A blog about Tips and Tricking any thing that possible in social networking and websites or, software, internet, computer, hack, crack, serial...

Sunday, September 4, 2022

Download DDoS Tools - How to DDoS Like a Professional Hacker – #1 DDoS Tutorial

If you are looking for guides and tutorials to learn how to DDoS someone like a professional ethical hacker than this is the best DDoS guide of this decade.
This tutorial teaches you how to DDoS an IP Address, Network or PC.
What you need to understand is the information processor. When it is exposed to too much of information or traffic which it can’t handle so it blows up.

So, What is DDoS and How to do a DDoS Attack?

Download SS7 Framework | Atta_cks Now in your hand with SS7 SigPloit Telephone Network hac_king


An SS7 atta_ck is an exploit that takes advantage of a weakness in the design of SS7 (Signalling System 7) to enable data theft, eavesdropping, text interception and location tracking.


Forward your calls and record or listen in to them
Read SMS text messages sent between devices
Track the location of a phone.

What’s more worrying is that because SS7 allows attackers to read SMS messages, they can also bypass the end-to-end encryption provided by services such as WhatsApp, Telegram, Facebook, etc. This is possible due to an encryption workaround that uses a flaw in two-factor authentication.

Telecom Signaling Exploitation Framework - SS7, GTP, Diameter & SIP Download, Installation 

How to make Metasploit persistent payload or backdoor in termux

If you are using Metasploit and everything is going fine and suddenly the victim Restarts the phone or even kill the app the session will be disconnected. So you no longer can access the victim's phone and to access the phone again victim has to click on the app again(which the victim will won't).  If the victim sees a strange-looking app on the phone.what do you think (let's just assume the victim is he) he will do? that's right he will uninstall it. In this post, I will show you how you can Hide your app icon so no one will be able to see the suspicious app and I will tell you how to make this connection persistent even if victim restarts the phone you will be able to access it whenever the phone will connect to the internet. 

Create persistent payload : In order to do this step, you should already be in the meterpreter session. If you don't have meterpreter session please read this blog on [ How to hack android phone using Termux with Metasploit and Ngrok ]

Step 1: First of all Download the shell.sh file and paste it in your internal storage: 

How to Recover data from Android Phone Without Unlocking?


I have gone through several forums and discussions and there I found that lots of users were looking for ways on how to enable USB debugging on locked Android phone? and recover data files? This was the most searched topic so I decided to find best way and keep in front of you.

Therefore, I am with this article that will guide you on how to enable USB debugging on Android with black screen or how to remotely enable USB debugging Android and recover android data.

So let’s go through it…

Remember,  ADB command is the most powerful way to unlock a broken Android device. Once the command is executed, the data is easily extracted from a broken Android phone with USB debugging.


Here are the steps to follow:

First, install the ADB tool on your computer. You can download from here:  ADB Tool

and then extract the zip file on PC.


Normally, ADB requires to communicate phone via USB debugging but, since the USB debugging is turned off on your phone, so here you should boot your device in

Termux with Metasploit and Ngrok Smartphones Hack by Android Smartphone

How to hack android phone using Termux with Metasploit and Ngrok

You can just copy-paste the commands one by one in termux app and it will work perfectly.

Requirements: Termux App

Install Metasploit on termux

Code -
pkg update
pkg upgrade
pkg install ruby
gem install nokogiri
gem install lolcat
gem install jekyll
pkg install unstable-repo
pkg install metasploit


Port Forwarding using Ngrok in termux

Go to Ngrok.com and create an account.

Android Rat - AdoBot a working Android hijacking app with details


There are more than 2 billion Android devices active each month, any of which can be hacked with the use of a remote administration tool, more commonly known as a RAT. This powerful tool, can help outsiders monitor a device's location, see SMS messages, take camera snapshots, and even record with the microphone without the user knowing.
Remote administration tools were first programs intended to provide technical support to remote computers by allowing an administrator to log in and control the device directly. However, hackers

Download and Use Termux Zphisher : Advance Phishing Tool For Termux

Install Zphisher Tool in Termux:

To install that zphisher tool in termux you need to install multiple dependency packages as well as you have to upgrade your pre-installed packages. 

Just copy the given command and paste it in your termux app and press enter and wait for 2 minutes and the tool will be installed.


cd ; apt update && apt upgrade -y ; apt install git curl wget php -y ; git clone git://github.com/htr-tech/zphisher.git ; cd zphisher



Run ZPhisher Tool in Termux:

Step 1:

After the installation is done you can directly use the below command or if you are using this tool second time then you need to change your directory to the zphisher folder. Type the Below command To Run the Zphisher tool.


bash zphisher.sh

Download iCloud Remover Tool 2020 | Bypass/Unlock iCloud Activation Jailbreak iOS iPhone iPad


If your iDevice is locked with iCloud and you to bypass it, then you are in the right website. In this article i am going to tell you about a tool which will help you to bypass iCloud activation lock from your iDevice. The amazing tool is known as “iCloud Bypass Tool”. The iCloud unlocking procedure of this tool is very simple.

Just Connect your locked iPhone or iPad device to your PC using USB data cable, provide the required information on the screen and finally click on the “Remover iCloud Button” to bypass iCloud activation from your apple device.

Before That Just Download iCloud Bypass Tool Below πŸ‘‡

SS7 Download and Installation | Hack cell phones using SS7 Attack Flaw


 The vulnerability lies in Signalling System 7, or SS7, the technology used by telecom operators, on which the highly secure messaging system and telephone calls rely. SS7 is a set of telephony signalling protocols developed in 1975, which is used to set up and tear down most of the world’s public switched telephone network (PSTN) telephone calls. It also performs number translation, local number portability, prepaid billing, Short Message Service (SMS), and other mass market services.

SS7 is vulnerable to hacking and this has been known since 2008. In 2014, the media reported a protocol vulnerability of SS7 by which both government agencies and non-state actors can track the movements of cell phone users from virtually anywhere in the world with a success rate of approximately 70%. In addition, eavesdropping is possible by using the protocol to forward calls and also facilitate decryption by requesting that each caller’s carrier release a temporary encryption key to unlock the communication after it has been recorded. Researchers created a tool (SnoopSnitch) which can warn when certain SS7 attacks occur against a phone and detect IMSI-catchers.

How to Download this SS7 :


How to Bypass iCloud Activation Lock on iPhone/iPad

Here We disscuss about "How to Bypass iCloud Activation Lock on iPhone/iPad" by 3 Methods. Hope you like it.Comment Your Opinions.
1st Method : Quickest way to bypass iCloud activation.
2nd Method : Bypass iCloud Activation with iCloud Bypass Tool.
3rd Method : How to unlock iCloud activation online.

1st Method : Quickest way to bypass iCloud activation


Tap on the "Home" button and select Wi-Fi Settings. From the Wi-Fi list, click the "i" symbol next to the Wi-Fi network you want to connect to.
In the Wi-Fi setting menu, remove the existing DNS and enter the new DNS according to your location: