The Deep Magic: Dmitry

Deepmagic Information Gathering Tool (DMitry) is a command-line application coded in C. DMitry has the ability to gather as much as

Continue reading

July 6, 2020 Linux / Networking / Uncategorized

Tech Behind Web Application: Whatweb

It is very important to know what technology behind a web app before going against it. Like it would be

Continue reading

July 6, 2020 Linux / Programming / Tech hacks

Hide Secrets in Pictures: Steghide

Steghide is a command line stenography tool. The word stenography is combination of Greek words “Steganos” that means covered or

Continue reading

July 6, 2020 Linux / Networking / Tech hacks

Port Forwarding using SSH

Sometime we need to run our localhost website or server over internet. To do this we need to forward our

Continue reading

July 5, 2020 Linux / Networking

Advanced Lazy Automated Phishing Script: ZPhisher

ZPhisher is an advanced phishing tool-kit it is an upgraded version of Shellphish. It has the main source code from Shellphish but ZPhisher

Continue reading

July 4, 2020 Linux / Networking

How Hackers access Wi-Fi Networks: AirCrack

Aircrack is a software suite for networks, Aircrack can perform network detection, packet-sniffing and cracking WEP/WPA2. Aircrack consists of many

Continue reading

July 3, 2020 Linux / Networking / Tech hacks

Take Total Control on Android Remotely: HaxRat

HaxRat is a cloud-based remote android management suite in simple word it is an Android RAT, powered by NodeJS. It

Continue reading

Posts navigation

1 2 3 Next Posts»
Advertisements

Spyboy – App

Get it on Google Play

C – Programming App

Get it on Google Play

C++ Programming App

Get it on Google Play

Java – Programming App

Get it on Google Play

Follow Us Here

  • Instagram
  • Facebook
  • YouTube
  • Google
  • Twitter

Youtube Videos

https://www.youtube.com/watch?v=TzkL7PI9D8s

Categories

  • Android Tricks (81)
  • CEH (8)
  • iphone (3)
  • Linux (100)
  • Networking (264)
  • Notepad Tricks (38)
  • Pc Registry Tricks (16)
  • Programming (97)
  • Tech hacks (267)
  • Uncategorized (37)
  • Windows Tricks (164)
Advertisements

Recent Posts

  • SSH for remote access on Linux February 17, 2021
  • Zint: QR codes Generator February 17, 2021
  • Open source VPN tools February 17, 2021
  • Instagram: Sites to Buy Followers February 4, 2021
  • Protected: RedRabbit : Pen-Testing & Post-Exploitation for Windows January 31, 2021
  • Protected: Zydra : Crack Password-Protected ZIP Files, PDFs & More January 29, 2021
  • Extend Context(right lick)-Menu in Windows January 26, 2021
  • Iron Man Jarvis AI Desktop Voice Assistant | in Python January 12, 2021
  • What is a Zero-Day Exploit? January 5, 2021
  • PhpSploit – post exploitation framework January 5, 2021
  • Protected: Create an Undetectable Payload,(hide the Payload) December 7, 2020
  • Protected: Create an Undetectable Payload (Bypass Antivirus) December 7, 2020
  • How to use a Router as a Wireless Adapter December 5, 2020
  • How to protect your server(website) from DDoS attacks December 5, 2020
  • DDoS attack using SlowHTTPTest (Slowloris) in Kali Linux December 5, 2020
  • Hulk DDoS : Installation & Usage with Examples December 5, 2020
  • Kali Linux Hydra Tool Example December 5, 2020
  • Top DDoS Attack Tools December 5, 2020
  • Automatically Post WordPress Posts to Discord December 5, 2020
  • Bot to fix Python indentation error December 5, 2020
  • Make a Persistent payload in Android Using Kali December 3, 2020
  • Installing Selenium and ChromeDriver on Windows December 1, 2020
  • Turn a Pen Drive into a USB Rubber Ducky November 30, 2020
  • Make A WhatsApp Spammer November 27, 2020
  • Gadgets for hacker November 21, 2020
  • Use SSH Tunnels to Forward Requests & Access Remote Routers November 15, 2020
  • How hackrs Brute-Force Almost Any Website November 15, 2020
  • Scan Web Applications for Common Vulnerabilities Using Metasploit’s WMAP November 15, 2020
  • Nikto – Scan Any Website for Vulnerabilities November 12, 2020
  • Customize your Mac terminal using figlet November 12, 2020
  • Termux !! Full Tutorial With Termux commands November 12, 2020
  • Make Cool linux Terminal Header November 12, 2020
  • How hackers Remotely access Android Using payload November 8, 2020
  • Make a Dead Man’s Switch to Delete & Encrypt Files if something happens to you October 30, 2020
  • How Hackers Break into Somebody’s Computer and Exploit the System October 19, 2020
  • Create Bootable USB with Persistence for Kali Linux October 19, 2020
  • How hackers Bypass Locked Windows Computers to Run Kali Linux from a Live USB October 19, 2020
  • Run Kali Linux on Windows without installing October 19, 2020
  • Make Your Own Evil USB October 19, 2020
  • Find Sensitive & ‘Deleted’ Files Remotely October 12, 2020
  • Capture Keystrokes & Passwords Remotely October 12, 2020
  • Remotely Record & Listen to the Microphone of a Hacked Computer October 6, 2020
  • How hackers Break into Somebody’s Computer Without a Password September 21, 2020
  • Create an Undetectable Payload September 16, 2020
  • Hide Payloads(virus) Inside any Photo Metadata September 15, 2020
  • Different Types Of Hackers September 6, 2020
  • How to Manage Big Password lists September 6, 2020
  • How Hackers BruteForce Gmail, Hotmail, Twitter, Facebook & Netflix September 6, 2020
  • Google Hacking Tool – uDork September 6, 2020
  • Make All Your Internet Traffic Anonymized-TorghostNG September 4, 2020
  • Facebook Brute Forcer In Shellscript Using TOR – Facebash September 1, 2020
  • SocialBox – A Bruteforce Attack Framework (Facebook, Gmail, Instagram, Twitter) September 1, 2020
  • Instagram-Py – Simple Instagram Brute Force Script September 1, 2020
  • HiddenEye – Phishing Tool With Advanced Functionality (Support – Android) August 31, 2020
  • Stalk Your Friends social media accounts Using Image Recognition And Reverse Image Search – EagleEye August 30, 2020
  • How hackers access WiFi Passwords in Minutes – Fluxion August 23, 2020
  • Send and Receive Files Anonymously August 22, 2020
  • How to Hide a Phishing Link August 22, 2020
  • CEH – Enumeration August 14, 2020
  • CEH – Scanning August 14, 2020
  • CEH – Footprinting August 14, 2020
  • Best Websites For Free IP Lookup August 5, 2020
  • Top 10 Most Dangerous Viruses Of All Times August 5, 2020
  • Top 50+Penetration Testing Interview Questions Most August 5, 2020
  • CEH – Cryptography July 29, 2020
  • CEH – System Fundamentals July 29, 2020
  • CEH – Introduction July 29, 2020
  • CEH – Assessment Test July 24, 2020
  • Google Dorks For Bug Bounty Hunters July 24, 2020
  • [Fixed] No WiFi Adapter Found in Kali Linux July 19, 2020
  • A Web Path Scanner: DirSearch July 19, 2020
  • Best WiFi Adapter For Kali Linux in 2020 -WiFi Adapter with Monitor Mode July 18, 2020
  • How To Turn Your Android Device Into Full Functional Computer July 17, 2020
  • How to Customize the Right-click Menu on Windows 10 July 16, 2020
  • RUN CMD Commands With a Desktop Shortcut on Windows 10 July 15, 2020
  • Best Google Search Tricks & Tips July 15, 2020
  • Best Virtual Phone Number Apps For Account Verifications July 13, 2020
  • The Deep Magic: Dmitry July 12, 2020
  • Powerful Websites That Can Replace Your PC Software July 9, 2020
  • How To Install Multiple Bootable Operating Systems On One USB July 9, 2020
  • Torrent Proxy Sites List 2020 (100% Working Mirror Sites) July 9, 2020
  • Best Websites to Download Free Books July 9, 2020
  • Best CMD Commands Used By Hackers July 9, 2020
  • How To Activate the New Start Menu of Windows 10 July 9, 2020
  • Shodan — The Most Dangerous Search Engine July 8, 2020
  • Tech Behind Web Application: Whatweb July 6, 2020
  • Hide Secrets in Pictures: Steghide July 6, 2020
  • Port Forwarding using SSH July 6, 2020
  • Advanced Lazy Automated Phishing Script: ZPhisher July 5, 2020
  • How Hackers access Wi-Fi Networks: AirCrack July 4, 2020
  • Take Total Control on Android Remotely: HaxRat July 3, 2020
  • Advanced Phishing | Bypass Two Factor Authentication – Modlishka July 2, 2020
  • Trape: People Tracker On the Internet July 1, 2020
  • SpiderFoot: OSINT Reconnaissance Tool July 1, 2020
  • Recon-ng: Information Gathering with Open Source Intelligence June 30, 2020
  • How To Send Anonymous Text, Emails, Media Files using Utopia June 28, 2020
  • Find Social Media Accounts: Userrecon June 26, 2020
  • Find Social Media Profiles Using a Photo Only: Social Mapper June 26, 2020
  • Monitor Other People Image Files over Network June 25, 2020
  • How Hackers Control Front Camera of Mobile and PC: CamPhish June 24, 2020
  • Make A Private Search Engine And Secure Your Privacy June 24, 2020
  • How To Host Your Own .onion Website in Dark Web June 22, 2020
  • Host a Local Website with Domain Name on Kali Linux over WiFi June 22, 2020
  • How Hackers Can Access Android Devices Remotely Using L3MON June 22, 2020
  • Retrieve All Passwords With LaZagne Project June 19, 2020
  • DKMC – Wonderful Malicious Payload Evasion Tool June 19, 2020
  • Persistent Backdoor In Android Using Kali Linux With A Shell Script June 19, 2020
  • Hack The Box: How to get invite code June 18, 2020
  • WordPress Security Scanner – WPSeku June 18, 2020
  • SEToolkit – Credential Harvester Attack [Tutorial] June 18, 2020
  • Top Vulnerable Websites To Practice Your Skills June 17, 2020
  • How Hackers Access A Website With Ngrok, Msfvenom And Metasploit Framework June 17, 2020
  • How Hackers Phish for Social Media & Other Account Passwords with BlackEye June 16, 2020
  • How To Track Someone’s exact Geolocation Over Internet June 15, 2020
  • Ultimate Phishing Tool With Ngrok –SocialFish June 15, 2020
  • Bruteforce Password Cracking With Medusa – Kali Linux June 14, 2020
  • Shcheck – Tool To Scan Security Headers Of Any Website June 14, 2020
  • Top 5 Wireless Penetration Testing Tools June 13, 2020
  • Create Hotspot On Windows 10 In 6 Steps June 13, 2020
  • How To Secure Your Wi-Fi Network In Few Steps. June 13, 2020
  • Find Vulnerable Webcams With Shodan [Metasploit Framework] June 12, 2020
  • Change Windows Password Of Remote PC Via METASPLOIT June 10, 2020
  • SSLKILL – Forced Man In The Middle Attack – Sniff HTTPS/HTTP June 10, 2020
  • How Hackers access Wi-Fi & Networks More Easily with Lazy Script June 10, 2020
  • How Hackers access Web Browsers with BeEF to Control Webcams, Phish for Credentials & More June 9, 2020
  • Kick-Off or Limit The Speed Of Other Devices On Your Network(Wifi) June 8, 2020
  • How Hacker Access Windows 10 Using CHAOS Framework June 8, 2020
  • FREE Learning Material For All Programming Languages – GitHub June 7, 2020
  • Setup Honeypot In Kali Linux With Pentbox June 7, 2020
  • Gloom – Linux Penetration Testing Framework June 6, 2020
  • Most Popular Useful Kali Linux Hacking Tools June 6, 2020
  • How Hacker access Android Using Metasploit Without Port Forwarding Over Internet June 5, 2020
  • Disable Security Cameras on Any Wireless Network June 5, 2020
  • How Hackers Send Fake Mail Using SETOOLKIT June 4, 2020
  • Use Kismet to Watch Wi-Fi User Activity !! June 2, 2020
  • Simulate a RAT on Your Network with ShinoBOT June 2, 2020
  • Ehtools — Easy Penetration Testing Framework June 2, 2020
  • Map Vulnerable Networks using Wardrive on an Android Phone June 1, 2020
  • An Evil Twin Attack To Steal Wi-Fi Password June 1, 2020
  • LockPhish — Phishing Attack on Lock Screen May 31, 2020
  • Control Android Devices Remotely — Ghost Framework May 31, 2020
  • How hackers access Wi-Fi & Networks More Easily with Lazy Script May 30, 2020
  • How Hackers access Android Using Metasploit Over LAN/WAN May 29, 2020
  • Metasploit Framework – Hacker’s Favorite Exploitation Tool May 29, 2020
  • How Hackers Find Your IP Address to access Your Computer & How to Stop It May 29, 2020
  • SOCIAL ENGINEERING The Most Powerful Hack May 28, 2020
  • How To Find Anyone’s Private Phone Number Online May 26, 2020
  • Find Passwords in Exposed Log Files with Google Dorks May 23, 2020
  • Use Google Dorks to Find Elusive Information May 23, 2020
  • What skills do I need to be a good hacker? May 22, 2020

Buy Me A Coffee

Buy Me A Coffee

(^^)

500 ₹

Advertisements

like us on facebook

like us on facebook
Advertisements

Follow me on Twitter

My Tweets

Enter your email address to follow this blog and receive notifications of new posts by email.

Join 8,585 other followers

Blog Stats

  • 10,064,510 hits

chat with me

Follow On Instagram

How Hacker Hack Android Using Metasploit Without Port Forwarding Over Internet
(√-shit)²
PhpSploit - post exploitation framework
Iron Man Jarvis Al Desktop Voice Assistant in Python
Ran across a quote that sounded interesting...
Create an Undetectable Payload (Bypass Antivirus)
Scan Web Applications for Common Vulnerabilities Using Metasploit's WMAP
Brute-Force Almost Any Website Login
Make a Dead Man’s Switch to Delete & Encrypt Files if something happens to you
How Hachers Break into Somebody's Computer and Exploit the System.
How to track someone’s location online – with Grabify Tracking Links
How to Hide a Phishing Link
  • instagram
  • twitter
  • facebook
  • youtube
  • github
  • play store
Create a website or blog at WordPress.com
Cancel

 
Loading Comments...
Comment
    ×