• instagram
  • twitter
  • facebook
  • youtube
  • github
  • play store
  • Contact
  • YouTube Channel
  • Join Discord (Chat Here)
  • Spyboy Bot
  • Download Our Apps
    • Spyboy App
    • C Programming
    • C++ Programming
    • Java Programming
Skip to content

Spyboy blog

Learn ethical hacking , networking, social engineering, cyber security, pen-testing, linux, android, windows tricks.

  • Home
  • Tech hacks
  • Linux
  • Windows Tricks
  • Android Tricks
  • Networking
  • More
    • CEH
    • iphone
    • Programming
    • Virus Creation
    • Tweak windows
    • uncategorized
May 27, 2022 Android Tricks / Linux / Networking / Tech hacks / Windows Tricks

R4VEN – track user’s smartphone/pc ip And gps location.

The tool hosts a fake website which uses an iframe to display a legit website and, if the target allows

Continue reading

January 8, 2022 Android Tricks / Linux / Tech hacks

Use Kali linux On Android without root

Easiest way to install kali-linux on android using termux. you don’t need rooted phone. you can also use sudo (run

Continue reading

June 4, 2020 Linux / Networking / Tech hacks

How Hackers Send Fake Mail Using SETOOLKIT

The information security environment has changed vastly over the years. Now, in spite of having security policies, compliance, and infrastructure security

Continue reading

November 8, 2020 Linux / Networking

How hackers Remotely access Android Using payload

This is a tutorial explaining how to hack android phones with Kali. I can’t see any tutorials explaining this Hack/Exploit,

Continue reading

October 30, 2020 Networking / Premium / Programming / Tech hacks

Make a Dead Man’s Switch to Delete & Encrypt Files if something happens to you

October 19, 2020 Linux / Windows Tricks

How Hackers Break into Somebody’s Computer and Exploit the System

After a hacker has configured Metasploit on a remote private server, created a resource script for automation, and created a

Continue reading

October 19, 2020 Uncategorized

Create Bootable USB with Persistence for Kali Linux

Recently I was trying to install Kali Live on a USB drive with persistence and struggled to find a tutorial

Continue reading

October 19, 2020 Linux / Windows Tricks

How hackers Bypass Locked Windows Computers to Run Kali Linux from a Live USB

It’s easy to run Kali Linux from a live USB on nearly any available computer, but many publicly accessible laptops and

Continue reading

October 19, 2020 Linux / Windows Tricks

Run Kali Linux on Windows without installing

Kali Linux is known as being the de facto penetration-testing Linux distribution but can be a pain to use as

Continue reading

October 19, 2020 Tech hacks / Windows Tricks

Make Your Own Evil USB

Recently, someone asked how to make your own “Evil USB,” and I promised to make a how-to on this topic.

Continue reading

October 12, 2020 Linux / Networking / Tech hacks / Windows Tricks

Find Sensitive & ‘Deleted’ Files Remotely

Deleted bank statements and private photos are still within an attacker’s grasp, so don’t think that emptying your recycling bin

Continue reading

October 12, 2020 Linux / Networking / Windows Tricks

Capture Keystrokes & Passwords Remotely

Using a keylogger to intercept keys pressed on an infected computer can circumvent encryption used by email and secure chat

Continue reading

October 6, 2020 Linux / Windows Tricks

Remotely Record & Listen to the Microphone of a Hacked Computer

The microphone in a Windows computer is accessible to most applications running on the device at all times and completely

Continue reading

September 21, 2020 Linux / Networking

How hackers Break into Somebody’s Computer Without a Password

A powered-off Windows 10 laptop can be compromised in less than three minutes. With just a few keystrokes, it’s possible

Continue reading

September 6, 2020 Tech hacks

Different Types Of Hackers

According to the dictionary meaning, a hacker is any person who usually has extraordinary computer skills and uses his knowledge

Continue reading

September 6, 2020 Linux / Networking / Tech hacks

How to Manage Big Password lists

In the penetration testing journey we must learn how to brute force attack. But the success of brute force attack

Continue reading

September 6, 2020 Linux / Networking

How Hackers BruteForce Gmail, Hotmail, Twitter, Facebook & Netflix

Install : pip install proxylist pip install mechanize Usage: BruteForce Gmail Attack python3 Brute_Force.py -g Account@gmail.com -l File_list python3 Brute_Force.py

Continue reading

September 6, 2020 Linux / Networking

Google Hacking Tool – uDork

uDork is a script written in Python that uses advanced Google search techniques to obtain sensitive information in files or directories, find

Continue reading

September 4, 2020 Linux / Networking

Make All Your Internet Traffic Anonymized-TorghostNG

TorghostNG is a tool that make all your internet traffic anonymized through Tor network. Rewritten from TorGhost with Python 3. TorghostNG was

Continue reading

September 1, 2020 Linux / Networking

Facebook Brute Forcer In Shellscript Using TOR – Facebash

Facebook Brute Forcer in shellscript using TOR Legal disclaimer:Usage of Facebash for attacking targets without prior mutual consent is illegal. It’s the

Continue reading

September 1, 2020 Linux / Networking

SocialBox – A Bruteforce Attack Framework (Facebook, Gmail, Instagram, Twitter)

SocialBox is a Bruteforce Attack Framework [Facebook, Gmail, Instagram,Twitter], Coded By Belahsan Ouerghi. Download Spyboy App Installation sudo apt-get install git sudo git

Continue reading

September 1, 2020 Linux / Networking

Instagram-Py – Simple Instagram Brute Force Script

Instagram-Py is a simple python script to perform basic brute force attack against Instagram , this script can bypass login limiting on wrong passwords , so basically

Continue reading

August 31, 2020 Networking

HiddenEye – Phishing Tool With Advanced Functionality (Support – Android)

Modern Phishing Tool With Advanced Functionality SCREENSHOT (Android-Userland) CREDIT:- Anonud4y ( I don’t remember if i have done Anything )

Continue reading

August 30, 2020 Linux / Networking

Stalk Your Friends social media accounts Using Image Recognition And Reverse Image Search – EagleEye

Stalk Your Friends. Find Their Instagram, FB And Twitter Profiles Using Image Recognition And Reverse Image Search.   This only

Continue reading

August 23, 2020 Linux / Networking

How hackers access WiFi Passwords in Minutes – Fluxion

Fluxion is a security auditing and social-engineering research tool. It is a remake of linset tool by vk496 which is not upgraded

Continue reading

August 22, 2020 Networking

Send and Receive Files Anonymously

A normal Internet user send files on internet through mails, messaging applications, Google Drive, DropBox, WeTransfer etc. But as security

Continue reading

August 22, 2020 Linux / Networking

How to Hide a Phishing Link

Nowadays people are smart enough. They don’t get trapped under phishing. Because the link does not look like the original

Continue reading

August 14, 2020 CEH

CEH – Enumeration

Total No. of Questions = 20 1. Enumeration is useful to system hacking because it provides which of the following?

Continue reading

August 14, 2020 CEH

CEH – Scanning

Total No. of Questions = 20 1. Which of the following is used for banner grabbing? A) Telnet B) FTP

Continue reading

August 14, 2020 CEH / Uncategorized

CEH – Footprinting

Total No. of Questions = 20 1. Which of the following best describes footprinting? A) Enumeration of services B) Discovery

Continue reading

August 5, 2020 Networking / Tech hacks

Best Websites For Free IP Lookup

An IP address lookup will determine the geolocation of any IP address. The results of the IP address lookup will show

Continue reading

August 5, 2020 Networking / Notepad Tricks / Tech hacks

Top 10 Most Dangerous Viruses Of All Times

Computer viruses are simply malicious programs or malware that “infect” other system files with the intention of modifying or damaging

Continue reading

August 5, 2020 CEH / Tech hacks

Top 50+Penetration Testing Interview Questions Most

As you prepare for your pentester interview, you may be considering which questions the employer is going to ask you.

Continue reading

July 29, 2020 CEH

CEH – Cryptography

Total No. of Questions = 20 1. Symmetric cryptography is also known as __________. A) Shared key cryptography B) Public

Continue reading

July 29, 2020 CEH

CEH – System Fundamentals

Total No. of Questions = 20 1. At which layer of the OSI model does a proxy operate? A) Physical

Continue reading

July 29, 2020 CEH

CEH – Introduction

Total No. of Questions = 20 1. If you have been contracted to perform an attack against a target system,

Continue reading

July 24, 2020 CEH

CEH – Assessment Test

# Total No. of Questions = 35 Q1. What is the focus of a security audit or vulnerability assessment? A)

Continue reading

July 24, 2020 Networking

Google Dorks For Bug Bounty Hunters

Google is one of the most popular search engine offers many different features in different languages. The term “Google Dork”

Continue reading

July 19, 2020 Linux / Networking / Uncategorized

[Fixed] No WiFi Adapter Found in Kali Linux

When we install Kali Linux on Desktop or Laptop we didn’t connect it with Wi-Fi. Sometimes internal WiFi adapter not

Continue reading

July 19, 2020 Linux / Networking

A Web Path Scanner: DirSearch

We are covering dirsearch tutorial in this post. it’s a simple command-line python based website directory/path scanner which can brute-force any targeted

Continue reading

July 18, 2020 Linux / Networking

Best WiFi Adapter For Kali Linux in 2020 -WiFi Adapter with Monitor Mode

Kali Linux WiFi Adapter The all new Kali Linux 2020 was rolling out and we can simply use it as

Continue reading

July 17, 2020 Android Tricks / Tech hacks

How To Turn Your Android Device Into Full Functional Computer

Want to turn your Android device into a fully functional computer? Well, there are lots of launcher apps available on

Continue reading

July 16, 2020 Pc Registry Tricks / Windows Tricks

How to Customize the Right-click Menu on Windows 10

Over the past few years, Microsoft’s Windows 10 has improved a lot. The desktop operating system has gotten better in

Continue reading

July 15, 2020 Windows Tricks

RUN CMD Commands With a Desktop Shortcut on Windows 10

Some users use Command Prompt daily. Some use to flush the DNS every time they get an internet error; and

Continue reading

July 15, 2020 Networking

Best Google Search Tricks & Tips

If you have been using Google Search for a while, then you might know that it’s a home of secrets.

Continue reading

July 13, 2020 Android Tricks / Networking / Tech hacks

Best Virtual Phone Number Apps For Account Verifications

There are plenty of Virtual phone number apps available for Android that provides users a secondary phone number. The secondary

Continue reading

July 12, 2020 Linux / Networking

The Deep Magic: Dmitry

Deepmagic Information Gathering Tool (DMitry) is a command-line application coded in C. DMitry has the ability to gather as much as

Continue reading

Posts navigation

«Previous Posts 1 2 3 4 5 … 14 Next Posts»
Advertisements

View our recent work on - spyboy.in

Blog Stats

  • 10,678,054 hits

Search this site

# Add Hacker's Bot Spyo - invte here

Discord Bots

# Hacker's server - chat here

Discord Server

C – Programming App

Get it on Google Play

C++ Programming App

Get it on Google Play

Java – Programming App

Get it on Google Play

Follow Us Here

  • Instagram
  • Facebook
  • YouTube
  • Google
  • Twitter
  • Discord

Subscribe to get access

Read more of this content when you subscribe today.

Subscribe
Log in

Categories

  • Account Takeover (1)
  • Android Tricks (87)
  • Bug Bounty (1)
  • CEH (9)
  • ctf-tools (1)
  • interview Questions (1)
  • iphone (3)
  • Linux (115)
  • Networking (282)
  • Notepad Tricks (38)
  • Payloads (15)
  • Pc Registry Tricks (16)
  • Premium (12)
  • Programming (100)
  • reconnaissance (2)
  • Tech hacks (277)
  • Tips (6)
  • Uncategorized (39)
  • Windows Tricks (167)
Advertisements

Recent Posts

  • HTTP Parameter Pollution February 19, 2023
  • GraphQL Injection: A Guide to Protecting Your Applications February 18, 2023
  • File Inclusion February 17, 2023
  • Directory Traversal Attack: A Threat to Web Security February 16, 2023
  • Denial of Service (DoS) Attacks Types February 15, 2023
  • How to install wireless network adapter Kali Linux and on android phones. February 14, 2023
  • The Art of Trapping Hackers: Honeypots February 13, 2023
  • Is there anybody hacking my phone? February 12, 2023
  • Can I hire a hacker to get my account back? February 11, 2023
  • Protecting Yourself Against Man-in-the-Middle Attacks February 10, 2023
  • What hacker attacks are you most likely to encounter? February 9, 2023
  • Coding and Hacking: Understanding the Connection February 8, 2023
  • How to use hacking in a good way? February 7, 2023
  • Hacking skills: what are they? February 6, 2023
  • The Parts of a Domain Name: What Are They? February 5, 2023
  • Methods of enumerating subdomains passively February 4, 2023
  • A Guide to Becoming a Bug Bounty Hunter February 3, 2023
  • Active Subdomain Enumeration February 2, 2023
  • Dependency Confusion January 28, 2023
  • DNS Rebinding January 28, 2023
  • Command Injection January 28, 2023
  • CSV Injection – the formula injection January 14, 2023
  • fork-bomb December 20, 2022
  • Top 20 Cyber Security JOB interview Questions  December 11, 2022
  • Keylogger – log & send them to an email December 7, 2022
  • CSRF Injection: Cross-Site Request Forgery December 6, 2022
  • Hacker Search Engines November 30, 2022
  • GitHub user email addresses: how to find them November 27, 2022
  • CTF help November 27, 2022
  • CRLF Injection November 26, 2022
  • Argument Injection – Vulnerabilities November 18, 2022
  • Account Takeover Techniques November 6, 2022
  • Web Sockets November 3, 2022
  • Reverse Shell November 1, 2022
  • R4VEN – track user’s smartphone/pc ip And gps location. May 27, 2022
  • Know if your emails has been opened or not !! April 24, 2022
  • Read free without subscription March 14, 2022
  • Proxychain March 4, 2022
  • Top 5 Mac mind mapping software to effortlessly organize your thoughts February 21, 2022
  • Install required packages automatically for a python script February 18, 2022
  • Beef-XSS – Cloning websites February 17, 2022
  • Reverse shell over TOR network using hidden services – Poiana February 16, 2022
  • Recover an Overwritten File on Mac February 15, 2022
  • Making Sure Your Cloud Solution Is Right for Your Business February 1, 2022
  • Kali Linux: Reset Password January 21, 2022
  • Use Kali linux On Android without root January 8, 2022
  • H1deM3 – hide messages in messages November 29, 2021
  • Doxing October 21, 2021
  • Hacking – Getting started October 19, 2021
  • Nmap – How to Use Nmap September 3, 2021
  • Website copier – clone any website September 3, 2021
  • Dnspeep – look what DNS Queries Your pc Is Making April 28, 2021
  • Use phone As Rubber Ducky Against Another phone April 28, 2021
  • 2021 – Best Ethical Hacking Tools & apps for Hackers April 28, 2021
  • ALL IN ONE Hacking Tool For Hackers April 28, 2021
  • Android PIN Bruteforce – Unlock Lockscreen PIN April 28, 2021
  • SSH for remote access on Linux February 17, 2021
  • Zint: QR codes Generator February 17, 2021
  • Open source VPN tools February 17, 2021
  • Instagram: Sites to Buy Followers February 4, 2021
  • RedRabbit : Pen-Testing & Post-Exploitation for Windows January 31, 2021
  • Zydra : Crack Password-Protected ZIP Files, PDFs & More January 29, 2021
  • Extend Context(right lick)-Menu in Windows January 26, 2021
  • Iron Man Jarvis AI Desktop Voice Assistant | in Python January 12, 2021
  • What is a Zero-Day Exploit? January 5, 2021
  • PhpSploit – post exploitation framework January 5, 2021
  • Create an Undetectable Payload,(hide the Payload) December 7, 2020
  • Create an Undetectable Payload (Bypass Antivirus) December 7, 2020
  • How to use a Router as a Wireless Adapter December 5, 2020
  • How to protect your server(website) from DDoS attacks December 5, 2020
  • DDoS attack using SlowHTTPTest (Slowloris) in Kali Linux December 5, 2020
  • Hulk DDoS : Installation & Usage with Examples December 5, 2020
  • Kali Linux Hydra Tool Example December 5, 2020
  • Top DDoS Attack Tools December 5, 2020
  • Automatically Post WordPress Posts to Discord December 5, 2020
  • Bot to fix Python indentation error December 5, 2020
  • Make a Persistent payload in Android Using Kali December 3, 2020
  • Installing Selenium and ChromeDriver on Windows December 1, 2020
  • Turn a Pen Drive into a USB Rubber Ducky November 30, 2020
  • Make A WhatsApp Spammer November 27, 2020
  • Gadgets for hacker November 21, 2020
  • Use SSH Tunnels to Forward Requests & Access Remote Routers November 15, 2020
  • How hackrs Brute-Force Almost Any Website November 15, 2020
  • Scan Web Applications for Common Vulnerabilities Using Metasploit’s WMAP November 15, 2020
  • Nikto – Scan Any Website for Vulnerabilities November 12, 2020
  • Customize your Mac terminal using figlet November 12, 2020
  • Termux !! Full Tutorial With Termux commands November 12, 2020
  • Make Cool linux Terminal Header November 12, 2020
  • How hackers Remotely access Android Using payload November 8, 2020
  • Make a Dead Man’s Switch to Delete & Encrypt Files if something happens to you October 30, 2020
  • How Hackers Break into Somebody’s Computer and Exploit the System October 19, 2020
  • Create Bootable USB with Persistence for Kali Linux October 19, 2020
  • How hackers Bypass Locked Windows Computers to Run Kali Linux from a Live USB October 19, 2020
  • Run Kali Linux on Windows without installing October 19, 2020
  • Make Your Own Evil USB October 19, 2020
  • Find Sensitive & ‘Deleted’ Files Remotely October 12, 2020
  • Capture Keystrokes & Passwords Remotely October 12, 2020
  • Remotely Record & Listen to the Microphone of a Hacked Computer October 6, 2020
  • How hackers Break into Somebody’s Computer Without a Password September 21, 2020
  • Different Types Of Hackers September 6, 2020
  • How to Manage Big Password lists September 6, 2020
  • How Hackers BruteForce Gmail, Hotmail, Twitter, Facebook & Netflix September 6, 2020
  • Google Hacking Tool – uDork September 6, 2020
  • Make All Your Internet Traffic Anonymized-TorghostNG September 4, 2020
  • Facebook Brute Forcer In Shellscript Using TOR – Facebash September 1, 2020
  • SocialBox – A Bruteforce Attack Framework (Facebook, Gmail, Instagram, Twitter) September 1, 2020
  • Instagram-Py – Simple Instagram Brute Force Script September 1, 2020
  • HiddenEye – Phishing Tool With Advanced Functionality (Support – Android) August 31, 2020
  • Stalk Your Friends social media accounts Using Image Recognition And Reverse Image Search – EagleEye August 30, 2020
  • How hackers access WiFi Passwords in Minutes – Fluxion August 23, 2020
  • Send and Receive Files Anonymously August 22, 2020
  • How to Hide a Phishing Link August 22, 2020
  • CEH – Enumeration August 14, 2020
  • CEH – Scanning August 14, 2020
  • CEH – Footprinting August 14, 2020
  • Best Websites For Free IP Lookup August 5, 2020
  • Top 10 Most Dangerous Viruses Of All Times August 5, 2020
  • Top 50+Penetration Testing Interview Questions Most August 5, 2020
  • CEH – Cryptography July 29, 2020
  • CEH – System Fundamentals July 29, 2020
  • CEH – Introduction July 29, 2020
  • CEH – Assessment Test July 24, 2020
  • Google Dorks For Bug Bounty Hunters July 24, 2020
  • [Fixed] No WiFi Adapter Found in Kali Linux July 19, 2020
  • A Web Path Scanner: DirSearch July 19, 2020
  • Best WiFi Adapter For Kali Linux in 2020 -WiFi Adapter with Monitor Mode July 18, 2020
  • How To Turn Your Android Device Into Full Functional Computer July 17, 2020
  • How to Customize the Right-click Menu on Windows 10 July 16, 2020
  • RUN CMD Commands With a Desktop Shortcut on Windows 10 July 15, 2020
  • Best Google Search Tricks & Tips July 15, 2020
  • Best Virtual Phone Number Apps For Account Verifications July 13, 2020
  • The Deep Magic: Dmitry July 12, 2020
  • Powerful Websites That Can Replace Your PC Software July 9, 2020
  • How To Install Multiple Bootable Operating Systems On One USB July 9, 2020
  • Torrent Proxy Sites List 2020 (100% Working Mirror Sites) July 9, 2020
  • Best Websites to Download Free Books July 9, 2020
  • Best CMD Commands Used By Hackers July 9, 2020
  • How To Activate the New Start Menu of Windows 10 July 9, 2020
  • Shodan — The Most Dangerous Search Engine July 8, 2020
  • Tech Behind Web Application: Whatweb July 6, 2020
  • Hide Secrets in Pictures: Steghide July 6, 2020
  • Port Forwarding using SSH July 6, 2020
  • Advanced Lazy Automated Phishing Script: ZPhisher July 5, 2020
  • How Hackers access Wi-Fi Networks: AirCrack July 4, 2020
  • Take Total Control on Android Remotely: HaxRat July 3, 2020
  • Advanced Phishing | Bypass Two Factor Authentication – Modlishka July 2, 2020
  • Trape: People Tracker On the Internet July 1, 2020
  • SpiderFoot: OSINT Reconnaissance Tool July 1, 2020
  • Recon-ng: Information Gathering with Open Source Intelligence June 30, 2020
  • How To Send Anonymous Text, Emails, Media Files using Utopia June 28, 2020

Buy Me A Coffee

Buy Me A Coffee

(^^)

500 ₹

Advertisements

like us on facebook

like us on facebook
Advertisements

Follow me on Twitter

My Tweets

Blog Stats

  • 10,678,054 hits

Enter your email address to subscribe to this blog and receive notifications of new posts by email.

Join 6,795 other subscribers

  • instagram
  • twitter
  • facebook
  • youtube
  • github
  • play store
Create a website or blog at WordPress.com
  • Follow Following
    • Spyboy blog
    • Join 2,880 other followers
    • Already have a WordPress.com account? Log in now.
    • Spyboy blog
    • Customize
    • Follow Following
    • Sign up
    • Log in
    • Report this content
    • View site in Reader
    • Manage subscriptions
    • Collapse this bar
 

Loading Comments...