• instagram
  • twitter
  • facebook
  • youtube
  • github
  • play store
  • Contact
  • YouTube Channel
  • Join Discord (Chat Here)
  • Spyboy Bot
  • Download Our Apps
    • Spyboy App
    • C Programming
    • C++ Programming
    • Java Programming
Skip to content

Spyboy blog

Learn ethical hacking , networking, social engineering, cyber security, pen-testing, linux, android, windows tricks.

  • Home
  • Tech hacks
  • Linux
  • Windows Tricks
  • Android Tricks
  • Networking
  • More
    • CEH
    • iphone
    • Programming
    • Virus Creation
    • Tweak windows
    • uncategorized
May 27, 2022 Android Tricks / Linux / Networking / Tech hacks / Windows Tricks

R4VEN – track user’s smartphone/pc ip And gps location.

The tool hosts a fake website which uses an iframe to display a legit website and, if the target allows

Continue reading

January 8, 2022 Android Tricks / Linux / Tech hacks

Use Kali linux On Android without root

Easiest way to install kali-linux on android using termux. you don’t need rooted phone. you can also use sudo (run

Continue reading

June 4, 2020 Linux / Networking / Tech hacks

How Hackers Send Fake Mail Using SETOOLKIT

The information security environment has changed vastly over the years. Now, in spite of having security policies, compliance, and infrastructure security

Continue reading

January 21, 2022 Uncategorized

Kali Linux: Reset Password

Let’s see how to reset the root password in Kali Linux. Join Our Discord Hacking Server: https://discord.gg/ZChEmMwE8d h Invite Our Cybersec Bot: https://dsc.gg/spyo

Continue reading

January 8, 2022 Android Tricks / Linux / Tech hacks

Use Kali linux On Android without root

Easiest way to install kali-linux on android using termux. you don’t need rooted phone. you can also use sudo (run

Continue reading

November 29, 2021 Linux / Networking / Tech hacks / Windows Tricks

H1deM3 – hide messages in messages

A way of hiding messages in messages, Use Zero-Width Characters to Hide Secret Messages in Text Zero-width characters are non-printing

Continue reading

October 21, 2021 Tech hacks

Doxing

Doxing? Weaponizing personal information Doxing victims find their home address, social security number, and more posted online, typically because someone

Continue reading

Featured

Hacking – Getting started

What is Hacking? Hacking is about identifying weaknesses and vulnerabilities of systems and gaining access to it. A Hackers gets unauthorized

Continue reading

September 3, 2021 Linux / Networking

Nmap – How to Use Nmap

Nmap is one of the most commonly used tools by ethical hackers. Its ease of use and clean installation along with

Continue reading

September 3, 2021 Tech hacks

Website copier – clone any website

1.HTTrack HTTrack is a easy-to-use offline browser utility. It allows you to download a World Wide Web site from the

Continue reading

April 28, 2021 Linux

Dnspeep – look what DNS Queries Your pc Is Making

dnspeep lets you spy on the DNS queries your computer is making. Here’s some example output: $ sudo dnspeep query name

Continue reading

April 28, 2021 Android Tricks / Linux

Use phone As Rubber Ducky Against Another phone

Use Android as Rubber Ducky against another Android device HID attack using Android Using Android as Rubber Ducky against Android. This is

Continue reading

April 28, 2021 Linux / Tech hacks

2021 – Best Ethical Hacking Tools & apps for Hackers

hat are Hacking Tools? Hacking Tools are computer programs and scripts that help you find and exploit weaknesses in computer

Continue reading

April 28, 2021 Linux

ALL IN ONE Hacking Tool For Hackers

Installation in Linux : This Tool Must Run As ROOT !!! git clone https://github.com/Z4nzu/hackingtool.git chmod -R 755 hackingtool && cd

Continue reading

April 28, 2021 Android Tricks / Linux

Android PIN Bruteforce – Unlock Lockscreen PIN

Unlock an Android phone by bruteforcing the lockscreen PIN. Turn your Kali Nethunter phone into a bruteforce PIN cracker for

Continue reading

February 17, 2021 Uncategorized

SSH for remote access on Linux

This article explains how to configure two computers for secure shell (SSH) connections, and how to securely connect from one

Continue reading

February 17, 2021 Uncategorized

Zint: QR codes Generator

QR stands for “Quick Response.” While they may look simple, QR codes are capable of storing lots of data. But no matter how

Continue reading

February 17, 2021 Uncategorized

Open source VPN tools

Perks of OpenVPN solutions OpenVPN is one of the power players in the online privacy world. It is an open

Continue reading

February 4, 2021 Uncategorized

Instagram: Sites to Buy Followers

Viralyft This website can be used to buy a mass number of followers at an affordable rate without compromising quality,

Continue reading

January 31, 2021 Premium / Uncategorized

RedRabbit : Pen-Testing & Post-Exploitation for Windows

January 29, 2021 Uncategorized

Zydra : Crack Password-Protected ZIP Files, PDFs & More

January 26, 2021 Uncategorized

Extend Context(right lick)-Menu in Windows

Even though there are already many tools available through the right-click context-menu in Windows, some users still desire more tools

Continue reading

January 12, 2021 Networking / Programming / Windows Tricks

Iron Man Jarvis AI Desktop Voice Assistant | in Python

Have you ever wondered how cool it would be to have your own A.I. assistant? Imagine how easier it would

Continue reading

January 5, 2021 Networking / Tech hacks

What is a Zero-Day Exploit?

A zero-day vulnerability, at its core, is a flaw. It is an unknown exploit in the wild that exposes a

Continue reading

January 5, 2021 Linux / Networking

PhpSploit – post exploitation framework

It is a post-exploitation tool capable to maintain access to a compromised web server for privilege escalation purposes. The obfuscated

Continue reading

December 7, 2020 Linux / Networking / Premium / Tech hacks

Create an Undetectable Payload,(hide the Payload)

December 7, 2020 Linux / Networking / Premium

Create an Undetectable Payload (Bypass Antivirus)

December 5, 2020 Networking

How to use a Router as a Wireless Adapter

There may come a time where you have an extra wireless router on your hands (such as the Linksys WRT54GL) that

Continue reading

December 5, 2020 Networking

How to protect your server(website) from DDoS attacks

There are a lot of attacks that can be performed to a server when it’s not correctly configured or doesn’t

Continue reading

December 5, 2020 Linux / Networking / Premium

DDoS attack using SlowHTTPTest (Slowloris) in Kali Linux

December 5, 2020 Linux / Networking

Hulk DDoS : Installation & Usage with Examples

HULK is a Denial of Service (DoS) tool used to attack web servers by generating unique and obfuscated traffic volumes.

Continue reading

December 5, 2020 Linux / Networking

Kali Linux Hydra Tool Example

Hydra is a pre-installed tool in Kali Linux used to brute-force username and password to different services such as ftp,

Continue reading

December 5, 2020 Linux / Networking

Top DDoS Attack Tools

DDoS stands for Distributed Denial of Service. This is a cyber-attack in which the attacker floods the victim’s servers with

Continue reading

December 5, 2020 Networking / Uncategorized

Automatically Post WordPress Posts to Discord

I F T T T is short for If This Then That.  Using IFTTT you can easily automate WordPress to

Continue reading

December 5, 2020 Uncategorized

Bot to fix Python indentation error

Making a bot to fix indentation error in python. fixing: IndentationError: unexpected There are times when you need to press

Continue reading

December 3, 2020 Linux / Networking

Make a Persistent payload in Android Using Kali

We are going to show you how to make a persistent backdoor. Once you exploit some android device just do

Continue reading

December 1, 2020 Programming

Installing Selenium and ChromeDriver on Windows

Want to use Selenium to scrape with Chrome on Windows? Let’s do it! We’ll need to install a couple things: Selenium, which

Continue reading

November 30, 2020 Linux / Pc Registry Tricks / Tech hacks

Turn a Pen Drive into a USB Rubber Ducky

USB Rubber Ducky — a device which resembles a regular USB flash drive. When connected to a computer, it claims

Continue reading

November 27, 2020 Networking / Premium

Make A WhatsApp Spammer

November 21, 2020 Android Tricks / Linux / Networking / Tech hacks

Gadgets for hacker

Sometimes, during security audits, we may encounter a situation where everything is being managed correctly. In other words security patches, policies,

Continue reading

November 15, 2020 Linux / Networking

Use SSH Tunnels to Forward Requests & Access Remote Routers

Without admin privileges, installing additional software, or modifying the Windows 10 firewall, an attacker can alter a router and perform

Continue reading

November 15, 2020 Linux / Networking

How hackrs Brute-Force Almost Any Website

The tactic of brute-forcing a login, i.e., trying many passwords very quickly until the correct one is discovered, can be

Continue reading

November 15, 2020 Linux / Networking

Scan Web Applications for Common Vulnerabilities Using Metasploit’s WMAP

Having an efficient workflow is an integral part of any craft, but it’s especially important when it comes to probing

Continue reading

November 12, 2020 Linux / Networking

Nikto – Scan Any Website for Vulnerabilities

Nikto is a free software command-line vulnerability scanner that scans webservers for dangerous files/CGIs, outdated server software and other problems.

Continue reading

November 12, 2020 Uncategorized

Customize your Mac terminal using figlet

There are many ways you can customize your Mac OS X terminal. One way I customize my terminal was by

Continue reading

November 12, 2020 Linux / Networking / Programming

Termux !! Full Tutorial With Termux commands

Learn Termux for hacking !! first, understand what is Termux and follow how to install applications using Termux and the complete Termux command. In this article, I

Continue reading

November 12, 2020 Linux

Make Cool linux Terminal Header

you want your terminal to be customized with awesome script every time you fire it up, huh?! Well, look no

Continue reading

Posts navigation

«Previous Posts 1 2 3 4 … 14 Next Posts»
Advertisements

View our recent work on - spyboy.in

Blog Stats

  • 10,678,054 hits

Search this site

# Add Hacker's Bot Spyo - invte here

Discord Bots

# Hacker's server - chat here

Discord Server

C – Programming App

Get it on Google Play

C++ Programming App

Get it on Google Play

Java – Programming App

Get it on Google Play

Follow Us Here

  • Instagram
  • Facebook
  • YouTube
  • Google
  • Twitter
  • Discord

Subscribe to get access

Read more of this content when you subscribe today.

Subscribe
Log in

Categories

  • Account Takeover (1)
  • Android Tricks (87)
  • Bug Bounty (1)
  • CEH (9)
  • ctf-tools (1)
  • interview Questions (1)
  • iphone (3)
  • Linux (115)
  • Networking (282)
  • Notepad Tricks (38)
  • Payloads (15)
  • Pc Registry Tricks (16)
  • Premium (12)
  • Programming (100)
  • reconnaissance (2)
  • Tech hacks (277)
  • Tips (6)
  • Uncategorized (39)
  • Windows Tricks (167)
Advertisements

Recent Posts

  • HTTP Parameter Pollution February 19, 2023
  • GraphQL Injection: A Guide to Protecting Your Applications February 18, 2023
  • File Inclusion February 17, 2023
  • Directory Traversal Attack: A Threat to Web Security February 16, 2023
  • Denial of Service (DoS) Attacks Types February 15, 2023
  • How to install wireless network adapter Kali Linux and on android phones. February 14, 2023
  • The Art of Trapping Hackers: Honeypots February 13, 2023
  • Is there anybody hacking my phone? February 12, 2023
  • Can I hire a hacker to get my account back? February 11, 2023
  • Protecting Yourself Against Man-in-the-Middle Attacks February 10, 2023
  • What hacker attacks are you most likely to encounter? February 9, 2023
  • Coding and Hacking: Understanding the Connection February 8, 2023
  • How to use hacking in a good way? February 7, 2023
  • Hacking skills: what are they? February 6, 2023
  • The Parts of a Domain Name: What Are They? February 5, 2023
  • Methods of enumerating subdomains passively February 4, 2023
  • A Guide to Becoming a Bug Bounty Hunter February 3, 2023
  • Active Subdomain Enumeration February 2, 2023
  • Dependency Confusion January 28, 2023
  • DNS Rebinding January 28, 2023
  • Command Injection January 28, 2023
  • CSV Injection – the formula injection January 14, 2023
  • fork-bomb December 20, 2022
  • Top 20 Cyber Security JOB interview Questions  December 11, 2022
  • Keylogger – log & send them to an email December 7, 2022
  • CSRF Injection: Cross-Site Request Forgery December 6, 2022
  • Hacker Search Engines November 30, 2022
  • GitHub user email addresses: how to find them November 27, 2022
  • CTF help November 27, 2022
  • CRLF Injection November 26, 2022
  • Argument Injection – Vulnerabilities November 18, 2022
  • Account Takeover Techniques November 6, 2022
  • Web Sockets November 3, 2022
  • Reverse Shell November 1, 2022
  • R4VEN – track user’s smartphone/pc ip And gps location. May 27, 2022
  • Know if your emails has been opened or not !! April 24, 2022
  • Read free without subscription March 14, 2022
  • Proxychain March 4, 2022
  • Top 5 Mac mind mapping software to effortlessly organize your thoughts February 21, 2022
  • Install required packages automatically for a python script February 18, 2022
  • Beef-XSS – Cloning websites February 17, 2022
  • Reverse shell over TOR network using hidden services – Poiana February 16, 2022
  • Recover an Overwritten File on Mac February 15, 2022
  • Making Sure Your Cloud Solution Is Right for Your Business February 1, 2022
  • Kali Linux: Reset Password January 21, 2022
  • Use Kali linux On Android without root January 8, 2022
  • H1deM3 – hide messages in messages November 29, 2021
  • Doxing October 21, 2021
  • Hacking – Getting started October 19, 2021
  • Nmap – How to Use Nmap September 3, 2021
  • Website copier – clone any website September 3, 2021
  • Dnspeep – look what DNS Queries Your pc Is Making April 28, 2021
  • Use phone As Rubber Ducky Against Another phone April 28, 2021
  • 2021 – Best Ethical Hacking Tools & apps for Hackers April 28, 2021
  • ALL IN ONE Hacking Tool For Hackers April 28, 2021
  • Android PIN Bruteforce – Unlock Lockscreen PIN April 28, 2021
  • SSH for remote access on Linux February 17, 2021
  • Zint: QR codes Generator February 17, 2021
  • Open source VPN tools February 17, 2021
  • Instagram: Sites to Buy Followers February 4, 2021
  • RedRabbit : Pen-Testing & Post-Exploitation for Windows January 31, 2021
  • Zydra : Crack Password-Protected ZIP Files, PDFs & More January 29, 2021
  • Extend Context(right lick)-Menu in Windows January 26, 2021
  • Iron Man Jarvis AI Desktop Voice Assistant | in Python January 12, 2021
  • What is a Zero-Day Exploit? January 5, 2021
  • PhpSploit – post exploitation framework January 5, 2021
  • Create an Undetectable Payload,(hide the Payload) December 7, 2020
  • Create an Undetectable Payload (Bypass Antivirus) December 7, 2020
  • How to use a Router as a Wireless Adapter December 5, 2020
  • How to protect your server(website) from DDoS attacks December 5, 2020
  • DDoS attack using SlowHTTPTest (Slowloris) in Kali Linux December 5, 2020
  • Hulk DDoS : Installation & Usage with Examples December 5, 2020
  • Kali Linux Hydra Tool Example December 5, 2020
  • Top DDoS Attack Tools December 5, 2020
  • Automatically Post WordPress Posts to Discord December 5, 2020
  • Bot to fix Python indentation error December 5, 2020
  • Make a Persistent payload in Android Using Kali December 3, 2020
  • Installing Selenium and ChromeDriver on Windows December 1, 2020
  • Turn a Pen Drive into a USB Rubber Ducky November 30, 2020
  • Make A WhatsApp Spammer November 27, 2020
  • Gadgets for hacker November 21, 2020
  • Use SSH Tunnels to Forward Requests & Access Remote Routers November 15, 2020
  • How hackrs Brute-Force Almost Any Website November 15, 2020
  • Scan Web Applications for Common Vulnerabilities Using Metasploit’s WMAP November 15, 2020
  • Nikto – Scan Any Website for Vulnerabilities November 12, 2020
  • Customize your Mac terminal using figlet November 12, 2020
  • Termux !! Full Tutorial With Termux commands November 12, 2020
  • Make Cool linux Terminal Header November 12, 2020
  • How hackers Remotely access Android Using payload November 8, 2020
  • Make a Dead Man’s Switch to Delete & Encrypt Files if something happens to you October 30, 2020
  • How Hackers Break into Somebody’s Computer and Exploit the System October 19, 2020
  • Create Bootable USB with Persistence for Kali Linux October 19, 2020
  • How hackers Bypass Locked Windows Computers to Run Kali Linux from a Live USB October 19, 2020
  • Run Kali Linux on Windows without installing October 19, 2020
  • Make Your Own Evil USB October 19, 2020
  • Find Sensitive & ‘Deleted’ Files Remotely October 12, 2020
  • Capture Keystrokes & Passwords Remotely October 12, 2020
  • Remotely Record & Listen to the Microphone of a Hacked Computer October 6, 2020
  • How hackers Break into Somebody’s Computer Without a Password September 21, 2020
  • Different Types Of Hackers September 6, 2020
  • How to Manage Big Password lists September 6, 2020
  • How Hackers BruteForce Gmail, Hotmail, Twitter, Facebook & Netflix September 6, 2020
  • Google Hacking Tool – uDork September 6, 2020
  • Make All Your Internet Traffic Anonymized-TorghostNG September 4, 2020
  • Facebook Brute Forcer In Shellscript Using TOR – Facebash September 1, 2020
  • SocialBox – A Bruteforce Attack Framework (Facebook, Gmail, Instagram, Twitter) September 1, 2020
  • Instagram-Py – Simple Instagram Brute Force Script September 1, 2020
  • HiddenEye – Phishing Tool With Advanced Functionality (Support – Android) August 31, 2020
  • Stalk Your Friends social media accounts Using Image Recognition And Reverse Image Search – EagleEye August 30, 2020
  • How hackers access WiFi Passwords in Minutes – Fluxion August 23, 2020
  • Send and Receive Files Anonymously August 22, 2020
  • How to Hide a Phishing Link August 22, 2020
  • CEH – Enumeration August 14, 2020
  • CEH – Scanning August 14, 2020
  • CEH – Footprinting August 14, 2020
  • Best Websites For Free IP Lookup August 5, 2020
  • Top 10 Most Dangerous Viruses Of All Times August 5, 2020
  • Top 50+Penetration Testing Interview Questions Most August 5, 2020
  • CEH – Cryptography July 29, 2020
  • CEH – System Fundamentals July 29, 2020
  • CEH – Introduction July 29, 2020
  • CEH – Assessment Test July 24, 2020
  • Google Dorks For Bug Bounty Hunters July 24, 2020
  • [Fixed] No WiFi Adapter Found in Kali Linux July 19, 2020
  • A Web Path Scanner: DirSearch July 19, 2020
  • Best WiFi Adapter For Kali Linux in 2020 -WiFi Adapter with Monitor Mode July 18, 2020
  • How To Turn Your Android Device Into Full Functional Computer July 17, 2020
  • How to Customize the Right-click Menu on Windows 10 July 16, 2020
  • RUN CMD Commands With a Desktop Shortcut on Windows 10 July 15, 2020
  • Best Google Search Tricks & Tips July 15, 2020
  • Best Virtual Phone Number Apps For Account Verifications July 13, 2020
  • The Deep Magic: Dmitry July 12, 2020
  • Powerful Websites That Can Replace Your PC Software July 9, 2020
  • How To Install Multiple Bootable Operating Systems On One USB July 9, 2020
  • Torrent Proxy Sites List 2020 (100% Working Mirror Sites) July 9, 2020
  • Best Websites to Download Free Books July 9, 2020
  • Best CMD Commands Used By Hackers July 9, 2020
  • How To Activate the New Start Menu of Windows 10 July 9, 2020
  • Shodan — The Most Dangerous Search Engine July 8, 2020
  • Tech Behind Web Application: Whatweb July 6, 2020
  • Hide Secrets in Pictures: Steghide July 6, 2020
  • Port Forwarding using SSH July 6, 2020
  • Advanced Lazy Automated Phishing Script: ZPhisher July 5, 2020
  • How Hackers access Wi-Fi Networks: AirCrack July 4, 2020
  • Take Total Control on Android Remotely: HaxRat July 3, 2020
  • Advanced Phishing | Bypass Two Factor Authentication – Modlishka July 2, 2020
  • Trape: People Tracker On the Internet July 1, 2020
  • SpiderFoot: OSINT Reconnaissance Tool July 1, 2020
  • Recon-ng: Information Gathering with Open Source Intelligence June 30, 2020
  • How To Send Anonymous Text, Emails, Media Files using Utopia June 28, 2020

Buy Me A Coffee

Buy Me A Coffee

(^^)

500 ₹

Advertisements

like us on facebook

like us on facebook
Advertisements

Follow me on Twitter

My Tweets

Blog Stats

  • 10,678,054 hits

Enter your email address to subscribe to this blog and receive notifications of new posts by email.

Join 6,795 other subscribers

  • instagram
  • twitter
  • facebook
  • youtube
  • github
  • play store
Create a website or blog at WordPress.com
  • Follow Following
    • Spyboy blog
    • Join 2,880 other followers
    • Already have a WordPress.com account? Log in now.
    • Spyboy blog
    • Customize
    • Follow Following
    • Sign up
    • Log in
    • Report this content
    • View site in Reader
    • Manage subscriptions
    • Collapse this bar
 

Loading Comments...