• instagram
  • twitter
  • facebook
  • youtube
  • github
  • play store
  • About Us
  • YouTube Channel
  • Join Discord (Chat Here)
  • Download Our Apps
    • Spyboy App
    • C Programming
    • C++ Programming
    • Java Programming
Skip to content

Spyboy blog

Learn ethical hacking , cyber security, computer programming, networking, android tricks and windows tricks.

  • Home
  • Tech hacks
  • Linux
  • Windows Tricks
  • Android Tricks
  • Networking
  • More
    • CEH
    • iphone
    • Programming
    • Virus Creation
    • Tweak windows
    • uncategorized

Category: Tech hacks

May 31, 2020 Linux / Tech hacks

LockPhish — Phishing Attack on Lock Screen

LockPhish is the first phishing tool that can grab Windows credentials, Android PIN and iPhone Passcode using an https link.

Continue reading

May 31, 2020 Linux / Tech hacks

Control Android Devices Remotely — Ghost Framework

Ghost Framework is an Android post-exploitation framework that uses an Android Debug Bridge to remotely access and control Android device. Ghost Framework gives

Continue reading

May 30, 2020 Linux / Tech hacks

Hack Wi-Fi & Networks More Easily with Lazy Script

Wi-Fi tools keep getting more and more accessible to beginners, and the LAZY script is a framework of serious penetration

Continue reading

May 29, 2020 Linux / Tech hacks

How Hackers Hack Android Using Metasploit Over LAN/WAN

In this article, we’ll be discussing about the exploitation of Android devices such as Tablets/Phones/Emulators etc using one of the

Continue reading

May 29, 2020 Linux / Tech hacks

Metasploit Framework – Hacker’s Favorite Exploitation Tool

The Metasploit Project is a computer security project that provides information about security vulnerabilities and aids in penetration testing and

Continue reading

May 29, 2020 Linux / Tech hacks

How Hackers Find Your IP Address to Hack Your Computer & How to Stop It

Your IP (Internet Protocol) address is your unique ID on the internet. It’s synonymous with your home address. Anyone in the

Continue reading

May 28, 2020 Linux / Tech hacks

SOCIAL ENGINEERING The Most Powerful Hack

The Social-Engineer Toolkit (SET) is an open-source penetration testing framework designed for social engineering. SET has a number of custom attack vectors

Continue reading

May 26, 2020 Networking / Tech hacks

How To Find Anyone’s Private Phone Number Online

Facebook really wants your phone number, nagging you for one as soon as you join. This isn’t all bad since it

Continue reading

May 24, 2020 Networking / Tech hacks

Find Information from a Phone Number

Phone numbers often contain clues to the owner’s identity and can bring up a lot of data during an OSINT

Continue reading

May 23, 2020 Networking / Tech hacks

Find Passwords in Exposed Log Files with Google Dorks

You may not have thought of dorks as powerful, but with the right dorks, you can hack devices just by

Continue reading

May 23, 2020 Networking / Tech hacks

Use Google Dorks to Find Elusive Information

Google is an incredibly useful database of indexed websites, but querying Google doesn’t search for what you type literally. The

Continue reading

May 22, 2020 Tech hacks

What skills do I need to be a good hacker?

Many of my aspiring hackers have written to me asking the same thing. “What skills do I need to be

Continue reading

May 22, 2020 Networking / Tech hacks

How to track someone’s location online – with Grabify Tracking Links

To track someone with Grabify, you first pick a link that would be natural to send. Then, you disguise the

Continue reading

May 21, 2020 Linux / Networking / Tech hacks

Gain Complete Control of Any Android Phone with the AhMyth RAT

There are more than 2 billion Android devices active each month, any of which can be hacked with the use of a

Continue reading

May 17, 2020 Tech hacks / Windows Tricks

How to Hide Data in Audio Files

You know, Mr Robot is my favourite TV show this year, and not just for realistic hacking. Rami Malek, the

Continue reading

May 16, 2020 Linux / Tech hacks

Hunt Down Social Media Accounts by Usernames with Sherlock

When researching a person using open source intelligence, the goal is to find clues that tie information about a target

Continue reading

May 15, 2020 Linux / Tech hacks

Top 10 Things to Do After Installing Kali Linux

Kali Linux, by default, probably doesn’t have everything you need to get you through day-to-day penetration testing with ease. With

Continue reading

May 15, 2020 Tech hacks / Windows Tricks

How Windows Can Be a Hacking Platform

As most of you know, I am a strong advocate for using Linux as a hacking platform. In fact, I would

Continue reading

May 14, 2020 Tech hacks / Windows Tricks

How to Create a Virtual Hacking Lab

Many of you here are new to hacking. If so, I strongly recommend that each of you set up a “laboratory”

Continue reading

May 14, 2020 Android Tricks / Tech hacks

How To Install TWRP On Android Without A Pc

TWRP is the premiere custom recovery for Android because of how many devices it supports and how simple it is

Continue reading

May 13, 2020 Tech hacks / Windows Tricks

Windows CMD Remote Commands for the Aspiring Hacker

Many new hackers come from a Windows background, but seldom if ever, use its built-in command-line tools. As a hacker,

Continue reading

May 12, 2020 Linux / Networking / Tech hacks

How to Find the Exact Location of Any IP Address

Have you ever wondered where the physical location of an IP address is? Maybe you want to know if that proxy server

Continue reading

May 9, 2020 Tech hacks / Windows Tricks

How to Know if You’ve Been Hacked

  It seems like every day now that we see a new headline on a cybersecurity breach. These headlines usually

Continue reading

May 8, 2020 Networking / Tech hacks / Windows Tricks

How to Protect Yourself from Being Hacked

  Each day, we read about another security breach somewhere in our digital world. It has become so commonplace that

Continue reading

October 15, 2018 Tech hacks / Windows Tricks

How To Reset Your Forgotten Windows 10 Login Password

As we know, Windows 10 is out with its excellent features and today we are going to introduce an easy

Continue reading

April 25, 2018 Networking / Tech hacks

How to Find Server’s IP Address of Any Website

Today we are going to share an interesting trick to find out server IP address of Any website with the help of

Continue reading

March 29, 2018 Tech hacks / Windows Tricks

Create Fake File in Window PC in Any Size and Any Format

In Windows PC, there are many commands and Hidden features that we don’t know. In this post, I tell you

Continue reading

April 15, 2017 Networking / Tech hacks

Sniffing passwords from same network(Lan) using Cain and Abel tool

Hello, guys today I am going to tell you about how to hack victim password if he is connected on

Continue reading

March 19, 2017 Networking / Tech hacks

Access Wifi (WPA2-PSK) from Kali Linux

Recently i had learn how to hack Wifi (WPA2-PSK) from Kali Linux,thought to share with you guys,this is just manipulation

Continue reading

January 23, 2017 Notepad Tricks / Programming / Tech hacks / Windows Tricks

How to automatically copy files from a computer to a pendrive

hello guys, have u ever want something from your friend pc, that he is not giving you like games, movies

Continue reading

January 20, 2017 Networking / Tech hacks / Windows Tricks

Access some other computer remotely using their IP address

hello guys, now I am going to guide you on how to access the victim system remotely using the IP

Continue reading

January 18, 2017 Android Tricks / Tech hacks

How to ROOT Any Android

In this post you are about to learn How to ROOT just any Android phone or Tablet Just by flashing

Continue reading

January 18, 2017 Tech hacks / Uncategorized / Windows Tricks

Access WiFi Password With CMD

You can experiment these trick with your neighbours or friends. It’s not necessarily that this trick will work with every

Continue reading

January 15, 2017 Networking / Tech hacks

DDos a Website Using Cmd

DDos is defined as “Distributed Denial of Service Attack“. This tutorial explains what is DDosing and how to hack a

Continue reading

January 5, 2017 Tech hacks / Windows Tricks

Some Of Most DANGEROUS .bat files

Some of these codes are very dangerous! USE THIS AT YOUR OWN RISK. Download Spyboy App Block Google. Code: @echo

Continue reading

January 5, 2017 Notepad Tricks / Tech hacks

Notepad Virus

IMP. Note>> I am not responsible for any damage or error reporting in Your pc do it as ur own

Continue reading

January 5, 2017 Tech hacks / Windows Tricks

How to: The most secure way to encrypt and hide your files

Here, I am going to show you how to hide, encrypt and secure your data everywhere you go. We will

Continue reading

November 21, 2016 Tech hacks / Windows Tricks

Copy Data automatically From USB to your PC On Insert

We sometime wish that if someone insert his/her USB Into your pc then its data automatically copy in to your

Continue reading

November 21, 2016 Tech hacks

Most Popular Hacking Tools

If hacking is performed to identify the potential threats to a computer or network then it will be an ethical

Continue reading

November 20, 2016 Tech hacks / Windows Tricks

How To Remove Write Protection From pendrive or sd card

In this method, we will remove write protection from Pendrive using commands in Cmd. This will fully clean the write

Continue reading

September 29, 2016 Android Tricks / Networking / Tech hacks

Best Android Hacking App

Here I am discussing some of the Apps that are meant for the Security tester, Ethical hacker and for those

Continue reading

August 21, 2016 Networking / Tech hacks / Windows Tricks

Change Default DNS to Google DNS for Faster Internet

Time to increase your internet speed by Changing Default DNS to Google DNS. DNS is Domain Name system that first

Continue reading

August 21, 2016 Android Tricks / Tech hacks

Recover WiFi Passwords Using Android

When any device gets connected to wifi network then the wifi password gets saved in that device for a while

Continue reading

July 30, 2016 Android Tricks / Tech hacks

How To Change Serial Number Of your Android

Android Serial number of every mobile device is its identity to recognize that network on the cellular network and to recognize

Continue reading

Posts navigation

«Previous Posts 1 2 3 4 … 7 Next Posts»
Advertisements

Spyboy – App

Get it on Google Play

C – Programming App

Get it on Google Play

C++ Programming App

Get it on Google Play

Java – Programming App

Get it on Google Play

Follow Us Here

  • Instagram
  • Facebook
  • YouTube
  • Google
  • Twitter

Youtube Videos

https://www.youtube.com/watch?v=TzkL7PI9D8s

Categories

  • Android Tricks (81)
  • CEH (8)
  • iphone (3)
  • Linux (101)
  • Networking (267)
  • Notepad Tricks (38)
  • Pc Registry Tricks (16)
  • Programming (97)
  • Tech hacks (268)
  • Uncategorized (30)
  • Windows Tricks (164)
Advertisements

Recent Posts

  • Iron Man Jarvis AI Desktop Voice Assistant | in Python January 12, 2021
  • What is a Zero-Day Exploit? January 5, 2021
  • PhpSploit – post exploitation framework January 5, 2021
  • Create an Undetectable Payload,(hide the Payload) December 7, 2020
  • Create an Undetectable Payload (Bypass Antivirus) December 7, 2020
  • How to use a Router as a Wireless Adapter December 5, 2020
  • How to protect your server(website) from DDoS attacks December 5, 2020
  • DDoS attack using SlowHTTPTest (Slowloris) in Kali Linux December 5, 2020
  • Hulk DDoS : Installation & Usage with Examples December 5, 2020
  • Kali Linux Hydra Tool Example December 5, 2020
  • Top DDoS Attack Tools December 5, 2020
  • Automatically Post WordPress Posts to Discord December 5, 2020
  • Bot to fix Python indentation error December 5, 2020
  • Make a Persistent payload in Android Using Kali December 3, 2020
  • Installing Selenium and ChromeDriver on Windows December 1, 2020
  • Turn a Pen Drive into a USB Rubber Ducky November 30, 2020
  • Make A WhatsApp Spammer November 27, 2020
  • Gadgets for hacker November 21, 2020
  • Use SSH Tunnels to Forward Requests & Hack Remote Routers November 15, 2020
  • How Hackers Hack uTorrent Clients & Backdoor their system November 15, 2020
  • Brute-Force Almost Any Website Login November 15, 2020
  • Scan Web Applications for Common Vulnerabilities Using Metasploit’s WMAP November 15, 2020
  • Nikto – Scan Any Website for Vulnerabilities November 12, 2020
  • Customize your Mac terminal using figlet November 12, 2020
  • Termux !! Full Tutorial With Termux commands November 12, 2020
  • Make Cool linux Terminal Header November 12, 2020
  • How hackers Remotely Hack Android Using payload November 8, 2020
  • Make a Dead Man’s Switch to Delete & Encrypt Files if something happens to you October 30, 2020
  • How Hackers Break into Somebody’s Computer and Exploit the System October 19, 2020
  • Create Bootable USB with Persistence for Kali Linux October 19, 2020
  • How hackers Bypass Locked Windows Computers to Run Kali Linux from a Live USB October 19, 2020
  • Run Kali Linux on Windows without installing October 19, 2020
  • Make Your Own Evil USB October 19, 2020
  • Find Sensitive & ‘Deleted’ Files Remotely October 12, 2020
  • Capture Keystrokes & Passwords Remotely October 12, 2020
  • Remotely Record & Listen to the Microphone of a Hacked Computer October 6, 2020
  • How hackers Break into Somebody’s Computer Without a Password September 21, 2020
  • Create an Undetectable Payload September 16, 2020
  • Hide Payloads(virus) Inside any Photo Metadata September 15, 2020
  • Different Types Of Hackers September 6, 2020
  • How to Manage Big Password lists September 6, 2020
  • How Hackers BruteForce Gmail, Hotmail, Twitter, Facebook & Netflix September 6, 2020
  • Google Hacking Tool – uDork September 6, 2020
  • Make All Your Internet Traffic Anonymized-TorghostNG September 4, 2020
  • Facebook Brute Forcer In Shellscript Using TOR – Facebash September 1, 2020
  • SocialBox – A Bruteforce Attack Framework (Facebook, Gmail, Instagram, Twitter) September 1, 2020
  • Instagram-Py – Simple Instagram Brute Force Script September 1, 2020
  • HiddenEye – Phishing Tool With Advanced Functionality (Support – Android) August 31, 2020
  • Stalk Your Friends social media accounts Using Image Recognition And Reverse Image Search – EagleEye August 30, 2020
  • How hackers crack WiFi Passwords in Minutes — Fluxion August 23, 2020
  • Send and Receive Files Anonymously August 22, 2020
  • How to Hide a Phishing Link August 22, 2020
  • CEH – Enumeration August 14, 2020
  • CEH – Scanning August 14, 2020
  • CEH – Footprinting August 14, 2020
  • Best Websites For Free IP Lookup August 5, 2020
  • Top 10 Most Dangerous Viruses Of All Times August 5, 2020
  • Top 50+Penetration Testing Interview Questions Most August 5, 2020
  • CEH – Cryptography July 29, 2020
  • CEH – System Fundamentals July 29, 2020
  • CEH – Introduction July 29, 2020
  • CEH – Assessment Test July 24, 2020
  • Google Dorks For Bug Bounty Hunters July 24, 2020
  • [Fixed] No WiFi Adapter Found in Kali Linux July 19, 2020
  • A Web Path Scanner: DirSearch July 19, 2020
  • Best WiFi Adapter For Kali Linux in 2020 -WiFi Adapter with Monitor Mode July 18, 2020
  • How To Turn Your Android Device Into Full Functional Computer July 17, 2020
  • How to Customize the Right-click Menu on Windows 10 July 16, 2020
  • RUN CMD Commands With a Desktop Shortcut on Windows 10 July 15, 2020
  • Best Google Search Tricks & Tips in 2020 July 15, 2020
  • Best Virtual Phone Number Apps For Account Verifications July 13, 2020
  • The Deep Magic: Dmitry July 12, 2020
  • Powerful Websites That Can Replace Your PC Software July 9, 2020
  • How To Install Multiple Bootable Operating Systems On One USB July 9, 2020
  • Torrent Proxy Sites List 2020 (100% Working Mirror Sites) July 9, 2020
  • Best Websites to Download Free Books July 9, 2020
  • Best CMD Commands Used By Hackers July 9, 2020
  • How To Activate the New Start Menu of Windows 10 July 9, 2020
  • Shodan — The Most Dangerous Search Engine July 8, 2020
  • Tech Behind Web Application: Whatweb July 6, 2020
  • Hide Secrets in Pictures: Steghide July 6, 2020
  • Port Forwarding using SSH July 6, 2020
  • Advanced Lazy Automated Phishing Script: ZPhisher July 5, 2020
  • How Hackers Crack Wi-Fi Networks: AirCrack July 4, 2020
  • Take Total Control on Android Remotely: HaxRat July 3, 2020
  • Advanced Phishing | Bypass Two Factor Authentication – Modlishka July 2, 2020
  • Trape: People Tracker On the Internet July 1, 2020
  • SpiderFoot: OSINT Reconnaissance Tool July 1, 2020
  • Recon-ng: Information Gathering with Open Source Intelligence June 30, 2020
  • How To Send Anonymous Text, Emails, Media Files using Utopia June 28, 2020
  • Find Social Media Accounts: Userrecon June 26, 2020
  • Find Social Media Profiles Using a Photo Only: Social Mapper June 26, 2020
  • Monitor Other People Image Files over Network June 25, 2020
  • How Hackers Control Front Camera of Mobile and PC: CamPhish June 24, 2020
  • Make A Private Search Engine And Secure Your Privacy June 24, 2020
  • How To Host Your Own .onion Website in Dark Web June 22, 2020
  • Host a Local Website with Domain Name on Kali Linux over WiFi June 22, 2020
  • How Hackers Can Access Android Devices Remotely Using L3MON June 22, 2020
  • Retrieve All Passwords With LaZagne Project June 19, 2020
  • DKMC – Wonderful Malicious Payload Evasion Tool June 19, 2020
  • Persistent Backdoor In Android Using Kali Linux With A Shell Script June 19, 2020
  • Hack The Box: How to get invite code June 18, 2020
  • WordPress Security Scanner – WPSeku June 18, 2020
  • SEToolkit – Credential Harvester Attack [Tutorial] June 18, 2020
  • Top Vulnerable Websites To Practice Your Skills June 17, 2020
  • How Hackers Hack A Website With Ngrok, Msfvenom And Metasploit Framework June 17, 2020
  • How Hackers Phish for Social Media & Other Account Passwords with BlackEye June 16, 2020
  • How To Track Someone’s exact Geolocation Over Internet June 15, 2020
  • Ultimate Phishing Tool With Ngrok –SocialFish June 15, 2020
  • Bruteforce Password Cracking With Medusa – Kali Linux June 14, 2020
  • Shcheck – Tool To Scan Security Headers Of Any Website June 14, 2020
  • Top 5 Wireless Penetration Testing Tools June 13, 2020
  • Create Hotspot On Windows 10 In 6 Steps June 13, 2020
  • How To Secure Your Wi-Fi Network In Few Steps. June 13, 2020
  • Find Vulnerable Webcams With Shodan [Metasploit Framework] June 12, 2020
  • Change Windows Password Of Remote PC Via METASPLOIT June 10, 2020
  • SSLKILL – Forced Man In The Middle Attack – Sniff HTTPS/HTTP June 10, 2020
  • How Hackers Hack Wi-Fi & Networks More Easily with Lazy Script June 10, 2020
  • How Hackers Hack Web Browsers with BeEF to Control Webcams, Phish for Credentials & More June 9, 2020
  • Kick-Off or Limit The Speed Of Other Devices On Your Network(Wifi) June 8, 2020
  • How Hacker Hack Windows 10 Using CHAOS Framework June 8, 2020
  • FREE Learning Material For All Programming Languages – GitHub June 7, 2020
  • Setup Honeypot In Kali Linux With Pentbox June 7, 2020
  • Gloom – Linux Penetration Testing Framework June 6, 2020
  • Most Popular Useful Kali Linux Hacking Tools June 6, 2020
  • How Hacker Hack Android Using Metasploit Without Port Forwarding Over Internet June 5, 2020
  • Disable Security Cameras on Any Wireless Network June 5, 2020
  • How Hackers Send Fake Mail Using SETOOLKIT June 4, 2020
  • Use Kismet to Watch Wi-Fi User Activity !! June 2, 2020
  • Simulate a RAT on Your Network with ShinoBOT June 2, 2020
  • Ehtools — Easy Penetration Testing Framework June 2, 2020
  • Map Vulnerable Networks using Wardrive on an Android Phone June 1, 2020
  • An Evil Twin Attack To Steal Wi-Fi Password June 1, 2020
  • LockPhish — Phishing Attack on Lock Screen May 31, 2020
  • Control Android Devices Remotely — Ghost Framework May 31, 2020
  • Hack Wi-Fi & Networks More Easily with Lazy Script May 30, 2020
  • How Hackers Hack Android Using Metasploit Over LAN/WAN May 29, 2020
  • Metasploit Framework – Hacker’s Favorite Exploitation Tool May 29, 2020
  • How Hackers Find Your IP Address to Hack Your Computer & How to Stop It May 29, 2020
  • SOCIAL ENGINEERING The Most Powerful Hack May 28, 2020
  • How To Find Anyone’s Private Phone Number Online May 26, 2020
  • Find Information from a Phone Number May 24, 2020
  • Find Passwords in Exposed Log Files with Google Dorks May 23, 2020
  • Use Google Dorks to Find Elusive Information May 23, 2020
  • What skills do I need to be a good hacker? May 22, 2020
  • How to track someone’s location online – with Grabify Tracking Links May 22, 2020
  • How to Change Kali Linux Hostname Using terminal May 22, 2020
  • How to update Kali Linux May 22, 2020
  • Get Started with Kali Linux in 2020 May 21, 2020
  • Gain Complete Control of Any Android Phone with the AhMyth RAT May 21, 2020

Buy Me A Coffee

Buy Me A Coffee

(^^)

500 ₹

Advertisements

like us on facebook

like us on facebook
Advertisements

Follow me on Twitter

My Tweets

Enter your email address to follow this blog and receive notifications of new posts by email.

Join 8,559 other followers

Blog Stats

  • 9,986,660 hits

chat with me

Follow On Instagram

  • instagram
  • twitter
  • facebook
  • youtube
  • github
  • play store
Create a website or blog at WordPress.com
Cancel