• instagram
  • twitter
  • facebook
  • youtube
  • github
  • play store
  • About Us
  • YouTube Channel
  • Join Discord (Chat Here)
  • Download Our Apps
    • Spyboy App
    • C Programming
    • C++ Programming
    • Java Programming
Skip to content

Spyboy blog

Learn ethical hacking , cyber security, computer programming, networking, android tricks and windows tricks.

  • Home
  • Tech hacks
  • Linux
  • Windows Tricks
  • Android Tricks
  • Networking
  • More
    • CEH
    • iphone
    • Programming
    • Virus Creation
    • Tweak windows
    • uncategorized
November 12, 2020 Linux

Make Cool linux Terminal Header

you want your terminal to be customized with awesome script every time you fire it up, huh?! Well, look no

Continue reading

June 22, 2020 Android Tricks / Linux / Networking

How Hackers Can Access Android Devices Remotely Using L3MON

L3MON is a remote Android management suite, we can use it to gain access on any android smartphone. In easy

Continue reading

June 4, 2020 Linux / Networking / Tech hacks

How Hackers Send Fake Mail Using SETOOLKIT

The information security environment has changed vastly over the years. Now, in spite of having security policies, compliance, and infrastructure security

Continue reading

July 1, 2020 Linux / Networking / Tech hacks

SpiderFoot: OSINT Reconnaissance Tool

Hydra is a parallelized login cracker which supports numerous protocols to attack. It is very fast and flexible, and new

Continue reading

June 30, 2020 Linux / Networking / Tech hacks

Recon-ng: Information Gathering with Open Source Intelligence

Today we are going to learn about recon-ng. Recon-ng is a very good tool for web application analysis. Recon-ng is a

Continue reading

June 28, 2020 Linux / Networking / Tech hacks

How To Send Anonymous Text, Emails, Media Files using Utopia

How to send anonymous text, emails and media files? There are many options available to sending things anonymously, but we don’t

Continue reading

June 26, 2020 Linux / Networking / Tech hacks

Find Social Media Accounts: Userrecon

Nowadays Social media is getting very popular. There are lots of social media sites around us, like Twitter, Instagram, Facebook, YouTube, Reddit, Pinterest, Tumblr, Medium etc. Userrecon is a

Continue reading

June 26, 2020 Linux / Networking / Tech hacks

Find Social Media Profiles Using a Photo Only: Social Mapper

Using Social Mapper we can do mass scan. Not only that the main function is we can find someone with

Continue reading

June 25, 2020 Linux / Networking / Tech hacks

Monitor Other People Image Files over Network

In our this detailed tutorial we are going to learn how attacker’s attacks on our devices and steal our personal

Continue reading

June 24, 2020 Linux / Networking / Tech hacks

How Hackers Control Front Camera of Mobile and PC: CamPhish

CamPhish is a camera phishing toolkit inspired from saycheese, it is an upgraded version of saycheese. We can get camera clicks from

Continue reading

June 24, 2020 Linux / Networking / Tech hacks

Make A Private Search Engine And Secure Your Privacy

Surfing the internet has become a passion for everyone but most of the search engines keep the log of our

Continue reading

June 22, 2020 Linux / Networking

How To Host Your Own .onion Website in Dark Web

We have learns how Tor network works and how to use it in our Tor tutorial. As we know dark websites

Continue reading

June 22, 2020 Linux / Networking

Host a Local Website with Domain Name on Kali Linux over WiFi

In today’s detailed tutorial we will learn how we can host a website from our Kali Linux machine over WiFi

Continue reading

June 22, 2020 Android Tricks / Linux / Networking

How Hackers Can Access Android Devices Remotely Using L3MON

L3MON is a remote Android management suite, we can use it to gain access on any android smartphone. In easy

Continue reading

June 19, 2020 Linux / Networking / Windows Tricks

Retrieve All Passwords With LaZagne Project

The LaZagne project (A password recovery tool) is an open-source application used to retrieve lots of passwords stored on a

Continue reading

June 19, 2020 Linux / Uncategorized

DKMC – Wonderful Malicious Payload Evasion Tool

Windows would be one of our common targets since it is the most used operating system in the corporate environment.

Continue reading

June 19, 2020 Android Tricks / Linux / Networking / Uncategorized

Persistent Backdoor In Android Using Kali Linux With A Shell Script

Hello guys, today we’re going to show you how hackers can create a persistent backdoor in android using Kali Linux

Continue reading

June 18, 2020 Networking / Tech hacks / Windows Tricks

Hack The Box: How to get invite code

Spoiler Alert: I suggest you to try to hack your way into the site, before actually reading anything below. If

Continue reading

June 18, 2020 Linux / Networking

WordPress Security Scanner – WPSeku

WordPress is one of the most popular open-source CMS nowadays having more than 100 million users. WordPress security is a

Continue reading

June 18, 2020 Linux / Networking

SEToolkit – Credential Harvester Attack [Tutorial]

As a penetration tester, there will be times that the client requirements will be to perform social engineering attacks against their

Continue reading

June 17, 2020 Networking / Tech hacks

Top Vulnerable Websites To Practice Your Skills

With the help of ready-made vulnerable applications, you actually get a good enhancement of your skills because it provides you

Continue reading

June 17, 2020 Linux / Networking

How Hackers Hack A Website With Ngrok, Msfvenom And Metasploit Framework

In a recent survey, only 15% of business owners saw security as a challenge when more than half had reported

Continue reading

June 16, 2020 Linux / Networking / Uncategorized

How Hackers Phish for Social Media & Other Account Passwords with BlackEye

Social media accounts are a favourite target for hackers, and the most effective tactics for attacking accounts on websites like

Continue reading

June 15, 2020 Linux / Networking

How To Track Someone’s exact Geolocation Over Internet

With the help of Seeker which is an open-source python script, you can easily find the geolocation of any device

Continue reading

June 15, 2020 Linux / Networking

Ultimate Phishing Tool With Ngrok –SocialFish

SocialFish is an open-source tool through which you can easily create a phishing page of most popular websites like Facebook/Twitter/Github

Continue reading

June 14, 2020 Linux

Bruteforce Password Cracking With Medusa – Kali Linux

In Greek mythology, Medusa was a monster, a Gorgon, generally described as a winged human female with living venomous snakes

Continue reading

June 14, 2020 Linux / Networking

Shcheck – Tool To Scan Security Headers Of Any Website

HTTP security headers always provide an extra layer of security by helping to mitigate attacks and security vulnerabilities. During the

Continue reading

June 13, 2020 Networking / Tech hacks

Top 5 Wireless Penetration Testing Tools

Anyone can, with the right equipment, access wireless networks (wireless local area networks, WLAN’s). After all, there is no physical

Continue reading

June 13, 2020 Windows Tricks

Create Hotspot On Windows 10 In 6 Steps

Hotspots are locations that offer public Internet access. Most hotspots use Wi-Fi, but some also allow wired connections. Clients can

Continue reading

June 13, 2020 Networking / Uncategorized

How To Secure Your Wi-Fi Network In Few Steps.

Internet users are widely using Wi-Fi devices to access the Internet. Every year millions of wireless-based devices are sold in

Continue reading

June 12, 2020 Linux / Networking / Uncategorized

Find Vulnerable Webcams With Shodan [Metasploit Framework]

As we all know that, Shodan is one of the most popular and dangerous search engines which gives you all

Continue reading

June 10, 2020 Linux / Windows Tricks

Change Windows Password Of Remote PC Via METASPLOIT

To change windows password, the first step is to hack that system via Metasploit framework and it always depends upon

Continue reading

June 10, 2020 Linux

SSLKILL – Forced Man In The Middle Attack – Sniff HTTPS/HTTP

SSL Kill is a forced man-in-the-middle transparent proxy that modifies HTTP requests and responses in order to avoid SSL and

Continue reading

June 10, 2020 Linux / Networking

How Hackers Hack Wi-Fi & Networks More Easily with Lazy Script

Wi-Fi tools keep getting more and more accessible to beginners, and the LAZY script is a framework of serious penetration

Continue reading

June 9, 2020 Linux / Networking

How Hackers Hack Web Browsers with BeEF to Control Webcams, Phish for Credentials & More

People use browsers for all types of things, and in general, we trust a lot of personal information to them.

Continue reading

June 8, 2020 Linux / Tech hacks

Kick-Off or Limit The Speed Of Other Devices On Your Network(Wifi)

If you find yourself with a roommate hogging limited data bandwidth with video games or discover a neighbour has invited

Continue reading

June 8, 2020 Linux / Windows Tricks

How Hacker Hack Windows 10 Using CHAOS Framework

CHAOS is a framework based on Linux through which you can easily generate the payloads and control remote machines like

Continue reading

June 7, 2020 Android Tricks / iphone / Linux / Networking / Programming / Tech hacks / Uncategorized / Windows Tricks

FREE Learning Material For All Programming Languages – GitHub

As you know GITHUB is one of the most popular brands in the programming world. It is one of the largest

Continue reading

June 7, 2020 Linux / Networking

Setup Honeypot In Kali Linux With Pentbox

Well with the help of honeypot, you can easily monitor your own OS and can track every activity of the

Continue reading

June 6, 2020 Linux / Tech hacks

Gloom – Linux Penetration Testing Framework

Security is a state in which we ensure a proper gap between the threats and assets of an organization. We

Continue reading

June 6, 2020 Linux

Most Popular Useful Kali Linux Hacking Tools

Kali is the latest and greatest version of the ever-popular Backtrack Linux penetration testing distribution. The creators of the Backtrack

Continue reading

June 5, 2020 Linux / Networking

How Hacker Hack Android Using Metasploit Without Port Forwarding Over Internet

Today we’ll discuss the post-exploitation attack using Metasploit framework to hack any Android Device without any port forwarding. Generally, you

Continue reading

June 5, 2020 Linux / Networking / Tech hacks

Disable Security Cameras on Any Wireless Network

Electronic warfare tactics work by jamming, disrupting, or disabling the technology a target uses to perform a critical function, and

Continue reading

June 4, 2020 Linux / Networking / Tech hacks

How Hackers Send Fake Mail Using SETOOLKIT

The information security environment has changed vastly over the years. Now, in spite of having security policies, compliance, and infrastructure security

Continue reading

June 2, 2020 Linux / Tech hacks

Use Kismet to Watch Wi-Fi User Activity !!

Your home has walls for privacy, but Wi-Fi signals passing through them and can be detected up to a mile

Continue reading

June 2, 2020 Networking / Tech hacks

Simulate a RAT on Your Network with ShinoBOT

A remote administration tool, or RAT, is a piece of software used for remotely controlling machines. They are commonly used

Continue reading

June 2, 2020 Linux / Tech hacks

Ehtools — Easy Penetration Testing Framework

Ehtools is an easy and automated penetration testing framework for beginners. Ehtools contains some serious attacking tools for cybersecurity researchers.

Continue reading

Posts navigation

«Previous Posts 1 2 3 4 5 … 13 Next Posts»
Advertisements

Spyboy – App

Get it on Google Play

C – Programming App

Get it on Google Play

C++ Programming App

Get it on Google Play

Java – Programming App

Get it on Google Play

Follow Us Here

  • Instagram
  • Facebook
  • YouTube
  • Google
  • Twitter

Youtube Videos

https://www.youtube.com/watch?v=TzkL7PI9D8s

Categories

  • Android Tricks (81)
  • CEH (8)
  • iphone (3)
  • Linux (101)
  • Networking (267)
  • Notepad Tricks (38)
  • Pc Registry Tricks (16)
  • Programming (97)
  • Tech hacks (268)
  • Uncategorized (31)
  • Windows Tricks (164)
Advertisements

Recent Posts

  • Extend Context(right lick)-Menu in Windows January 26, 2021
  • Iron Man Jarvis AI Desktop Voice Assistant | in Python January 12, 2021
  • What is a Zero-Day Exploit? January 5, 2021
  • PhpSploit – post exploitation framework January 5, 2021
  • Create an Undetectable Payload,(hide the Payload) December 7, 2020
  • Create an Undetectable Payload (Bypass Antivirus) December 7, 2020
  • How to use a Router as a Wireless Adapter December 5, 2020
  • How to protect your server(website) from DDoS attacks December 5, 2020
  • DDoS attack using SlowHTTPTest (Slowloris) in Kali Linux December 5, 2020
  • Hulk DDoS : Installation & Usage with Examples December 5, 2020
  • Kali Linux Hydra Tool Example December 5, 2020
  • Top DDoS Attack Tools December 5, 2020
  • Automatically Post WordPress Posts to Discord December 5, 2020
  • Bot to fix Python indentation error December 5, 2020
  • Make a Persistent payload in Android Using Kali December 3, 2020
  • Installing Selenium and ChromeDriver on Windows December 1, 2020
  • Turn a Pen Drive into a USB Rubber Ducky November 30, 2020
  • Make A WhatsApp Spammer November 27, 2020
  • Gadgets for hacker November 21, 2020
  • Use SSH Tunnels to Forward Requests & Hack Remote Routers November 15, 2020
  • How Hackers Hack uTorrent Clients & Backdoor their system November 15, 2020
  • Brute-Force Almost Any Website Login November 15, 2020
  • Scan Web Applications for Common Vulnerabilities Using Metasploit’s WMAP November 15, 2020
  • Nikto – Scan Any Website for Vulnerabilities November 12, 2020
  • Customize your Mac terminal using figlet November 12, 2020
  • Termux !! Full Tutorial With Termux commands November 12, 2020
  • Make Cool linux Terminal Header November 12, 2020
  • How hackers Remotely Hack Android Using payload November 8, 2020
  • Make a Dead Man’s Switch to Delete & Encrypt Files if something happens to you October 30, 2020
  • How Hackers Break into Somebody’s Computer and Exploit the System October 19, 2020
  • Create Bootable USB with Persistence for Kali Linux October 19, 2020
  • How hackers Bypass Locked Windows Computers to Run Kali Linux from a Live USB October 19, 2020
  • Run Kali Linux on Windows without installing October 19, 2020
  • Make Your Own Evil USB October 19, 2020
  • Find Sensitive & ‘Deleted’ Files Remotely October 12, 2020
  • Capture Keystrokes & Passwords Remotely October 12, 2020
  • Remotely Record & Listen to the Microphone of a Hacked Computer October 6, 2020
  • How hackers Break into Somebody’s Computer Without a Password September 21, 2020
  • Create an Undetectable Payload September 16, 2020
  • Hide Payloads(virus) Inside any Photo Metadata September 15, 2020
  • Different Types Of Hackers September 6, 2020
  • How to Manage Big Password lists September 6, 2020
  • How Hackers BruteForce Gmail, Hotmail, Twitter, Facebook & Netflix September 6, 2020
  • Google Hacking Tool – uDork September 6, 2020
  • Make All Your Internet Traffic Anonymized-TorghostNG September 4, 2020
  • Facebook Brute Forcer In Shellscript Using TOR – Facebash September 1, 2020
  • SocialBox – A Bruteforce Attack Framework (Facebook, Gmail, Instagram, Twitter) September 1, 2020
  • Instagram-Py – Simple Instagram Brute Force Script September 1, 2020
  • HiddenEye – Phishing Tool With Advanced Functionality (Support – Android) August 31, 2020
  • Stalk Your Friends social media accounts Using Image Recognition And Reverse Image Search – EagleEye August 30, 2020
  • How hackers crack WiFi Passwords in Minutes — Fluxion August 23, 2020
  • Send and Receive Files Anonymously August 22, 2020
  • How to Hide a Phishing Link August 22, 2020
  • CEH – Enumeration August 14, 2020
  • CEH – Scanning August 14, 2020
  • CEH – Footprinting August 14, 2020
  • Best Websites For Free IP Lookup August 5, 2020
  • Top 10 Most Dangerous Viruses Of All Times August 5, 2020
  • Top 50+Penetration Testing Interview Questions Most August 5, 2020
  • CEH – Cryptography July 29, 2020
  • CEH – System Fundamentals July 29, 2020
  • CEH – Introduction July 29, 2020
  • CEH – Assessment Test July 24, 2020
  • Google Dorks For Bug Bounty Hunters July 24, 2020
  • [Fixed] No WiFi Adapter Found in Kali Linux July 19, 2020
  • A Web Path Scanner: DirSearch July 19, 2020
  • Best WiFi Adapter For Kali Linux in 2020 -WiFi Adapter with Monitor Mode July 18, 2020
  • How To Turn Your Android Device Into Full Functional Computer July 17, 2020
  • How to Customize the Right-click Menu on Windows 10 July 16, 2020
  • RUN CMD Commands With a Desktop Shortcut on Windows 10 July 15, 2020
  • Best Google Search Tricks & Tips in 2020 July 15, 2020
  • Best Virtual Phone Number Apps For Account Verifications July 13, 2020
  • The Deep Magic: Dmitry July 12, 2020
  • Powerful Websites That Can Replace Your PC Software July 9, 2020
  • How To Install Multiple Bootable Operating Systems On One USB July 9, 2020
  • Torrent Proxy Sites List 2020 (100% Working Mirror Sites) July 9, 2020
  • Best Websites to Download Free Books July 9, 2020
  • Best CMD Commands Used By Hackers July 9, 2020
  • How To Activate the New Start Menu of Windows 10 July 9, 2020
  • Shodan — The Most Dangerous Search Engine July 8, 2020
  • Tech Behind Web Application: Whatweb July 6, 2020
  • Hide Secrets in Pictures: Steghide July 6, 2020
  • Port Forwarding using SSH July 6, 2020
  • Advanced Lazy Automated Phishing Script: ZPhisher July 5, 2020
  • How Hackers Crack Wi-Fi Networks: AirCrack July 4, 2020
  • Take Total Control on Android Remotely: HaxRat July 3, 2020
  • Advanced Phishing | Bypass Two Factor Authentication – Modlishka July 2, 2020
  • Trape: People Tracker On the Internet July 1, 2020
  • SpiderFoot: OSINT Reconnaissance Tool July 1, 2020
  • Recon-ng: Information Gathering with Open Source Intelligence June 30, 2020
  • How To Send Anonymous Text, Emails, Media Files using Utopia June 28, 2020
  • Find Social Media Accounts: Userrecon June 26, 2020
  • Find Social Media Profiles Using a Photo Only: Social Mapper June 26, 2020
  • Monitor Other People Image Files over Network June 25, 2020
  • How Hackers Control Front Camera of Mobile and PC: CamPhish June 24, 2020
  • Make A Private Search Engine And Secure Your Privacy June 24, 2020
  • How To Host Your Own .onion Website in Dark Web June 22, 2020
  • Host a Local Website with Domain Name on Kali Linux over WiFi June 22, 2020
  • How Hackers Can Access Android Devices Remotely Using L3MON June 22, 2020
  • Retrieve All Passwords With LaZagne Project June 19, 2020
  • DKMC – Wonderful Malicious Payload Evasion Tool June 19, 2020
  • Persistent Backdoor In Android Using Kali Linux With A Shell Script June 19, 2020
  • Hack The Box: How to get invite code June 18, 2020
  • WordPress Security Scanner – WPSeku June 18, 2020
  • SEToolkit – Credential Harvester Attack [Tutorial] June 18, 2020
  • Top Vulnerable Websites To Practice Your Skills June 17, 2020
  • How Hackers Hack A Website With Ngrok, Msfvenom And Metasploit Framework June 17, 2020
  • How Hackers Phish for Social Media & Other Account Passwords with BlackEye June 16, 2020
  • How To Track Someone’s exact Geolocation Over Internet June 15, 2020
  • Ultimate Phishing Tool With Ngrok –SocialFish June 15, 2020
  • Bruteforce Password Cracking With Medusa – Kali Linux June 14, 2020
  • Shcheck – Tool To Scan Security Headers Of Any Website June 14, 2020
  • Top 5 Wireless Penetration Testing Tools June 13, 2020
  • Create Hotspot On Windows 10 In 6 Steps June 13, 2020
  • How To Secure Your Wi-Fi Network In Few Steps. June 13, 2020
  • Find Vulnerable Webcams With Shodan [Metasploit Framework] June 12, 2020
  • Change Windows Password Of Remote PC Via METASPLOIT June 10, 2020
  • SSLKILL – Forced Man In The Middle Attack – Sniff HTTPS/HTTP June 10, 2020
  • How Hackers Hack Wi-Fi & Networks More Easily with Lazy Script June 10, 2020
  • How Hackers Hack Web Browsers with BeEF to Control Webcams, Phish for Credentials & More June 9, 2020
  • Kick-Off or Limit The Speed Of Other Devices On Your Network(Wifi) June 8, 2020
  • How Hacker Hack Windows 10 Using CHAOS Framework June 8, 2020
  • FREE Learning Material For All Programming Languages – GitHub June 7, 2020
  • Setup Honeypot In Kali Linux With Pentbox June 7, 2020
  • Gloom – Linux Penetration Testing Framework June 6, 2020
  • Most Popular Useful Kali Linux Hacking Tools June 6, 2020
  • How Hacker Hack Android Using Metasploit Without Port Forwarding Over Internet June 5, 2020
  • Disable Security Cameras on Any Wireless Network June 5, 2020
  • How Hackers Send Fake Mail Using SETOOLKIT June 4, 2020
  • Use Kismet to Watch Wi-Fi User Activity !! June 2, 2020
  • Simulate a RAT on Your Network with ShinoBOT June 2, 2020
  • Ehtools — Easy Penetration Testing Framework June 2, 2020
  • Map Vulnerable Networks using Wardrive on an Android Phone June 1, 2020
  • An Evil Twin Attack To Steal Wi-Fi Password June 1, 2020
  • LockPhish — Phishing Attack on Lock Screen May 31, 2020
  • Control Android Devices Remotely — Ghost Framework May 31, 2020
  • Hack Wi-Fi & Networks More Easily with Lazy Script May 30, 2020
  • How Hackers Hack Android Using Metasploit Over LAN/WAN May 29, 2020
  • Metasploit Framework – Hacker’s Favorite Exploitation Tool May 29, 2020
  • How Hackers Find Your IP Address to Hack Your Computer & How to Stop It May 29, 2020
  • SOCIAL ENGINEERING The Most Powerful Hack May 28, 2020
  • How To Find Anyone’s Private Phone Number Online May 26, 2020
  • Find Information from a Phone Number May 24, 2020
  • Find Passwords in Exposed Log Files with Google Dorks May 23, 2020
  • Use Google Dorks to Find Elusive Information May 23, 2020
  • What skills do I need to be a good hacker? May 22, 2020
  • How to track someone’s location online – with Grabify Tracking Links May 22, 2020
  • How to Change Kali Linux Hostname Using terminal May 22, 2020
  • How to update Kali Linux May 22, 2020
  • Get Started with Kali Linux in 2020 May 21, 2020

Buy Me A Coffee

Buy Me A Coffee

(^^)

500 ₹

Advertisements

like us on facebook

like us on facebook
Advertisements

Follow me on Twitter

My Tweets

Enter your email address to follow this blog and receive notifications of new posts by email.

Join 8,565 other followers

Blog Stats

  • 9,999,753 hits

chat with me

Follow On Instagram

  • instagram
  • twitter
  • facebook
  • youtube
  • github
  • play store
Create a website or blog at WordPress.com
Cancel