• instagram
  • twitter
  • facebook
  • youtube
  • github
  • play store
  • About Us
  • YouTube Channel
  • Join Discord (Chat Here)
  • Download Our Apps
    • Spyboy App
    • C Programming
    • C++ Programming
    • Java Programming
Skip to content

Spyboy blog

Learn ethical hacking , cyber security, computer programming, networking, android tricks and windows tricks.

  • Home
  • Tech hacks
  • Linux
  • Windows Tricks
  • Android Tricks
  • Networking
  • More
    • CEH
    • iphone
    • Programming
    • Virus Creation
    • Tweak windows
    • uncategorized

Category: Tech hacks

May 29, 2016 Programming / Tech hacks / Windows Tricks

Open Command Prompt with Administrator Privileges Anywhere

# Make an Open Command Window Here with admin privileges option. -> You can open a new Command Prompt window directly to

Continue reading

May 26, 2016 Android Tricks / Tech hacks

How To Bypass Apps Root Detection In Android

Learn How To Bypass Apps Root Detection In Android: After rooting android there must be some apps that won’t work

Continue reading

May 24, 2016 Tech hacks / Windows Tricks

What is DOS attack and how it works

Guys, you may have seen Mr Robot and remember the event when Society use the DDoS as a calling card to

Continue reading

May 23, 2016 Networking / Tech hacks

how to make an email in seconds !!!

use these coolest website..if u need a fake email..for any purpose !!!..you can go on that and u will get your fake

Continue reading

May 23, 2016 Networking / Tech hacks

sim card cloning:make a duplicate mobile number

The Ultimate Guide to Spy on somebody is in every everybody’s pocket ! The Modern Engineering marvel aka Mobile Phone’s

Continue reading

May 8, 2016 Networking / Tech hacks

Trick To Create Unlimited Verified Facebook Accounts

Follow the step guys :- Download Spyboy App Step 1: Firstly, go to http://m.facebook.com and then click “Create New Account”

Continue reading

May 8, 2016 Tech hacks / Windows Tricks

How To Crack a BIOS Password

Have you ever been locked out of an old computer by a forgotten BIOS password? There’s no need to get

Continue reading

May 2, 2016 Notepad Tricks / Programming / Tech hacks / Windows Tricks

Batch File – Numeric password cracker for “Rar” File

Hello, Here is another batch file which can crack password of Rar File. You can easily use it to crack

Continue reading

April 26, 2016 Networking / Tech hacks / Windows Tricks

How to Double IDM Download Speed On Windows (2 Methods)

Internet Download Manager being one of the conventional downloaders that help you to boost up your downloading speed in your

Continue reading

April 20, 2016 Programming / Tech hacks / Windows Tricks

How to capture passwords using USB Drive

Note: This tutorial is only for educational purpose. We don’t provide the specific links of the tools you can Google

Continue reading

April 20, 2016 Android Tricks / Networking / Notepad Tricks / Programming / Tech hacks

Androrat: How it works

In this post, i am going to show you how to hack Android phones withAndrorat. In our tutorials, we only

Continue reading

April 20, 2016 Networking / Tech hacks

How to Track an Email Address

Here’s a quick guide on how to track an email to its original location by figuring out the email’s IP address and

Continue reading

April 20, 2016 Android Tricks / Tech hacks / Windows Tricks

How To Install Android Apps on Windows 10 Mobile

How To Install Android Apps on Windows 10 Mobile:- If you’re bored of using a Windows phone then you can

Continue reading

April 18, 2016 Programming / Tech hacks / Windows Tricks

Make a Super Hidden Folder in Windows Without any Extra Software

Almost everyone knows how to make a “hidden” folder in Windows, but then again almost everyone knows how to make

Continue reading

April 18, 2016 Networking / Tech hacks / Windows Tricks

How to Remove Your Windows Disk Encryption Key From Microsoft’s Servers

Windows enables device encryption on many Windows 10 and 8.1 PCs out-of-the-box. It also uploads your recovery key to Microsoft’s servers, allowing you to regain

Continue reading

April 15, 2016 Android Tricks / Networking / Tech hacks

Free Unlimited Calling WorldWide | How to make Prank Calls Trick: Flipcall

Hello Guys!! I am back..Today I am going to share an Amazing Trick that is How To FREE Unlimited Calling Trick World

Continue reading

April 15, 2016 Programming / Tech hacks / Windows Tricks

What is Brute Force Cracking Attack?|Cracking HASH passwords

  Hi friends, If you don’t know about cracking encrypted or ciphered data using Brute Force attack,this article will help

Continue reading

April 13, 2016 Android Tricks / Tech hacks / Windows Tricks

How to Data Recover Files from Corrupted USB and Memory Card

Hello friends, today I will share very useful trick How to Data Recovery from Corrupted USB and SD/Memory Card. We

Continue reading

April 13, 2016 Android Tricks / Networking / Tech hacks

8 Premium Android Apps to Get Unlimited VPN for FREE

What is a VPN? The full form of VPN is Virtual Private Network. In simple words, it means a virtual

Continue reading

April 10, 2016 Android Tricks / Tech hacks

How To Install Kali Linux on Android

Kali Linux is one of the best love operating system of white hat hackers, security researchers and pentesters. It offers

Continue reading

April 7, 2016 Notepad Tricks / Tech hacks / Windows Tricks

some awesome tricks that can be used in schools,colleges & offices ;D ENJOY,,,,!!!

A lot of schools/offices block the cmd box or run box.I’m about to show you how to get it back

Continue reading

April 7, 2016 Networking / Tech hacks

EASY STEPS TO CHANGE YOUR IP IN LESS THAN A MINUTE,,,!!!

Here is the 10 most easy quick step method to change the IP address by changing the properties in LAN

Continue reading

February 28, 2016 Notepad Tricks / Programming / Tech hacks / Windows Tricks

How To Check Whether Your Antivirus Working Perfectly Or Not

  Today you must be utilizing antivirus in computer and laptops, And there are many antiviruses that are accessible now

Continue reading

February 28, 2016 Programming / Tech hacks / Windows Tricks

How To Remove Computer Viruses Using CMD

 Today Virus can penetrate in our computer through numerous ways like through Internet Browsing, From USB devices and also by installing

Continue reading

February 21, 2016 Android Tricks / Networking / Tech hacks

Best Apps To Surf Anonymously In Android

About two out of three people in the world is utilizing the internet in everyday life. In this world wide

Continue reading

February 21, 2016 Android Tricks / Networking / Tech hacks

How To Set-Up VPN on Android Without Any App

How To Set-up VPN on Android Without Any App VPN stands for Virtual Private Network that allows server request to

Continue reading

February 19, 2016 Networking / Programming / Tech hacks

How to Create Anonymous Website(Dark Net)

Tor is an anonymous, secure network that allows anyone to access websites with anonymity. People normally use Tor to access

Continue reading

February 19, 2016 Tech hacks / Uncategorized

How Hackers Look Like and What They Think?

Nearly all hackers completed college or reached that level by self-education. Self-educated hackers are more respected in hacker’s community because that person is

Continue reading

February 19, 2016 Android Tricks / Networking / Notepad Tricks / Programming / Tech hacks / Windows Tricks

Become a Master Hacker – A Complete Guide for Beginners

Most of the aspiring techies have an intense passion for becoming a hacker but don’t know where to start. Some

Continue reading

February 19, 2016 Networking / Programming / Tech hacks

These Four Lines Of Code Can Crash Anyone’s Smartphone And Computer

There’s a notorious link being shared on social networking websites that can crash nearly all smartphones — all you have

Continue reading

February 19, 2016 Networking / Tech hacks

The Hidden Internet That Lies Beyond Google

The entire expanse of the Internet, going well beyond what you surf every day, is only the tip of a

Continue reading

January 26, 2016 Tech hacks

This TorFlow Map Shows How TOR’s Data Looks As It Flows All Around The World

TOR is the world’s most widely used tool for anonymity purposes (Everything About Tor: What is Tor? How Tor Works

Continue reading

January 26, 2016 Networking / Tech hacks

Everything About Tor: What is Tor? How Tor Works ?

Tor or The Onion Router, allows anonymous use of internet veiling the actual identity of the user. It protects the

Continue reading

December 16, 2015 Networking / Tech hacks

How to Access Darknet :The Hidden Anonymous Internet

Maybe you are aware of the mysterious hidden internet called the ‘DarkNet’ or ‘Deep Web’ that you can’t access from

Continue reading

December 16, 2015 Networking / Tech hacks / Windows Tricks

How to hide IP Address

Hiding an IP Address is an easy task .Completely hiding an IP address will make you virtually inaccessible to internet,

Continue reading

December 16, 2015 Tech hacks

Steganography: Steps to Hide data behind Image

I wonder if you have ever faced situation when you need some important files of yours to be known only

Continue reading

December 16, 2015 Networking / Tech hacks

Live Public Security Camera

Have you ever dreamed of becoming a SPY with superhuman skills. Ha-ha we have all dreamed of such things. Well, his

Continue reading

December 16, 2015 Networking / Tech hacks / Windows Tricks

Access other Windows using Remote Desktop Connection

Remote Desktop is a feature of Windows Server 2003 that lets you remotely log on to and work at a

Continue reading

December 16, 2015 Networking / Tech hacks / Windows Tricks

R.A.T : REMOTE ADMINISTRATION TOOL

What is Remote Administration Tool ( R.A.T) Yeah, you guessed it right. I am talking of Remote Administration Tool, not

Continue reading

December 16, 2015 Networking / Tech hacks / Windows Tricks

What is DOS attack and how this work

DOS Attack: DENIAL OF SERVICE ATTACK Guys, you may have seen Mr Robot and remember the event when Fsociety use

Continue reading

December 16, 2015 Networking / Tech hacks / Windows Tricks

How To Increase Your Torrent Download Speed

Using torrent clients is one of the most popular ways to share the files over the web. While there are

Continue reading

December 12, 2015 Tech hacks

How to reset the bios password

This is hardcore, serious hacking at its best. So it goes without saying that you probably shouldn’t be attempting this

Continue reading

December 12, 2015 Networking / Programming / Tech hacks

How to access Command Prompt at school to change passwords and more

Trying to focus on studying for your Stats final in the library but getting a serious ADD spell? Then make

Continue reading

December 8, 2015 Networking / Tech hacks

How to Verify Your Facebook Page With A Grey Tick

There are lots of features that are getting added to Facebook day by day and the amazing thing that being

Continue reading

Posts navigation

«Previous Posts 1 2 3 4 5 … 7 Next Posts»
Advertisements

Spyboy – App

Get it on Google Play

C – Programming App

Get it on Google Play

C++ Programming App

Get it on Google Play

Java – Programming App

Get it on Google Play

Follow Us Here

  • Instagram
  • Facebook
  • YouTube
  • Google
  • Twitter

Youtube Videos

https://www.youtube.com/watch?v=TzkL7PI9D8s

Categories

  • Android Tricks (81)
  • CEH (8)
  • iphone (3)
  • Linux (101)
  • Networking (267)
  • Notepad Tricks (38)
  • Pc Registry Tricks (16)
  • Programming (97)
  • Tech hacks (268)
  • Uncategorized (30)
  • Windows Tricks (164)
Advertisements

Recent Posts

  • Iron Man Jarvis AI Desktop Voice Assistant | in Python January 12, 2021
  • What is a Zero-Day Exploit? January 5, 2021
  • PhpSploit – post exploitation framework January 5, 2021
  • Create an Undetectable Payload,(hide the Payload) December 7, 2020
  • Create an Undetectable Payload (Bypass Antivirus) December 7, 2020
  • How to use a Router as a Wireless Adapter December 5, 2020
  • How to protect your server(website) from DDoS attacks December 5, 2020
  • DDoS attack using SlowHTTPTest (Slowloris) in Kali Linux December 5, 2020
  • Hulk DDoS : Installation & Usage with Examples December 5, 2020
  • Kali Linux Hydra Tool Example December 5, 2020
  • Top DDoS Attack Tools December 5, 2020
  • Automatically Post WordPress Posts to Discord December 5, 2020
  • Bot to fix Python indentation error December 5, 2020
  • Make a Persistent payload in Android Using Kali December 3, 2020
  • Installing Selenium and ChromeDriver on Windows December 1, 2020
  • Turn a Pen Drive into a USB Rubber Ducky November 30, 2020
  • Make A WhatsApp Spammer November 27, 2020
  • Gadgets for hacker November 21, 2020
  • Use SSH Tunnels to Forward Requests & Hack Remote Routers November 15, 2020
  • How Hackers Hack uTorrent Clients & Backdoor their system November 15, 2020
  • Brute-Force Almost Any Website Login November 15, 2020
  • Scan Web Applications for Common Vulnerabilities Using Metasploit’s WMAP November 15, 2020
  • Nikto – Scan Any Website for Vulnerabilities November 12, 2020
  • Customize your Mac terminal using figlet November 12, 2020
  • Termux !! Full Tutorial With Termux commands November 12, 2020
  • Make Cool linux Terminal Header November 12, 2020
  • How hackers Remotely Hack Android Using payload November 8, 2020
  • Make a Dead Man’s Switch to Delete & Encrypt Files if something happens to you October 30, 2020
  • How Hackers Break into Somebody’s Computer and Exploit the System October 19, 2020
  • Create Bootable USB with Persistence for Kali Linux October 19, 2020
  • How hackers Bypass Locked Windows Computers to Run Kali Linux from a Live USB October 19, 2020
  • Run Kali Linux on Windows without installing October 19, 2020
  • Make Your Own Evil USB October 19, 2020
  • Find Sensitive & ‘Deleted’ Files Remotely October 12, 2020
  • Capture Keystrokes & Passwords Remotely October 12, 2020
  • Remotely Record & Listen to the Microphone of a Hacked Computer October 6, 2020
  • How hackers Break into Somebody’s Computer Without a Password September 21, 2020
  • Create an Undetectable Payload September 16, 2020
  • Hide Payloads(virus) Inside any Photo Metadata September 15, 2020
  • Different Types Of Hackers September 6, 2020
  • How to Manage Big Password lists September 6, 2020
  • How Hackers BruteForce Gmail, Hotmail, Twitter, Facebook & Netflix September 6, 2020
  • Google Hacking Tool – uDork September 6, 2020
  • Make All Your Internet Traffic Anonymized-TorghostNG September 4, 2020
  • Facebook Brute Forcer In Shellscript Using TOR – Facebash September 1, 2020
  • SocialBox – A Bruteforce Attack Framework (Facebook, Gmail, Instagram, Twitter) September 1, 2020
  • Instagram-Py – Simple Instagram Brute Force Script September 1, 2020
  • HiddenEye – Phishing Tool With Advanced Functionality (Support – Android) August 31, 2020
  • Stalk Your Friends social media accounts Using Image Recognition And Reverse Image Search – EagleEye August 30, 2020
  • How hackers crack WiFi Passwords in Minutes — Fluxion August 23, 2020
  • Send and Receive Files Anonymously August 22, 2020
  • How to Hide a Phishing Link August 22, 2020
  • CEH – Enumeration August 14, 2020
  • CEH – Scanning August 14, 2020
  • CEH – Footprinting August 14, 2020
  • Best Websites For Free IP Lookup August 5, 2020
  • Top 10 Most Dangerous Viruses Of All Times August 5, 2020
  • Top 50+Penetration Testing Interview Questions Most August 5, 2020
  • CEH – Cryptography July 29, 2020
  • CEH – System Fundamentals July 29, 2020
  • CEH – Introduction July 29, 2020
  • CEH – Assessment Test July 24, 2020
  • Google Dorks For Bug Bounty Hunters July 24, 2020
  • [Fixed] No WiFi Adapter Found in Kali Linux July 19, 2020
  • A Web Path Scanner: DirSearch July 19, 2020
  • Best WiFi Adapter For Kali Linux in 2020 -WiFi Adapter with Monitor Mode July 18, 2020
  • How To Turn Your Android Device Into Full Functional Computer July 17, 2020
  • How to Customize the Right-click Menu on Windows 10 July 16, 2020
  • RUN CMD Commands With a Desktop Shortcut on Windows 10 July 15, 2020
  • Best Google Search Tricks & Tips in 2020 July 15, 2020
  • Best Virtual Phone Number Apps For Account Verifications July 13, 2020
  • The Deep Magic: Dmitry July 12, 2020
  • Powerful Websites That Can Replace Your PC Software July 9, 2020
  • How To Install Multiple Bootable Operating Systems On One USB July 9, 2020
  • Torrent Proxy Sites List 2020 (100% Working Mirror Sites) July 9, 2020
  • Best Websites to Download Free Books July 9, 2020
  • Best CMD Commands Used By Hackers July 9, 2020
  • How To Activate the New Start Menu of Windows 10 July 9, 2020
  • Shodan — The Most Dangerous Search Engine July 8, 2020
  • Tech Behind Web Application: Whatweb July 6, 2020
  • Hide Secrets in Pictures: Steghide July 6, 2020
  • Port Forwarding using SSH July 6, 2020
  • Advanced Lazy Automated Phishing Script: ZPhisher July 5, 2020
  • How Hackers Crack Wi-Fi Networks: AirCrack July 4, 2020
  • Take Total Control on Android Remotely: HaxRat July 3, 2020
  • Advanced Phishing | Bypass Two Factor Authentication – Modlishka July 2, 2020
  • Trape: People Tracker On the Internet July 1, 2020
  • SpiderFoot: OSINT Reconnaissance Tool July 1, 2020
  • Recon-ng: Information Gathering with Open Source Intelligence June 30, 2020
  • How To Send Anonymous Text, Emails, Media Files using Utopia June 28, 2020
  • Find Social Media Accounts: Userrecon June 26, 2020
  • Find Social Media Profiles Using a Photo Only: Social Mapper June 26, 2020
  • Monitor Other People Image Files over Network June 25, 2020
  • How Hackers Control Front Camera of Mobile and PC: CamPhish June 24, 2020
  • Make A Private Search Engine And Secure Your Privacy June 24, 2020
  • How To Host Your Own .onion Website in Dark Web June 22, 2020
  • Host a Local Website with Domain Name on Kali Linux over WiFi June 22, 2020
  • How Hackers Can Access Android Devices Remotely Using L3MON June 22, 2020
  • Retrieve All Passwords With LaZagne Project June 19, 2020
  • DKMC – Wonderful Malicious Payload Evasion Tool June 19, 2020
  • Persistent Backdoor In Android Using Kali Linux With A Shell Script June 19, 2020
  • Hack The Box: How to get invite code June 18, 2020
  • WordPress Security Scanner – WPSeku June 18, 2020
  • SEToolkit – Credential Harvester Attack [Tutorial] June 18, 2020
  • Top Vulnerable Websites To Practice Your Skills June 17, 2020
  • How Hackers Hack A Website With Ngrok, Msfvenom And Metasploit Framework June 17, 2020
  • How Hackers Phish for Social Media & Other Account Passwords with BlackEye June 16, 2020
  • How To Track Someone’s exact Geolocation Over Internet June 15, 2020
  • Ultimate Phishing Tool With Ngrok –SocialFish June 15, 2020
  • Bruteforce Password Cracking With Medusa – Kali Linux June 14, 2020
  • Shcheck – Tool To Scan Security Headers Of Any Website June 14, 2020
  • Top 5 Wireless Penetration Testing Tools June 13, 2020
  • Create Hotspot On Windows 10 In 6 Steps June 13, 2020
  • How To Secure Your Wi-Fi Network In Few Steps. June 13, 2020
  • Find Vulnerable Webcams With Shodan [Metasploit Framework] June 12, 2020
  • Change Windows Password Of Remote PC Via METASPLOIT June 10, 2020
  • SSLKILL – Forced Man In The Middle Attack – Sniff HTTPS/HTTP June 10, 2020
  • How Hackers Hack Wi-Fi & Networks More Easily with Lazy Script June 10, 2020
  • How Hackers Hack Web Browsers with BeEF to Control Webcams, Phish for Credentials & More June 9, 2020
  • Kick-Off or Limit The Speed Of Other Devices On Your Network(Wifi) June 8, 2020
  • How Hacker Hack Windows 10 Using CHAOS Framework June 8, 2020
  • FREE Learning Material For All Programming Languages – GitHub June 7, 2020
  • Setup Honeypot In Kali Linux With Pentbox June 7, 2020
  • Gloom – Linux Penetration Testing Framework June 6, 2020
  • Most Popular Useful Kali Linux Hacking Tools June 6, 2020
  • How Hacker Hack Android Using Metasploit Without Port Forwarding Over Internet June 5, 2020
  • Disable Security Cameras on Any Wireless Network June 5, 2020
  • How Hackers Send Fake Mail Using SETOOLKIT June 4, 2020
  • Use Kismet to Watch Wi-Fi User Activity !! June 2, 2020
  • Simulate a RAT on Your Network with ShinoBOT June 2, 2020
  • Ehtools — Easy Penetration Testing Framework June 2, 2020
  • Map Vulnerable Networks using Wardrive on an Android Phone June 1, 2020
  • An Evil Twin Attack To Steal Wi-Fi Password June 1, 2020
  • LockPhish — Phishing Attack on Lock Screen May 31, 2020
  • Control Android Devices Remotely — Ghost Framework May 31, 2020
  • Hack Wi-Fi & Networks More Easily with Lazy Script May 30, 2020
  • How Hackers Hack Android Using Metasploit Over LAN/WAN May 29, 2020
  • Metasploit Framework – Hacker’s Favorite Exploitation Tool May 29, 2020
  • How Hackers Find Your IP Address to Hack Your Computer & How to Stop It May 29, 2020
  • SOCIAL ENGINEERING The Most Powerful Hack May 28, 2020
  • How To Find Anyone’s Private Phone Number Online May 26, 2020
  • Find Information from a Phone Number May 24, 2020
  • Find Passwords in Exposed Log Files with Google Dorks May 23, 2020
  • Use Google Dorks to Find Elusive Information May 23, 2020
  • What skills do I need to be a good hacker? May 22, 2020
  • How to track someone’s location online – with Grabify Tracking Links May 22, 2020
  • How to Change Kali Linux Hostname Using terminal May 22, 2020
  • How to update Kali Linux May 22, 2020
  • Get Started with Kali Linux in 2020 May 21, 2020
  • Gain Complete Control of Any Android Phone with the AhMyth RAT May 21, 2020

Buy Me A Coffee

Buy Me A Coffee

(^^)

500 ₹

Advertisements

like us on facebook

like us on facebook
Advertisements

Follow me on Twitter

My Tweets

Enter your email address to follow this blog and receive notifications of new posts by email.

Join 8,559 other followers

Blog Stats

  • 9,986,535 hits

chat with me

Follow On Instagram

  • instagram
  • twitter
  • facebook
  • youtube
  • github
  • play store
Create a website or blog at WordPress.com
Cancel