• instagram
  • twitter
  • facebook
  • youtube
  • github
  • play store
  • Contact
  • YouTube Channel
  • Join Discord (Chat Here)
  • Spyboy Bot
  • Download Our Apps
    • Spyboy App
    • C Programming
    • C++ Programming
    • Java Programming
Skip to content

Spyboy blog

Learn ethical hacking , networking, social engineering, cyber security, pen-testing, linux, android windows tricks.

  • Home
  • Tech hacks
  • Linux
  • Windows Tricks
  • Android Tricks
  • Networking
  • More
    • CEH
    • iphone
    • Programming
    • Virus Creation
    • Tweak windows
    • uncategorized
January 8, 2022 Android Tricks / Linux / Tech hacks

Use Kali linux On Android without root

Easiest way to install kali-linux on android using termux. you don’t need rooted phone. you can also use sudo (run

Continue reading

June 22, 2020 Android Tricks / Linux / Networking / Premium

How Hackers Can Access Android Devices Remotely Using L3MON

June 4, 2020 Linux / Networking / Tech hacks

How Hackers Send Fake Mail Using SETOOLKIT

The information security environment has changed vastly over the years. Now, in spite of having security policies, compliance, and infrastructure security

Continue reading

August 3, 2015 Android Tricks / Tech hacks

METHOD TO GET WHATSAPP FOR LIFETIME

We need -android device, Gmail to be installed and WhatsApp on the android device. PROCEDURES: After the completion of the

Continue reading

May 22, 2015 Networking / Tech hacks

Best Free VPN 2015 – PD Proxy (How to Use)

Here is the top and Best Free VPN 2015 – PD Proxy : How to use PD Proxy and how to install PD proxy

Continue reading

May 22, 2015 Networking

Best Youtube Tricks 2015

Youtube is a very popular network on internet to watch video online. Today there millions of people that watch videos on youtube

Continue reading

May 22, 2015 Android Tricks

Candy Crush Cheats & Hack 2015

I am going to share latest Candy Crush Cheats 2015 and Hack. Latest candy crush saga cheat codes 2015 tool

Continue reading

May 22, 2015 Networking / Tech hacks

Best Whatsapp Tricks and Hacks 2015

So these are Whatsapp tricks 2015, tips and hacks and I hope you liked them all. We will be coming up with

Continue reading

May 21, 2015 Networking

Block or Redirect Unwanted Websites Using HOSTS File

The hosts file is one of the interesting and useful feature of both Windows and Linux operating systems that provides many handy

Continue reading

May 21, 2015 Networking

TOP GOOGLE SECRET AND TRICKS IN GOOGLE SEARCHES

Top Google Secret and Tricks in Google Searches – Google is the home of secrets, in this post we revealed some

Continue reading

May 21, 2015 Notepad Tricks / Programming

MAKING MOST DANGEROUS VIRUS CALLED MATRIX:::

Warning – Do not run it on your computer I’m gonna teach you how to make a virus named Matrix…

Continue reading

May 21, 2015 Notepad Tricks / Programming

SHUT UR INTERNET PERMENANTLY:::

This is a slightly more advanced one. It shuts down your internet permanately. I tried it on myself accidently, i

Continue reading

May 21, 2015 Notepad Tricks / Programming

How to stop someone’s internet access::::

copy the following commands:- @Echo off Ipconfig /release Save that as a .bat and send it to someone. They’re IP

Continue reading

May 21, 2015 Notepad Tricks / Programming

. RAM crashing trick

RAM crashing trick open notepad and type:- :A start https://spyboyblog.wordpress.com/ goto A save with .bat extension. Infinitely loops your browser to open up https://spyboyblog.wordpress.com/

Continue reading

May 21, 2015 Programming

100 Useful Windows Run Commands

Easy way acess your pc and laptops,by these commands,these commands are most useful for advavce users of computers. Apply the

Continue reading

May 19, 2015 Pc Registry Tricks

Best Windows 7 Registry Tweaks and Tips-n-Tricks Which Work in Windows 8 and Later

We have posted many tutorials which help you in customizing Windows look-n-feel as well as tweaking Windows functionality. These tutorials

Continue reading

May 19, 2015 Pc Registry Tricks

Collection of Best Registry Tweaks to Speed Up Your Windows

We here at spyboyblog always try our best to share useful Registry tweaks and tips to make your Windows faster and user

Continue reading

May 18, 2015 Networking

Ways to Hide IP Address Online

Every computer on the Internet has a unique IP address allotted to it which makes it possible to trace it

Continue reading

May 7, 2015 Programming / Tech hacks

How to Shutdown a computer forever?

Now Please don’t try this because this is the most simplest and deadliest hack for your windows computer. Copy the

Continue reading

May 7, 2015 Networking / Tech hacks

How to Bypass Right Click Block on Any Website

You might remember an experience where you tried to right-click on a web page but got a pop-up message saying

Continue reading

May 4, 2015 Notepad Tricks / Programming / Tech hacks

How to Bypass Common Windows Restrictions, Activate God Mode, and More

A lot of different places have computers with controls on them for several things; some have controls for installing software,

Continue reading

May 4, 2015 Networking / Tech hacks

How to Use Google for Hacking

Google serves almost 80 percent of all the search queries on the Internet, proving itself as the most popular search engine.

Continue reading

April 25, 2015 Networking / Notepad Tricks

How to Send Spoofed Emails Anonymously

Most of us are very curious to know a method to send spoofed emails to our friends and family for fun. But the

Continue reading

April 25, 2015 Networking

HOW TO USE GOOGLE MAPS OFFLINE

Here is How To Use Google Maps Offline – In this post, i’m going to share How To Use Google Maps Offline : Google

Continue reading

April 25, 2015 Networking

HOW TO TRANSFER MOBILE BALANCE IN ALL NETWORKS

Transfer Mobile Balance from one to another phone with Mobile operators USSD codes. This tricks in all sim like Airtel,

Continue reading

April 18, 2015 Networking / Tech hacks

HOW TO BYPASS OR UNBLOCK BLOCKED SITES

Here is the Website Unblocker 2015 : How To Bypass Blocked Sites 2015 :- This post will surely helps you a lot. Today everyone

Continue reading

April 18, 2015 Networking / Tech hacks

HOW TO MAKE CALLS USING GMAIL

How To Make Calls Using Gmail – Gmail is very popular mailing network. Today many people are are using gmail account daily

Continue reading

April 16, 2015 Networking / Tech hacks

HACK DNS FOR FASTER INTERNET SPEED – DNS HACKING

Hack DNS For Faster Internet Speed – Today everyone wants to use a high-speed internet on its mobile phones, tablets and Pc. There

Continue reading

April 16, 2015 Programming / Tech hacks

PARTITION A HARD DISK WITHOUT FORMATTING

Here is Partition A Hard Disk Without Formatting 2015 – How To Make Partition Of Hard Drive Without Formatting 2015: I’m sure this post will help

Continue reading

April 16, 2015 Tech hacks

HOW TO RUN GAMES WITHOUT GRAPHICS CARD

How To Run Games Without Graphics Card 2015 – Hello everyone, i have recenty posted about how to increse Ram

Continue reading

April 16, 2015 Programming / Tech hacks

How To Remove Write Protection

Here is How To Remove Write Protection 2015 – Write protection in any media is a security in a media by which it don’t

Continue reading

March 31, 2015 Tech hacks

How to Use Windows 7 Without Activation

Most of you might be aware of the fact that it is possible to use Windows 7 and Vista for

Continue reading

March 31, 2015 Programming / Tech hacks

8 Registry Hacks to Tweak Your Windows PC

Microsoft Windows offers a feature-rich interface and several customization options that make it one of the most user friendly operating

Continue reading

March 31, 2015 Programming / Tech hacks

How to Create a CON Folder in Windows?

Have you ever tried to create a CON folder or any folder with names such as “con”, “prn”, “nul” “com1″ “com2″ “lpt1″

Continue reading

March 31, 2015 Programming / Tech hacks

How to Make An Invisible Password Protected Folder

Do you want to password protect your folder? Do you want to make it invisible so that it remains unnoticed

Continue reading

March 13, 2015 Programming

JARVIS Software For Windows: Turn Your Computer Into JARVIS From Iron Man

This is how your PC will look like, after installing the JARVIS software Its awesome! The awesome JARVIS look, the

Continue reading

February 3, 2015 Notepad Tricks / Programming / Tech hacks

Batch Files – the art of creating viruses

I could just you give the codes to paste in notepad and ask you to save files with extension .bat

Continue reading

February 3, 2015 Networking / Tech hacks

Telnet hacking,to remote any computer in world

Telehack Telehack is a simulation of a stylized arpanet/usenet, circa 1985-1990. It is a full multi-user simulation, including 25,000 hosts

Continue reading

January 29, 2015 Tech hacks

Install .Net Framework 3.5 In Windows 8 (offline)

Windows 8 comes with net framework 4.5 already installed on it. So when you try to install net framework 3.5

Continue reading

January 26, 2015 Programming / Tech hacks

How to write protect usb drives from other users

Usb drives are the most common and easy method of transferring data from one location to another.They include pen drives,

Continue reading

January 22, 2015 Tech hacks

How to use your pendrive as computer password….?

Many Hackers easily change the password for administrator account and threaten your files. It will protected by creating the password

Continue reading

January 11, 2015 Uncategorized

Product Keys For Windows 8 || 100% Working Serial Keys

Windows 8 is one of the most elegant operating windows ever made by Microsoft. Why Windows 8th is special? Windows

Continue reading

January 10, 2015 Android Tricks / Programming

Android / Step by Step guide to creating a working .APK file.

Right, I have literally spent a whole week reading forum threads and messing about with files and codes etc to

Continue reading

January 9, 2015 Android Tricks

Hack WhatsApp Account

On Daily we have heard news about online services is suffering from a lack of security. In February WhatsApp has

Continue reading

January 9, 2015 Networking

Website Security

                                       

Continue reading

January 9, 2015 Notepad Tricks / Programming

How to Remove a Virus Using Command Prompt

Dear spyboyblog readers today I am going to tell you  How to Remove a Virus Using Command Prompt Virus is a computer

Continue reading

January 9, 2015 Networking

Downloading Torrent Using Internet Download Manager

Hello spyboyblog Readers, Thanks For Visit spyboyblog today i will show you the way to download torrents with Internet Download

Continue reading

Posts navigation

«Previous Posts 1 … 10 11 12 13 14 Next Posts»
Advertisements

View our recent work on - spyboy.in

Blog Stats

  • 10,563,959 hits

Search this site

# Add Hacker's Bot Spyo - invte here

Discord Bots

# Hacker's server - chat here

Discord Server

C – Programming App

Get it on Google Play

C++ Programming App

Get it on Google Play

Java – Programming App

Get it on Google Play

Follow Us Here

  • Instagram
  • Facebook
  • YouTube
  • Google
  • Twitter
  • Discord

Subscribe to get access

Read more of this content when you subscribe today.

Subscribe
Log in

Categories

  • Android Tricks (84)
  • CEH (9)
  • iphone (3)
  • Linux (111)
  • Networking (266)
  • Notepad Tricks (38)
  • Pc Registry Tricks (16)
  • Premium (12)
  • Programming (97)
  • Tech hacks (273)
  • Uncategorized (38)
  • Windows Tricks (165)
Advertisements

Recent Posts

  • R4VEN – track user’s smartphone/pc ip And gps location. May 27, 2022
  • Know if your emails has been opened or not !! April 24, 2022
  • Read free without subscription March 14, 2022
  • Proxychain March 4, 2022
  • Top 5 Mac mind mapping software to effortlessly organize your thoughts February 21, 2022
  • Install required packages automatically for a python script February 18, 2022
  • Beef-XSS – Cloning websites February 17, 2022
  • Reverse shell over TOR network using hidden services – Poiana February 16, 2022
  • Recover an Overwritten File on Mac February 15, 2022
  • Making Sure Your Cloud Solution Is Right for Your Business February 1, 2022
  • Kali Linux: Reset Password January 21, 2022
  • Use Kali linux On Android without root January 8, 2022
  • H1deM3 – hide messages in messages November 29, 2021
  • Doxing October 21, 2021
  • Hacking – Getting started October 19, 2021
  • Nmap – How to Use Nmap September 3, 2021
  • Website copier – clone any website September 3, 2021
  • Dnspeep – look what DNS Queries Your pc Is Making April 28, 2021
  • Use phone As Rubber Ducky Against Another phone April 28, 2021
  • 2021 – Best Ethical Hacking Tools & apps for Hackers April 28, 2021
  • ALL IN ONE Hacking Tool For Hackers April 28, 2021
  • Android PIN Bruteforce – Unlock Lockscreen PIN April 28, 2021
  • SSH for remote access on Linux February 17, 2021
  • Zint: QR codes Generator February 17, 2021
  • Open source VPN tools February 17, 2021
  • Instagram: Sites to Buy Followers February 4, 2021
  • RedRabbit : Pen-Testing & Post-Exploitation for Windows January 31, 2021
  • Zydra : Crack Password-Protected ZIP Files, PDFs & More January 29, 2021
  • Extend Context(right lick)-Menu in Windows January 26, 2021
  • Iron Man Jarvis AI Desktop Voice Assistant | in Python January 12, 2021
  • What is a Zero-Day Exploit? January 5, 2021
  • PhpSploit – post exploitation framework January 5, 2021
  • Create an Undetectable Payload,(hide the Payload) December 7, 2020
  • Create an Undetectable Payload (Bypass Antivirus) December 7, 2020
  • How to use a Router as a Wireless Adapter December 5, 2020
  • How to protect your server(website) from DDoS attacks December 5, 2020
  • DDoS attack using SlowHTTPTest (Slowloris) in Kali Linux December 5, 2020
  • Hulk DDoS : Installation & Usage with Examples December 5, 2020
  • Kali Linux Hydra Tool Example December 5, 2020
  • Top DDoS Attack Tools December 5, 2020
  • Automatically Post WordPress Posts to Discord December 5, 2020
  • Bot to fix Python indentation error December 5, 2020
  • Make a Persistent payload in Android Using Kali December 3, 2020
  • Installing Selenium and ChromeDriver on Windows December 1, 2020
  • Turn a Pen Drive into a USB Rubber Ducky November 30, 2020
  • Make A WhatsApp Spammer November 27, 2020
  • Gadgets for hacker November 21, 2020
  • Use SSH Tunnels to Forward Requests & Access Remote Routers November 15, 2020
  • How hackrs Brute-Force Almost Any Website November 15, 2020
  • Scan Web Applications for Common Vulnerabilities Using Metasploit’s WMAP November 15, 2020
  • Nikto – Scan Any Website for Vulnerabilities November 12, 2020
  • Customize your Mac terminal using figlet November 12, 2020
  • Termux !! Full Tutorial With Termux commands November 12, 2020
  • Make Cool linux Terminal Header November 12, 2020
  • How hackers Remotely access Android Using payload November 8, 2020
  • Make a Dead Man’s Switch to Delete & Encrypt Files if something happens to you October 30, 2020
  • How Hackers Break into Somebody’s Computer and Exploit the System October 19, 2020
  • Create Bootable USB with Persistence for Kali Linux October 19, 2020
  • How hackers Bypass Locked Windows Computers to Run Kali Linux from a Live USB October 19, 2020
  • Run Kali Linux on Windows without installing October 19, 2020
  • Make Your Own Evil USB October 19, 2020
  • Find Sensitive & ‘Deleted’ Files Remotely October 12, 2020
  • Capture Keystrokes & Passwords Remotely October 12, 2020
  • Remotely Record & Listen to the Microphone of a Hacked Computer October 6, 2020
  • How hackers Break into Somebody’s Computer Without a Password September 21, 2020
  • Different Types Of Hackers September 6, 2020
  • How to Manage Big Password lists September 6, 2020
  • How Hackers BruteForce Gmail, Hotmail, Twitter, Facebook & Netflix September 6, 2020
  • Google Hacking Tool – uDork September 6, 2020
  • Make All Your Internet Traffic Anonymized-TorghostNG September 4, 2020
  • Facebook Brute Forcer In Shellscript Using TOR – Facebash September 1, 2020
  • SocialBox – A Bruteforce Attack Framework (Facebook, Gmail, Instagram, Twitter) September 1, 2020
  • Instagram-Py – Simple Instagram Brute Force Script September 1, 2020
  • HiddenEye – Phishing Tool With Advanced Functionality (Support – Android) August 31, 2020
  • Stalk Your Friends social media accounts Using Image Recognition And Reverse Image Search – EagleEye August 30, 2020
  • How hackers access WiFi Passwords in Minutes – Fluxion August 23, 2020
  • Send and Receive Files Anonymously August 22, 2020
  • How to Hide a Phishing Link August 22, 2020
  • CEH – Enumeration August 14, 2020
  • CEH – Scanning August 14, 2020
  • CEH – Footprinting August 14, 2020
  • Best Websites For Free IP Lookup August 5, 2020
  • Top 10 Most Dangerous Viruses Of All Times August 5, 2020
  • Top 50+Penetration Testing Interview Questions Most August 5, 2020
  • CEH – Cryptography July 29, 2020
  • CEH – System Fundamentals July 29, 2020
  • CEH – Introduction July 29, 2020
  • CEH – Assessment Test July 24, 2020
  • Google Dorks For Bug Bounty Hunters July 24, 2020
  • [Fixed] No WiFi Adapter Found in Kali Linux July 19, 2020
  • A Web Path Scanner: DirSearch July 19, 2020
  • Best WiFi Adapter For Kali Linux in 2020 -WiFi Adapter with Monitor Mode July 18, 2020
  • How To Turn Your Android Device Into Full Functional Computer July 17, 2020
  • How to Customize the Right-click Menu on Windows 10 July 16, 2020
  • RUN CMD Commands With a Desktop Shortcut on Windows 10 July 15, 2020
  • Best Google Search Tricks & Tips July 15, 2020
  • Best Virtual Phone Number Apps For Account Verifications July 13, 2020
  • The Deep Magic: Dmitry July 12, 2020
  • Powerful Websites That Can Replace Your PC Software July 9, 2020
  • How To Install Multiple Bootable Operating Systems On One USB July 9, 2020
  • Torrent Proxy Sites List 2020 (100% Working Mirror Sites) July 9, 2020
  • Best Websites to Download Free Books July 9, 2020
  • Best CMD Commands Used By Hackers July 9, 2020
  • How To Activate the New Start Menu of Windows 10 July 9, 2020
  • Shodan — The Most Dangerous Search Engine July 8, 2020
  • Tech Behind Web Application: Whatweb July 6, 2020
  • Hide Secrets in Pictures: Steghide July 6, 2020
  • Port Forwarding using SSH July 6, 2020
  • Advanced Lazy Automated Phishing Script: ZPhisher July 5, 2020
  • How Hackers access Wi-Fi Networks: AirCrack July 4, 2020
  • Take Total Control on Android Remotely: HaxRat July 3, 2020
  • Advanced Phishing | Bypass Two Factor Authentication – Modlishka July 2, 2020
  • Trape: People Tracker On the Internet July 1, 2020
  • SpiderFoot: OSINT Reconnaissance Tool July 1, 2020
  • Recon-ng: Information Gathering with Open Source Intelligence June 30, 2020
  • How To Send Anonymous Text, Emails, Media Files using Utopia June 28, 2020
  • Find Social Media Accounts: Userrecon June 26, 2020
  • Find Social Media Profiles Using a Photo Only: Social Mapper June 26, 2020
  • Monitor Other People Image Files over Network June 25, 2020
  • How Hackers Control Front Camera of Mobile and PC: CamPhish June 24, 2020
  • Make A Private Search Engine And Secure Your Privacy June 24, 2020
  • How To Host Your Own .onion Website in Dark Web June 22, 2020
  • Host a Local Website with Domain Name on Kali Linux over WiFi June 22, 2020
  • How Hackers Can Access Android Devices Remotely Using L3MON June 22, 2020
  • Retrieve All Passwords With LaZagne Project June 19, 2020
  • DKMC – Wonderful Malicious Payload Evasion Tool June 19, 2020
  • Persistent Backdoor In Android Using Kali Linux With A Shell Script June 19, 2020
  • Hack The Box: How to get invite code June 18, 2020
  • WordPress Security Scanner – WPSeku June 18, 2020
  • SEToolkit – Credential Harvester Attack [Tutorial] June 18, 2020
  • Top Vulnerable Websites To Practice Your Skills June 17, 2020
  • How Hackers Access A Website With Ngrok, Msfvenom And Metasploit Framework June 17, 2020
  • How Hackers Phish for Social Media & Other Account Passwords with BlackEye June 16, 2020
  • How To Track Someone’s exact Geolocation Over Internet June 15, 2020
  • Ultimate Phishing Tool With Ngrok –SocialFish June 15, 2020
  • Bruteforce Password Cracking With Medusa – Kali Linux June 14, 2020
  • Shcheck – Tool To Scan Security Headers Of Any Website June 14, 2020
  • Top 5 Wireless Penetration Testing Tools June 13, 2020
  • Create Hotspot On Windows 10 In 6 Steps June 13, 2020
  • How To Secure Your Wi-Fi Network In Few Steps. June 13, 2020
  • Find Vulnerable Webcams With Shodan [Metasploit Framework] June 12, 2020
  • Change Windows Password Of Remote PC Via METASPLOIT June 10, 2020
  • SSLKILL – Forced Man In The Middle Attack – Sniff HTTPS/HTTP June 10, 2020
  • How Hackers access Web Browsers with BeEF to Control Webcams, Phish for Credentials & More June 9, 2020
  • Kick-Off or Limit The Speed Of Other Devices On Your Network(Wifi) June 8, 2020
  • How Hacker Access Windows 10 Using CHAOS Framework June 8, 2020
  • FREE Learning Material For All Programming Languages – GitHub June 7, 2020
  • Setup Honeypot In Kali Linux With Pentbox June 7, 2020
  • Gloom – Linux Penetration Testing Framework June 6, 2020
  • Most Popular Useful Kali Linux Hacking Tools June 6, 2020

Buy Me A Coffee

Buy Me A Coffee

(^^)

500 ₹

Advertisements

like us on facebook

like us on facebook
Advertisements

Follow me on Twitter

My Tweets

Blog Stats

  • 10,563,959 hits

Enter your email address to subscribe to this blog and receive notifications of new posts by email.

Join 8,592 other followers

  • instagram
  • twitter
  • facebook
  • youtube
  • github
  • play store
Create a website or blog at WordPress.com
  • Follow Following
    • Spyboy blog
    • Join 8,592 other followers
    • Already have a WordPress.com account? Log in now.
    • Spyboy blog
    • Customize
    • Follow Following
    • Sign up
    • Log in
    • Report this content
    • View site in Reader
    • Manage subscriptions
    • Collapse this bar
 

Loading Comments...