Posts

Showing posts from June, 2021

How Automatically Reply A Message On Whatsapp

  How Automatically Reply A Message On Whatsapp WhatsApp is a very well-known app in the world. Whatsapp is an application owned by Facebook developer Mark Zuckerberg. I don't think that there is a need to explain to you about Whatsapp in this article, so I will teach how to reply a Whatsapp message automatically. Whatsapp have many features like changing the theme, font size, status privacy and recently WhatsApp added a feature to search files, audio, video, images in a particular chat or from all Whatsapp chats. So basically Whatsapp developers are bringing advance features in every new update of WhatsApp. But there is no feature which can automatically reply your Whatsapp chats, and today I will teach you how you can bring this feature on WhatsApp chats. There are most of the tutorials on the internet about this,  but most of the tutorials will suggest you that install a third-party Whatsapp application or a modded Whatsapp application. But my friend installing a WhatsApp m...

Top 10 Tech Security Tips To Keep Yourself Safe From Hackers

Image
  Top 10 Tech Security Tips To Keep Yourself Safe From Hackers https://t.me/hackingtrick420  If you are surfing the net or your computer is linked in anyway to Internet, you would be aware of the risks that cyber criminals pose to you. Computer security, also known as cybersecurity or IT security, is the protection of information systems from theft or damage to the hardware, the software, and to the information on them, as well as from disruption or misdirection of the services they provide. On the other hand, data security means protecting data, such as a database, from destructive forces and from the unwanted actions of unauthorized users. Every computer user needs to know the basic things to keep their device and data secure. Given below are the few tips and habits that can help you: 1. Frequently Review Your App Permissions and Security Settings (App permissions) Lastly, you still have to be watchful and make sure your software is always up-to-date besides following the ab...

How to hack android with a pdf file (adobe reader exploit)

Image
https://t.me/hackingtrick420   How to hack android with a pdf file (adobe reader exploit) Welcome to android hacking series. In today’s article, you will learn how to hack android with a pdf file. Do note that this an old vulnerability which was fixed and does not work on newer phones. But old phones are still vulnerable to this attack. This hack works with adobe reader version 11.2.0 and lower on android devices. This a remote code execution vulnerability in adobe reader which can help us take control of an android device via a malicious pdf crafted with Metasploit. How does hacking android with a pdf file work? Adobe Reader Android version less than 11.2.0 has a critical vulnerability which exposes insecure native interfaces to untrusted javascript inside a PDF. This hack works by embedding the exploit from android/webview_addjavascriptinterface browser exploit we did in the previous article. This hack uses PDF as a carrier to get a command shell on andro...

C++ Programming Language @hackingtrick420

  C++ Programming Language The computer language for slightly elevated objects is C++, which permits developers to modify quick and versatile programs. This is founded in the 1980s at Bell Laboratories by Bjarne Stroustrup. C++ has become so compliant with C that it would possibly compilate more than 99 percent of C programs without modifying an origin row. C++ Features Object-oriented  C++ is an object-oriented programming language. It implies that emphasis is on "objects" and deceptions. The user of this object abstracts knowledge concerning how these distortions function.   Existence of Libraries The computer language C++ allows the creation full of built-in functions which facilitate coding. You can control certain features with the appropriate header files.   Pointer Support  C++ recognizes even points commonly used for coding and mostly not usable in numerous languages.   Speed If the lag is crucial, C++ has been the best option. The initialization an...

PUBG: NEW STATE (MOD/BETA APK + OBB) v

Image
  PUBG: NEW STATE (MOD/BETA APK + OBB) v DOWNLOAD APK DOWNLOAD ABB  JOIN THIS CHANNEL FOR MORE @hackingtrick420

How to Restrict Android Apps from Using Data in the Background

  How to Restrict Android Apps from Using Data in the Background ➖➖➖➖➖➖➖➖➖➖➖➖➖➖ 🌐 Disabling the background data usage of apps will save you data and enhance your smartphone’s battery life.  🔹Step 1: First of all, open the Settings app on your Android smartphone. 🔹Step 2: On the Settings app, tap on the ‘Apps.’ 🔹Step 3: Next, tap on the ‘See all apps’ option. 🔹Step 4: Now you will see the list of all installed apps on your Android smartphone. 🔹Step 5: Open the app for which you want to disable background data usage. Next, tap on the ‘Data Usage’ option. 🔹Step 6: Now scroll down and disable the toggle next to ‘Background Data.’    ✅ That’s it! You are done. This will stop the app from sending or receiving data in the background. You need to implement the same process for every app you want to block internet access. ❗️Note: The settings might vary depending on the device you are using Keep supporting us❤️

13 BEST Operating System (OS) for Hacking in 2021

Image
  13 BEST Operating System (OS) for Hacking in 2021 Ethical hacking is identifying weaknesses in computer systems or networks to exploit its vulnerabilities so they can be fixed later. Hackers use various techniques to identify threats and thereby increase the security of the device. These people can utilize Linux based operating system to hack PC or network. It contains a wide range of applications to prevent cybersecurity attacks. Following is a handpicked list of Top OS for Hacking with their popular features and download links. BEST OS for Hacking: Top Picks 1) Kali Linux     Kali Linux is a Security Distribution of Linux specifically designed for digital forensics and penetration testing. It is one of the best hacking OS which has over 600 preinstalled penetration-testing applications (cyber-attack performs against computer vulnerability). This OS can be run on Windows as well as Mac OS. Features: It can be used for penetration testing. This platform i...