❌ TECHNICAL SAGAR COURSES ❌ ➖➖➖➖➖➖➖➖➖➖➖ Free free free free free free ➖➖➖➖➖➖➖➖➖➖➖ 🔰Quick Hack:- https://www.mediafire.com/file/mrcz8aa7ji05a2m/ ➖➖➖➖➖➖➖➖➖➖➖ 🔰Tech Master https://www.mediafire.com/file/umk316gpoy3tlbg/ ➖➖➖➖➖➖➖➖➖➖➖ 🔰Money Making http://www.mediafire.com/file/9scal11vbu97tyo/Money_Making.zip ➖➖➖➖➖➖➖➖➖➖➖ @ershubhambhagat ➖➖➖➖➖➖➖➖➖➖➖
Posts
Showing posts from December, 2018
Try Free FB Id's
- Get link
- X
- Other Apps
Fb id free sasuke500616@yahoo.com:Dragoon99 kvasnovskykristian@gmail.com:Foreveralone kickbo@tlen.pl:Lama11 emrik-warp@hotmail.com:Pewpew123 axels_incarnation@yahoo.com:Pokemon101 rangstrup@hotmail.com:Maanmaan kettaro_niconico@yahoo.co.jp:Sabamiso Kebonez@hotmail.com:Haha123haha KicklerBlistAx@hotmail.com:Residentevil5 pagewilliamphoto@gmail.com:Thisismypassword klewitz@gmail.com:Wtfbbq taikanokaishin645@hotmail.co.jp:Qwasqwas at.bredenkamp@gmail.com:Randompass as2coeur100@gmail.com:Keke123 catherine.darkins@btinternet.com:Harrypotter1 luckyredina11@aol.com:Idk123 game.lundgren@gmail.com:Lolol123 smiles_1517@yahoo.com:Magicman1 troy.gustafsonn@gmail.com:Master1234 jhdejong@ucdavis.edu:Pantera3 amazoness56@gmail.com:Toan123 vinnie037@gmail.com:Skater123 mcdowall.kieran@gmail.com:Ps2ps2 knight.infamy@yahoo.com:Qwertyui1 kilanth@icloud.com:Redalert2 kievo9877@gmail.com:Xyz321 andrew.robinson@senecac.on.ca:Robinson1 liljlauder@gmail.com:Teamdeathmatch god.god.god@mail.ru:Avatar key...
How to Hack Gmail using a Packet Sniffe?
- Get link
- X
- Other Apps
How to Hack Gmail using a Packet Sniffe? Whenever someone logs into Gmail (or any other login service), a file called a "cookie" is sent to their computer. This cookie allows the user to stay logged in, even if they leave Gmail. A packet sniffer can find cookies being transferred over a wireless network. When you find a Gmail cookie, you can open it on your computer and potentially access your target's inbox. You'll need to be connected to the same wireless network as your target Download and install Wireshark Wireshark is a free network monitoring utility that you can download from Click Here to Download It is available for Windows, Mac, and Linux. Installing Wireshark is a straightforward process. Follow the prompts like you would with most programs. Download Cookie Cadger This is a Java program that will will find and intercept cookies being sent across the wireless network. Cookie Cadger doesn't need to be installed. It works the same in every op...
- Get link
- X
- Other Apps
HOW TO FIX 'UNFORTUNATELY APP HAS STOPPED' ERRORS? There is one problem that plagues beginner and advanced Android owners alike: the cursed Unfortunately, (fill in app name here) has stopped error message It appears when you're in the middle of using an app, and then forces that app to close. Annoying, right? Fortunately, there is a way to stop it. Here's how to fix Unfortunately, app has stopped errors. ===>Clear out the app's storage This problem often arises with the contacts, gallery and launcher apps. The procedure to fix this is generally always the same. -First, navigate to Settings on your device. -Go to Applications > Application manager -Swipe left until you find the All tab. Scroll down to the app that's causing problems and tap on it. Here you will find the Clear data and Clear cache options. -Clear cache is the option you should start with. It will get rid of saved data that allows apps to load a little quicker when you lau...
- Get link
- X
- Other Apps
Repair corrupted Pen Drive or SD card using CMD? This process involves Windows command prompt which is commonly known as CMD. In this, you have to enter some CMD commands and Windows will forcefully format your corrupted pen drive/SD card. Connect the corrupted pen drive or SD card to your computer. However your mouse on the Start button and Right. Click Command Prompt (Admin). A CMD window will open. Type diskpart and press Enter. Type list disk and press Enter. A list of all the storage devices connected to your computer will be displayed. Type select disk <the number of your disk> and press Enter. (Example: select disk 1). Important: Make sure you enter the number correctly. Otherwise, you may format your internal hard drive. You can type list disk again to check whether you are going correctly. There will be a star (asterisk symbol) before the name of the selected disk.Type clean and press Enter. Type create partition primary and hit Enter. Type active. ...
- Get link
- X
- Other Apps
How to combine two Wifi Connections to get a faster Internet You have more than one active internet connections and you are using only one at a time, while the other is resting? Don't let it be lazy. Combine them all to get combined internet speed. Say you have two connections of 1 Mbps each, you just can make 1+1=2. This can work regardless of the type of the connections, i.e. it may be wired, wireless or mobile communication. Method 1 of 4: Combining LANs Steps: 1. Turn everything on your computer, modems (in case of DSL). 2. Connect them on the relative ports. 3. Establish Connections. Dial or do whatever you need to do to establish an Internet connection and test each one by one separately. If all good proceed to the next step. 4. While each one is active and connected, navigate to the "Network Devices" folder of your computer. It usually stays under control panel. Windows 8 or Windows 8.1, press Windows D to navigate to the desktop, and the rest is the s...
- Get link
- X
- Other Apps
How To make ur friends wifi Limited? 1️⃣. open cmd 2️⃣ .write ipconfig/release 3️⃣.You are done😂 and to make it work write ipconfig/renew now see the next trick👇👇👇👇 How to make ur frienz wifi pc not connected to wifi???? 1️⃣. run cmd as an adminstrator 2️⃣.write netsh wlan add filter permission=denyall networktype=infrastructure 3️⃣. You are done😂 and to make it connect again run cmd as an adminstrator and write in netsh wlan delete filter permission=denyall networktype=infrastructure share to ur frienz and in groups 👉@ershubhambhagat👈 invite ppls and try it on ur pc and press 👍 if it worked
- Get link
- X
- Other Apps
How to unlock PIN or Pattern of ur android without root without losing data? 1. Install it or if u hav it already follow the steps 2. Plug ur android phone wiz cable to ur pc and make sure USB debugging is on on ur android 4. Then goto the directory of the app then goto Android>Android-SDK>Platform-Tools> then Hold Shift then Press right click while holding shift then click Open command window here then write this command For PIN unlocking use the below command👇👇👇 ADB SHELL RM /DATA/SYSTEM/PASSWORD.KEY For Pattern unlocking use the below command 👇👇👇👇 ADB SHELL RM /DATA/SYSTEM/GESTURE.KEY 5. Then reboot ur phone then u hav unlocked ur phone Share to ur frienz and invite ppls Invite frienz and the press 👍 if it worked and file MB bizu hono download madreg yalchalachu press 😞 if the file is large and u cant download it press😞 👍 or 😞 5+ 😞 i will post wiz easy method but requires #ROOT for the easy method 👍 or 😞
- Get link
- X
- Other Apps
How to hack pc password 1️⃣. First get bootable iso file to ur USB or CD/DVD which is similiar to ur windows 2️⃣. then insert the usb and start the computer 3️⃣. then F12 or click whatever which gets u to boot menu and choose USB or CD/DVD 4️⃣. then it will start choose Repair your Computer 5️⃣. system restore will start but Click Cancel or whatever 6️⃣. then it will show u methods to repair ur computer choose System image recovery 7️⃣. after u hav chosen it goto next> then select file> click ok 8️⃣. then it will redirect u to browse goto D:\(cuz c will replace to d or with another letter) then goto Windows>system32 copy cmd.exe with a name cmd2.exe then copy Utilman.exe with a name Utilman2.exe 9️⃣. Delete Utilman.exe then Rename cmd2.exe to Utilman.exe After u hav done that restart ur computer 🔟. then goto the account u want to login then at the bottom there is an Advanced option icon which contains narrator and on-screen keyboard, Click on tha...
- Get link
- X
- Other Apps
🔰 HOW TO PROTECT WEBSITE AGAINST HACKS 🔰 🌀 Aɴ ᴏʀɢᴀɴɪᴢᴀᴛɪᴏɴ ᴄᴀɴ ᴀᴅᴏᴘᴛ ᴛʜᴇ ғᴏʟʟᴏᴡɪɴɢ ᴘᴏʟɪᴄʏ ᴛᴏ ᴘʀᴏᴛᴇᴄᴛ ɪᴛsᴇʟғ ᴀɢᴀɪɴsᴛ ᴡᴇʙ sᴇʀᴠᴇʀ ᴀᴛᴛᴀᴄᴋs. 🔹 SQL Iɴᴊᴇᴄᴛɪᴏɴ sᴀɴɪᴛɪᴢɪɴɢ ᴀɴᴅ ᴠᴀʟɪᴅᴀᴛɪɴɢ ᴜsᴇʀ ᴘᴀʀᴀᴍᴇᴛᴇʀs ʙᴇғᴏʀᴇ sᴜʙᴍɪᴛᴛɪɴɢ ᴛʜᴇᴍ ᴛᴏ ᴛʜᴇ ᴅᴀᴛᴀʙᴀsᴇ ғᴏʀ ᴘʀᴏᴄᴇssɪɴɢ ᴄᴀɴ ʜᴇʟᴘ ʀᴇᴅᴜᴄᴇ ᴛʜᴇ ᴄʜᴀɴᴄᴇs ᴏғ ʙᴇᴇɴ ᴀᴛᴛᴀᴄᴋᴇᴅ ᴠɪᴀ SQL Iɴᴊᴇᴄᴛɪᴏɴ. Dᴀᴛᴀʙᴀsᴇ ᴇɴɢɪɴᴇs sᴜᴄʜ ᴀs MS SQL Sᴇʀᴠᴇʀ, MʏSQL, ᴇᴛᴄ. sᴜᴘᴘᴏʀᴛ ᴘᴀʀᴀᴍᴇᴛᴇʀs, ᴀɴᴅ ᴘʀᴇᴘᴀʀᴇᴅ sᴛᴀᴛᴇᴍᴇɴᴛs. Tʜᴇʏ ᴀʀᴇ ᴍᴜᴄʜ sᴀғᴇʀ ᴛʜᴀɴ ᴛʀᴀᴅɪᴛɪᴏɴᴀʟ SQL sᴛᴀᴛᴇᴍᴇɴᴛs. 🔸 Dᴇɴɪᴀʟ ᴏғ Sᴇʀᴠɪᴄᴇ Aᴛᴛᴀᴄᴋs ғɪʀᴇᴡᴀʟʟs ᴄᴀɴ ʙᴇ ᴜsᴇᴅ ᴛᴏ ᴅʀᴏᴘ ᴛʀᴀғғɪᴄ ғʀᴏᴍ sᴜsᴘɪᴄɪᴏᴜs IP ᴀᴅᴅʀᴇss ɪғ ᴛʜᴇ ᴀᴛᴛᴀᴄᴋ ɪs ᴀ sɪᴍᴘʟᴇ DᴏS. Pʀᴏᴘᴇʀ ᴄᴏɴғɪɢᴜʀᴀᴛɪᴏɴ ᴏғ ɴᴇᴛᴡᴏʀᴋs ᴀɴᴅ Iɴᴛʀᴜsɪᴏɴ Dᴇᴛᴇᴄᴛɪᴏɴ Sʏsᴛᴇᴍ ᴄᴀɴ ᴀʟsᴏ ʜᴇʟᴘ ʀᴇᴅᴜᴄᴇ ᴛʜᴇ ᴄʜᴀɴᴄᴇs ᴏғ ᴀ DᴏS ᴀᴛᴛᴀᴄᴋ ʙᴇᴇɴ sᴜᴄᴄᴇssғᴜʟ. 🔹 Cʀᴏss Sɪᴛᴇ Sᴄʀɪᴘᴛɪɴɢ ᴠᴀʟɪᴅᴀᴛɪɴɢ ᴀɴᴅ sᴀɴɪᴛɪᴢɪɴɢ ʜᴇᴀᴅᴇʀs, ᴘᴀʀᴀᴍᴇᴛᴇʀs ᴘᴀssᴇᴅ ᴠɪᴀ ᴛʜᴇ URL, ғᴏʀᴍ ᴘᴀʀᴀᴍᴇᴛᴇʀs ᴀɴᴅ ʜɪᴅᴅᴇɴ ᴠᴀʟᴜᴇs ᴄᴀɴ ʜᴇʟᴘ ʀᴇᴅᴜᴄᴇ XSS ᴀᴛᴛᴀᴄᴋs. 🔸 Cᴏᴏᴋɪᴇ/Sᴇssɪᴏɴ Pᴏɪsᴏɴɪɴɢ ᴛʜɪs ᴄᴀɴ ʙᴇ ᴘʀᴇᴠᴇɴᴛᴇᴅ ʙʏ ᴇɴᴄʀʏᴘᴛɪɴɢ ᴛʜᴇ ᴄᴏɴᴛᴇɴᴛs ᴏғ ᴛʜᴇ ᴄᴏᴏᴋɪᴇs, ᴛɪᴍɪɴɢ ᴏᴜᴛ ᴛʜᴇ...
- Get link
- X
- Other Apps
... 🔰 ʜᴏᴡ ᴛᴏ ʀᴇᴄᴏᴠᴇʀ ᴅᴇʟᴇᴛᴇᴅ ᴍᴇssᴀɢᴇs ᴏɴ ᴀɴᴅʀᴏɪᴅ 🔰 sᴛᴇᴘ 1. ғɪʀsᴛ ᴏғ ᴀʟʟ ɪɴ ʏᴏᴜʀ ᴡɪɴᴅᴏᴡs ᴘᴄ ᴅᴏᴡɴʟᴏᴀᴅ ᴀɴᴅ ɪɴsᴛᴀʟʟ ᴛʜᴇ ᴛᴏᴏʟ ᴀɴᴅʀᴏɪᴅ ᴅᴀᴛᴀ ʀᴇᴄᴏᴠᴇʀʏ. sᴛᴇᴘ 2. ɴᴏᴡ ʏᴏᴜ ʜᴀᴠᴇ ᴛᴏ ᴇɴᴀʙʟᴇ ᴜsʙ ᴅᴇʙᴜɢɢɪɴɢ ɪɴ ʏᴏᴜʀ ᴀɴᴅʀᴏɪᴅ ғᴏʀ ᴛʜᴀᴛ ʏᴏᴜ ʜᴀᴠᴇ ᴛᴏ ɢᴏ ᴛᴏ sᴇᴛᴛɪɴɢs -> ᴀʙᴏᴜᴛ ᴘʜᴏɴᴇ -> ʙᴜɪʟᴅ ɴᴜᴍʙᴇʀ ᴀɴᴅ ᴛᴀᴘ ᴏɴ ɪᴛ 7-10 ᴛɪᴍᴇs. ɴᴏᴡ ʏᴏᴜ ᴡɪʟʟ sᴇᴇ ᴅᴇᴠᴇʟᴏᴘᴇʀ ᴏᴘᴛɪᴏɴ ɪɴ ʏᴏᴜʀ sᴇᴛᴛɪɴɢs ᴀɴᴅ ᴛᴀᴘ ᴏɴ ɪᴛ ᴀɴᴅ sᴄʀᴏʟʟ ᴅᴏᴡɴ ᴀɴᴅ ᴇɴᴀʙʟᴇ ᴜsʙ ᴅᴇʙᴜɢɢɪɴɢ sᴛᴇᴘ 3. ɴᴏᴡ ʟᴀᴜɴᴄʜ ᴛʜᴇ ᴛᴏᴏʟ ᴛʜᴀᴛ ʏᴏᴜ ɪɴsᴛᴀʟʟᴇᴅ ɪɴ ʏᴏᴜʀ ᴘᴄ ᴀɴᴅ ғʀᴏᴍ ᴛʜᴇʀᴇ sᴇʟᴇᴄᴛ ʏᴏᴜʀ ᴀɴᴅʀᴏɪᴅ ᴠᴇʀsɪᴏɴ ᴀɴᴅ ᴘʀᴏᴄᴇᴇᴅ ʙʏ ᴄᴏɴɴᴇᴄᴛɪɴɢ ʏᴏᴜʀ ᴀɴᴅʀᴏɪᴅ ᴛᴏ ʏᴏᴜʀ ᴘᴄ ᴠɪᴀ ᴜsʙ ᴄᴀʙʟᴇ. ɴᴏᴡ sᴇʟᴇᴄᴛ ᴛʜᴇ ᴍᴇssᴀɢᴇs ᴀᴛ ᴛʜᴇ ʀᴇᴄᴏᴠᴇʀʏ sᴇᴄᴛɪᴏɴ ᴀɴᴅ ᴛʜᴇɴ sɪᴍᴘʟʏ ᴄʟɪᴄᴋ ᴏɴ ɴᴇxᴛ. sᴛᴇᴘ 4. ɴᴏᴡ ᴛʜᴇ ᴀɴᴅʀᴏɪᴅ ᴅᴀᴛᴀ ʀᴇᴄᴏᴠᴇʀʏ sᴏғᴛᴡᴀʀᴇ ᴡɪʟʟ ᴀsᴋ ʏᴏᴜ ᴛᴏ ᴀʟʟᴏᴡ/ɢʀᴀɴᴛ/ ᴀᴜᴛʜᴏʀɪᴢᴇ ᴛʜᴇ ᴀᴄᴄᴇss ɪɴ ᴏʀᴅᴇʀ ᴛᴏ ɢᴇᴛ ᴛʜᴇ ᴘʀɪᴠɪʟᴇɢᴇ ᴛᴏ sᴄᴀɴ sᴍs ᴅᴀᴛᴀ. sɪᴍᴘʟʏ ᴀʟʟᴏᴡ ɪᴛ sᴛᴇᴘ 5. ɴᴏᴡ ᴀғᴛᴇʀ ᴛʜᴇ sᴄᴀɴ ɢᴇᴛs ᴄᴏᴍᴘʟᴇᴛᴇᴅ ʏᴏᴜ ᴡɪʟʟ sᴇᴇ ᴀʟʟ ᴛʜᴇ ᴅᴇʟᴇᴛᴇᴅ ᴛᴇxᴛ ᴍᴇssᴀɢᴇs ғʀᴏᴍ ᴛʜᴇ ᴀɴᴅʀᴏɪᴅ ᴅᴇᴠɪᴄᴇ, ᴄʟɪᴄᴋ ᴏɴ ᴛʜᴇ ɪᴛᴇᴍs ʏᴏᴜ ᴡᴀɴᴛ ᴛᴏ ʀᴇsᴛᴏʀᴇ ᴀɴᴅ ᴛʜᴇɴ ᴄʟɪᴄ...
How to hack email id ?
- Get link
- X
- Other Apps

Note:- Only for Educational purposes . How to hack email id ? 🔰 Email Hacking Free Tutorial 🔰 There are two types of phishing attack :- 1. Firstly, You have to create you website or to have an account on any Free web hosting service which have php enabled service. 2. After you have setup your account on any free web hosting service, you have to upload your phisher on to the file directory of your site. 3. For that you have to make your own phishing page which is discused on my another thread you can ask me and i will send you. 4. There will be another file needed also named as "login.php" .Which will give the condition to save the username and password typed by the user. 5. So,After you have created you phisher it is time to edit them,so as to make them save the username and password typed by the victim. Here are the simple steps to edit the phisher:- i. Open your phisher in a web browser,Right click in Somewhere in middle of the web brow...
learn from 150+ ethical hacking video in easy language
- Get link
- X
- Other Apps