• instagram
  • twitter
  • facebook
  • youtube
  • github
  • play store
  • Contact
  • YouTube Channel
  • Join Discord (Chat Here)
  • Spyboy Bot
  • Download Our Apps
    • Spyboy App
    • C Programming
    • C++ Programming
    • Java Programming
Skip to content

Spyboy blog

Learn ethical hacking , networking, social engineering, cyber security, pen-testing, linux, android windows tricks.

  • Home
  • Tech hacks
  • Linux
  • Windows Tricks
  • Android Tricks
  • Networking
  • More
    • CEH
    • iphone
    • Programming
    • Virus Creation
    • Tweak windows
    • uncategorized

Category: Uncategorized

January 21, 2022 Uncategorized

Kali Linux: Reset Password

Let’s see how to reset the root password in Kali Linux. Join Our Discord Hacking Server: https://discord.gg/ZChEmMwE8d h Invite Our Cybersec Bot: https://dsc.gg/spyo

Continue reading

February 17, 2021 Uncategorized

SSH for remote access on Linux

This article explains how to configure two computers for secure shell (SSH) connections, and how to securely connect from one

Continue reading

February 17, 2021 Uncategorized

Zint: QR codes Generator

QR stands for “Quick Response.” While they may look simple, QR codes are capable of storing lots of data. But no matter how

Continue reading

February 17, 2021 Uncategorized

Open source VPN tools

Perks of OpenVPN solutions OpenVPN is one of the power players in the online privacy world. It is an open

Continue reading

February 4, 2021 Uncategorized

Instagram: Sites to Buy Followers

Viralyft This website can be used to buy a mass number of followers at an affordable rate without compromising quality,

Continue reading

January 31, 2021 Uncategorized

Protected: RedRabbit : Pen-Testing & Post-Exploitation for Windows

There is no excerpt because this is a protected post.

January 29, 2021 Uncategorized

Protected: Zydra : Crack Password-Protected ZIP Files, PDFs & More

There is no excerpt because this is a protected post.

January 26, 2021 Uncategorized

Extend Context(right lick)-Menu in Windows

Even though there are already many tools available through the right-click context-menu in Windows, some users still desire more tools

Continue reading

December 5, 2020 Networking / Uncategorized

Automatically Post WordPress Posts to Discord

I F T T T is short for If This Then That.  Using IFTTT you can easily automate WordPress to

Continue reading

December 5, 2020 Uncategorized

Bot to fix Python indentation error

Making a bot to fix indentation error in python. fixing: IndentationError: unexpected There are times when you need to press

Continue reading

November 12, 2020 Uncategorized

Customize your Mac terminal using figlet

There are many ways you can customize your Mac OS X terminal. One way I customize my terminal was by

Continue reading

October 19, 2020 Uncategorized

Create Bootable USB with Persistence for Kali Linux

Recently I was trying to install Kali Live on a USB drive with persistence and struggled to find a tutorial

Continue reading

August 14, 2020 CEH / Uncategorized

CEH – Footprinting

Total No. of Questions = 20 1. Which of the following best describes footprinting? A) Enumeration of services B) Discovery

Continue reading

July 19, 2020 Linux / Networking / Uncategorized

[Fixed] No WiFi Adapter Found in Kali Linux

When we install Kali Linux on Desktop or Laptop we didn’t connect it with Wi-Fi. Sometimes internal WiFi adapter not

Continue reading

July 9, 2020 Uncategorized

Best Websites to Download Free Books

There are plenty of sites available out that there on the internet that offers free ebooks. In this article, we

Continue reading

July 6, 2020 Linux / Networking / Uncategorized

Tech Behind Web Application: Whatweb

It is very important to know what technology behind a web app before going against it. Like it would be

Continue reading

June 19, 2020 Linux / Uncategorized

DKMC – Wonderful Malicious Payload Evasion Tool

Windows would be one of our common targets since it is the most used operating system in the corporate environment.

Continue reading

June 19, 2020 Android Tricks / Linux / Networking / Uncategorized

Persistent Backdoor In Android Using Kali Linux With A Shell Script

Hello guys, today we’re going to show you how hackers can create a persistent backdoor in android using Kali Linux

Continue reading

June 16, 2020 Linux / Networking / Uncategorized

How Hackers Phish for Social Media & Other Account Passwords with BlackEye

Social media accounts are a favourite target for hackers, and the most effective tactics for attacking accounts on websites like

Continue reading

June 13, 2020 Networking / Uncategorized

How To Secure Your Wi-Fi Network In Few Steps.

Internet users are widely using Wi-Fi devices to access the Internet. Every year millions of wireless-based devices are sold in

Continue reading

June 12, 2020 Linux / Networking / Uncategorized

Find Vulnerable Webcams With Shodan [Metasploit Framework]

As we all know that, Shodan is one of the most popular and dangerous search engines which gives you all

Continue reading

June 7, 2020 Android Tricks / iphone / Linux / Networking / Programming / Tech hacks / Uncategorized / Windows Tricks

FREE Learning Material For All Programming Languages – GitHub

As you know GITHUB is one of the most popular brands in the programming world. It is one of the largest

Continue reading

March 23, 2020 Uncategorized

Mirror Android phone to PC – Use Open-Source Scrcpy To Control Android Via Windows & macOS

At present, there are dozens of apps that offer mirror Android phone to PC, but the matter of fact is that

Continue reading

March 23, 2020 Notepad Tricks / Programming / Uncategorized / Windows Tricks

How to make your computer welcome you

Do you watch movies? Have you always loved the way how Computers in movies welcome their users by calling out

Continue reading

April 25, 2018 Uncategorized

How To Protect External Hard Disk Drives With Password

Time to protect your external Hard Drive with encryption for securing your data from unauthorized access. We are going to

Continue reading

March 29, 2018 Uncategorized

Change Window User Password without Knowing Old Password

Everyone knows Windows is the secured system. You can’t enter into the system without a password. You can’t change the

Continue reading

March 19, 2017 Uncategorized

Forgot Android Pattern Lock, here how you can recover your phone

METHOD I Solution For Everyone With Recovery (Cwm, Twrp, Xrec,Etc…) Installed: INSTRUCTIONS: 1. Download this zip Pattern Password Disable (Download

Continue reading

March 19, 2017 Uncategorized

How To Access Same LAN Computers?

If you are working in Office / Colleges and want to hack your friends & college mate PC then here

Continue reading

January 18, 2017 Tech hacks / Uncategorized / Windows Tricks

Access WiFi Password With CMD

You can experiment these trick with your neighbours or friends. It’s not necessarily that this trick will work with every

Continue reading

August 31, 2016 Uncategorized

Take a look at “spyboy”

Hey, guys finally Spyboy app is live on play store download it. Download Spyboy App Includes all the contents of

Continue reading

April 10, 2016 Android Tricks / Programming / Uncategorized

Best Android Apps For Developers or Programmers

For users who love to code programs, we are here with Best Android Apps For Developers & Programmers. Today the time

Continue reading

February 19, 2016 Tech hacks / Uncategorized

How Hackers Look Like and What They Think?

Nearly all hackers completed college or reached that level by self-education. Self-educated hackers are more respected in hacker’s community because that person is

Continue reading

January 26, 2016 Uncategorized

41 Toughest Google Job Interview Questions

It’s not a hidden fact that Google asks mind-bending questions at job interviews. These questions are asked to check your

Continue reading

January 7, 2016 Uncategorized

2015 in review

The WordPress.com stats helper monkeys prepared a 2015 annual report for this blog. Here’s an excerpt: The concert hall at

Continue reading

September 2, 2015 Uncategorized

How To Become Ethical Hacker (10 Steps)

# 10 Steps To Be A Ethical Hacker A hacker is basically someone who breaks into computer networks or standalone

Continue reading

January 11, 2015 Uncategorized

Product Keys For Windows 8 || 100% Working Serial Keys

Windows 8 is one of the most elegant operating windows ever made by Microsoft. Why Windows 8th is special? Windows

Continue reading

December 22, 2014 Programming / Tech hacks / Uncategorized

Enable the Hidden Administrator Account on Windows 7, 8 & 8.1

Windows automatically creates an Administrator account with elevated privileges during the installation process. We mostly need to access it to

Continue reading

December 22, 2014 Tech hacks / Uncategorized

Speed Up a Slow Windows 8, 8.1, 7 or XP Computer

Having a slow computer is not something most users fancy, but that is what most of us end up with

Continue reading

Advertisements

View our recent work on - spyboy.in

Blog Stats

  • 10,512,113 hits

Search this site

# Add Hacker's Bot Spyo - invte here

Discord Bots

# Hacker's server - chat here

Discord Server

C – Programming App

Get it on Google Play

C++ Programming App

Get it on Google Play

Java – Programming App

Get it on Google Play

Follow Us Here

  • Instagram
  • Facebook
  • YouTube
  • Google
  • Twitter
  • Discord

Categories

  • Android Tricks (83)
  • CEH (9)
  • iphone (3)
  • Linux (110)
  • Networking (265)
  • Notepad Tricks (38)
  • Pc Registry Tricks (16)
  • Programming (97)
  • Tech hacks (272)
  • Uncategorized (38)
  • Windows Tricks (164)
Advertisements

Recent Posts

  • Know if your emails has been opened or not !! April 24, 2022
  • Read free without subscription March 14, 2022
  • Proxychain March 4, 2022
  • Top 5 Mac mind mapping software to effortlessly organize your thoughts February 21, 2022
  • Install required packages automatically for a python script February 18, 2022
  • Beef-XSS – Cloning websites February 17, 2022
  • Reverse shell over TOR network using hidden services – Poiana February 16, 2022
  • Recover an Overwritten File on Mac February 15, 2022
  • Making Sure Your Cloud Solution Is Right for Your Business February 1, 2022
  • Kali Linux: Reset Password January 21, 2022
  • Use Kali linux On Android without root January 8, 2022
  • H1deM3 – hide messages in messages November 29, 2021
  • Doxing October 21, 2021
  • Hacking – Getting started October 19, 2021
  • Nmap – How to Use Nmap September 3, 2021
  • Website copier – clone any website September 3, 2021
  • Dnspeep – look what DNS Queries Your pc Is Making April 28, 2021
  • Use phone As Rubber Ducky Against Another phone April 28, 2021
  • 2021 – Best Ethical Hacking Tools & apps for Hackers April 28, 2021
  • ALL IN ONE Hacking Tool For Hackers April 28, 2021
  • Android PIN Bruteforce – Unlock Lockscreen PIN April 28, 2021
  • SSH for remote access on Linux February 17, 2021
  • Zint: QR codes Generator February 17, 2021
  • Open source VPN tools February 17, 2021
  • Instagram: Sites to Buy Followers February 4, 2021
  • Protected: RedRabbit : Pen-Testing & Post-Exploitation for Windows January 31, 2021
  • Protected: Zydra : Crack Password-Protected ZIP Files, PDFs & More January 29, 2021
  • Extend Context(right lick)-Menu in Windows January 26, 2021
  • Iron Man Jarvis AI Desktop Voice Assistant | in Python January 12, 2021
  • What is a Zero-Day Exploit? January 5, 2021
  • PhpSploit – post exploitation framework January 5, 2021
  • Protected: Create an Undetectable Payload,(hide the Payload) December 7, 2020
  • Protected: Create an Undetectable Payload (Bypass Antivirus) December 7, 2020
  • How to use a Router as a Wireless Adapter December 5, 2020
  • How to protect your server(website) from DDoS attacks December 5, 2020
  • DDoS attack using SlowHTTPTest (Slowloris) in Kali Linux December 5, 2020
  • Hulk DDoS : Installation & Usage with Examples December 5, 2020
  • Kali Linux Hydra Tool Example December 5, 2020
  • Top DDoS Attack Tools December 5, 2020
  • Automatically Post WordPress Posts to Discord December 5, 2020
  • Bot to fix Python indentation error December 5, 2020
  • Make a Persistent payload in Android Using Kali December 3, 2020
  • Installing Selenium and ChromeDriver on Windows December 1, 2020
  • Turn a Pen Drive into a USB Rubber Ducky November 30, 2020
  • Make A WhatsApp Spammer November 27, 2020
  • Gadgets for hacker November 21, 2020
  • Use SSH Tunnels to Forward Requests & Access Remote Routers November 15, 2020
  • How hackrs Brute-Force Almost Any Website November 15, 2020
  • Scan Web Applications for Common Vulnerabilities Using Metasploit’s WMAP November 15, 2020
  • Nikto – Scan Any Website for Vulnerabilities November 12, 2020
  • Customize your Mac terminal using figlet November 12, 2020
  • Termux !! Full Tutorial With Termux commands November 12, 2020
  • Make Cool linux Terminal Header November 12, 2020
  • How hackers Remotely access Android Using payload November 8, 2020
  • Make a Dead Man’s Switch to Delete & Encrypt Files if something happens to you October 30, 2020
  • How Hackers Break into Somebody’s Computer and Exploit the System October 19, 2020
  • Create Bootable USB with Persistence for Kali Linux October 19, 2020
  • How hackers Bypass Locked Windows Computers to Run Kali Linux from a Live USB October 19, 2020
  • Run Kali Linux on Windows without installing October 19, 2020
  • Make Your Own Evil USB October 19, 2020
  • Find Sensitive & ‘Deleted’ Files Remotely October 12, 2020
  • Capture Keystrokes & Passwords Remotely October 12, 2020
  • Remotely Record & Listen to the Microphone of a Hacked Computer October 6, 2020
  • How hackers Break into Somebody’s Computer Without a Password September 21, 2020
  • Different Types Of Hackers September 6, 2020
  • How to Manage Big Password lists September 6, 2020
  • How Hackers BruteForce Gmail, Hotmail, Twitter, Facebook & Netflix September 6, 2020
  • Google Hacking Tool – uDork September 6, 2020
  • Make All Your Internet Traffic Anonymized-TorghostNG September 4, 2020
  • Facebook Brute Forcer In Shellscript Using TOR – Facebash September 1, 2020
  • SocialBox – A Bruteforce Attack Framework (Facebook, Gmail, Instagram, Twitter) September 1, 2020
  • Instagram-Py – Simple Instagram Brute Force Script September 1, 2020
  • HiddenEye – Phishing Tool With Advanced Functionality (Support – Android) August 31, 2020
  • Stalk Your Friends social media accounts Using Image Recognition And Reverse Image Search – EagleEye August 30, 2020
  • How hackers access WiFi Passwords in Minutes – Fluxion August 23, 2020
  • Send and Receive Files Anonymously August 22, 2020
  • How to Hide a Phishing Link August 22, 2020
  • CEH – Enumeration August 14, 2020
  • CEH – Scanning August 14, 2020
  • CEH – Footprinting August 14, 2020
  • Best Websites For Free IP Lookup August 5, 2020
  • Top 10 Most Dangerous Viruses Of All Times August 5, 2020
  • Top 50+Penetration Testing Interview Questions Most August 5, 2020
  • CEH – Cryptography July 29, 2020
  • CEH – System Fundamentals July 29, 2020
  • CEH – Introduction July 29, 2020
  • CEH – Assessment Test July 24, 2020
  • Google Dorks For Bug Bounty Hunters July 24, 2020
  • [Fixed] No WiFi Adapter Found in Kali Linux July 19, 2020
  • A Web Path Scanner: DirSearch July 19, 2020
  • Best WiFi Adapter For Kali Linux in 2020 -WiFi Adapter with Monitor Mode July 18, 2020
  • How To Turn Your Android Device Into Full Functional Computer July 17, 2020
  • How to Customize the Right-click Menu on Windows 10 July 16, 2020
  • RUN CMD Commands With a Desktop Shortcut on Windows 10 July 15, 2020
  • Best Google Search Tricks & Tips July 15, 2020
  • Best Virtual Phone Number Apps For Account Verifications July 13, 2020
  • The Deep Magic: Dmitry July 12, 2020
  • Powerful Websites That Can Replace Your PC Software July 9, 2020
  • How To Install Multiple Bootable Operating Systems On One USB July 9, 2020
  • Torrent Proxy Sites List 2020 (100% Working Mirror Sites) July 9, 2020
  • Best Websites to Download Free Books July 9, 2020
  • Best CMD Commands Used By Hackers July 9, 2020
  • How To Activate the New Start Menu of Windows 10 July 9, 2020
  • Shodan — The Most Dangerous Search Engine July 8, 2020
  • Tech Behind Web Application: Whatweb July 6, 2020
  • Hide Secrets in Pictures: Steghide July 6, 2020
  • Port Forwarding using SSH July 6, 2020
  • Advanced Lazy Automated Phishing Script: ZPhisher July 5, 2020
  • How Hackers access Wi-Fi Networks: AirCrack July 4, 2020
  • Take Total Control on Android Remotely: HaxRat July 3, 2020
  • Advanced Phishing | Bypass Two Factor Authentication – Modlishka July 2, 2020
  • Trape: People Tracker On the Internet July 1, 2020
  • SpiderFoot: OSINT Reconnaissance Tool July 1, 2020
  • Recon-ng: Information Gathering with Open Source Intelligence June 30, 2020
  • How To Send Anonymous Text, Emails, Media Files using Utopia June 28, 2020
  • Find Social Media Accounts: Userrecon June 26, 2020
  • Find Social Media Profiles Using a Photo Only: Social Mapper June 26, 2020
  • Monitor Other People Image Files over Network June 25, 2020
  • How Hackers Control Front Camera of Mobile and PC: CamPhish June 24, 2020
  • Make A Private Search Engine And Secure Your Privacy June 24, 2020
  • How To Host Your Own .onion Website in Dark Web June 22, 2020
  • Host a Local Website with Domain Name on Kali Linux over WiFi June 22, 2020
  • How Hackers Can Access Android Devices Remotely Using L3MON June 22, 2020
  • Retrieve All Passwords With LaZagne Project June 19, 2020
  • DKMC – Wonderful Malicious Payload Evasion Tool June 19, 2020
  • Persistent Backdoor In Android Using Kali Linux With A Shell Script June 19, 2020
  • Hack The Box: How to get invite code June 18, 2020
  • WordPress Security Scanner – WPSeku June 18, 2020
  • SEToolkit – Credential Harvester Attack [Tutorial] June 18, 2020
  • Top Vulnerable Websites To Practice Your Skills June 17, 2020
  • How Hackers Access A Website With Ngrok, Msfvenom And Metasploit Framework June 17, 2020
  • How Hackers Phish for Social Media & Other Account Passwords with BlackEye June 16, 2020
  • How To Track Someone’s exact Geolocation Over Internet June 15, 2020
  • Ultimate Phishing Tool With Ngrok –SocialFish June 15, 2020
  • Bruteforce Password Cracking With Medusa – Kali Linux June 14, 2020
  • Shcheck – Tool To Scan Security Headers Of Any Website June 14, 2020
  • Top 5 Wireless Penetration Testing Tools June 13, 2020
  • Create Hotspot On Windows 10 In 6 Steps June 13, 2020
  • How To Secure Your Wi-Fi Network In Few Steps. June 13, 2020
  • Find Vulnerable Webcams With Shodan [Metasploit Framework] June 12, 2020
  • Change Windows Password Of Remote PC Via METASPLOIT June 10, 2020
  • SSLKILL – Forced Man In The Middle Attack – Sniff HTTPS/HTTP June 10, 2020
  • How Hackers access Web Browsers with BeEF to Control Webcams, Phish for Credentials & More June 9, 2020
  • Kick-Off or Limit The Speed Of Other Devices On Your Network(Wifi) June 8, 2020
  • How Hacker Access Windows 10 Using CHAOS Framework June 8, 2020
  • FREE Learning Material For All Programming Languages – GitHub June 7, 2020
  • Setup Honeypot In Kali Linux With Pentbox June 7, 2020
  • Gloom – Linux Penetration Testing Framework June 6, 2020
  • Most Popular Useful Kali Linux Hacking Tools June 6, 2020
  • How Hacker access Android Using Metasploit Without Port Forwarding Over Internet June 5, 2020

Buy Me A Coffee

Buy Me A Coffee

(^^)

500 ₹

Advertisements

like us on facebook

like us on facebook
Advertisements

Follow me on Twitter

My Tweets

Blog Stats

  • 10,512,113 hits

Enter your email address to subscribe to this blog and receive notifications of new posts by email.

Join 8,588 other followers

  • instagram
  • twitter
  • facebook
  • youtube
  • github
  • play store
Create a website or blog at WordPress.com
  • Follow Following
    • Spyboy blog
    • Join 8,588 other followers
    • Already have a WordPress.com account? Log in now.
    • Spyboy blog
    • Customize
    • Follow Following
    • Sign up
    • Log in
    • Report this content
    • View site in Reader
    • Manage subscriptions
    • Collapse this bar
 

Loading Comments...