Posts

Showing posts from May, 2021

What is the Tor Browser? - Use the Tor Browser

Image
What is Tor? The Tor Project is a non-profit organization that conducts research and development on online privacy and anonymity. It is designed to stop people - including government agencies and companies - from studying your location or tracking your browsing habits. Based on that research, it provides technology that removes Internet users and websites through “transfers” run by thousands of volunteers around the world, making it very difficult for anyone to find a source of information or location for a user. Its software package - Tor's browser - can be downloaded and used to use that technology, with a different version available on Android smartphones. How to use the Tor Browser For most people, using Tor Browser is as easy as downloading and running it, just as you can download Chrome or Firefox. If you have never used Tor, the first thing you will notice is that it is slower - or at least, slower than normal internet browsing. However, Tor has accelerated ...

Customize Termux Header Your Device Info Details

Image
In this post, I will show you how to permanently delete the original text from termux and insert the Android Logo and your mobile details into the start windows. How to Delete Original Termux Text Whenever we turn on termux or start a new session on termux we see some text that automatically comes to termux. If you want to delete that text you can use the steps below. Step 1 :-    Install Nano The text editor for termux.we will use nano to edit the termux autorun file (bashrc). pkg install nano Step 2 :-    Convert the directory to a folder, etc. cd /data/data/com.termux/files/usr/etc Step 3 :-    Edit bash.bashrc file for use nano text editor tool. nano bash.bashrc Step 4 :-    Move the cursor to the end of the line and type Clear. Press CTRL + X. Press y and then press ENTER. Step 5 :-    Restart the termux or open a new session and that Text will be gone because whenever we start a new session a clear command will be executed and You will see the Screen Screen. ...

Top 10 Best Password Cracking Tools

Image
What is password cracking? Password-verified system does not store the user's original password. This can make it much easier for hackers or intruders to gain access to all system user accounts. Instead, authentication systems retain a password hash, which is the result of sending a password - and a random amount called salt - for the hash function. Hash functions are designed to be single-mode, which means that it is very difficult to determine the input that produces the given result. Since hash functions are also deterministic (meaning that the same input produces the same result), comparing two password hashes (saved and user-provided hash passwords) is almost the same as comparing actual passwords. Password cracking refers to the process of removing passwords from the corresponding hash password. This can be achieved in a number of different ways: 🔘 Dictionary attacks: Most people use strong and common passwords. Taking a list of names and adding a few permissions - like add...

Awesome and Cool Termux Secret Commands in Android 2021

Image
Termux is an advanced Android phone tool that converts your phone into a hacker but there are some Cool Termux instructions that do not help you to hack anything but are fun to use, so I took a break from serious things and made a list of The Top 10 Temux Secret Instructions which no one is talking about I have installed all of the Operating commands  in 2021 and have installed the Top 10 best Commands for Termux. . Top Awesome and Cool Termux Commands in 2021 : Also Read:   Install Wireshark in Termux Android 1. Termux Running Rail Train: Step 1 :-    This command will install the sl package in termux, The package size is too small and will be installed immediately. pkg install sl Step 2 :-    Now the sl package is installed on your termux and you should type sl anytime you want. And the train will run on your screen and behind it you will see your end. sl 2. Turn your Termux into a Fire Place🔥 :   Looking for Thematic split screen to make your look more attractive? You can u...

How to Hide and Charge Any Link - Real Domain

Image
Nowadays people are smart enough. They are not caught in the act of stealing sensitive information. Because the link doesn't look like a real website. For example a criminal link for stealing sensitive information may be the same, https://ngrok.io/xxabcd but it opens pages like Gmail Login. People have found a trap and a user with little tech knowledge will not place guarantees So it becomes difficult to cheat anyone. Then what do you do? The answer is social engineering. The invader needs to be competent enough in social engineering. What is Social Engineering? In short, social engineering is "bugs in human hardware". The attacker plays on the victim's mind and deceives her. Hiding criminal links to steal sensitive information from ordinary links that seem trustworthy is part of social engineering. By using this method the attacker can be trusted by the victim, and the victim treats the criminal link to steal sensitive information as a standard link. Because high-end...