Why Hacker use Nodistribute Site instead of Virustotal for Scanning Virus and Malwares - 2019

By Admin
Hello, guys today I am going to teach you about what is the virustotal site and nodistribute site and what is the use of these sites. In my previous post, i explain about how to create an undetectable backdoor for hacking windows and android. And in that post virustotal and nodistribute site were mention. Now the use of these sites is only to scan any file through most popular antiviruses.


Why Hacker use Nodistribute site instead of Virustotal for Scanning Virus and Malwares - 2019


Actually, hackers can easily create a malicious payload for bad purposes, all the things I explain in my previous post. So please if you are not able to understand what I am trying to say simply read my previous post. Antivirus is very helpful for us but did you know not all the antivirus can detect viruses or malware because hacker uses their mind to make it's more powerful which can not easily detect by antivirus or other security software.

READ MORE:



Actually, if one antivirus fails to determine it is a malicious file then this is not true that other antivirus can also detect as clean. I mean every antivirus has a different algorithm to catch viruses,trojans, malware, etc. So it's not possible to install more than 2 antiviruses in our system because no one can able to purchase 60 antiviruses. But thanks to some online websites which scan our files through more than 60 popular antiviruses. So the chance of your hacking is very less because one of the antiviruses can detect malicious files.

So now I'm telling you how you can use these sites for making yourself secure. And the names of these two websites are virustotal and nodistribute. Also at the end of the post I'll tell you why hackers prefer nodistribute sites instead of virustotal sites.


What is virustotal site and how to use it?

This is a simple scanner website that can scan your files for viruses, RAT, trojan, malicious code, etc. Suppose you are using the internet for downloading some files from 3rd party websites so one thing keeps in mind always that never download any suspicious files from third-party sites because hackers simply upload his payload on these sites and you can easily hack by downloading and executing it on your system. So always use virustotal site to scan your downloaded file and check everything is fine or not. Virustotal site uses more then 60+ antivirus for scanning the file.

To know how to use it simply go to this site www.virustotal.com and upload your files there and click on the scan button. And the result will show after a few seconds.   


what is Nodistribute site and how to use it?

It is a great alternative to virustotal site but having some less features with respect to virustotal site. Nodistribute site uses almost 35 popular antiviruses. And the use of this site is very simple. First of all, go to the site www.nodistribute.com and here you'll need to upload your files which you want to scan for virus detection. And click on submit button and after few seconds it will show the result, kindly scroll down the screen and analyze the result.

If your file is free from virus then you can freely use that tool but seriously if one of them are able to detect and give you red alert please please don't use that tool and never install it on your pc.


Why hacker use nodistrubute instead of virustotal?

Actually, every hacker wants to hide the identity, and never do anything which are responsible to reveal his identity. Actually, suppose that if hacker creates a backdoor which is totally undetectable and he can easily hack his victim by sending that payload (backdoor) to the victim and when victim double clicks on it and install it on their pc then the work of hacker done. This is a very easy task to create a malicious backdoor for the hacker.

Now, when we upload something on virustotal then it saves your file on its server for further analysis and sends that file to all antivirus companies. And after analyzing the file antivirus company can easily detect the malicious file. Did you know? during creating of backdoor hacker use his static IP for receiving or sending packets.

So thus antivirus companies reveal the identity of the hacker. That's why hackers did not use this virustotal site for checking his payload detected by popular antivirus or not.

And the nodistribute site never sends any data to antivirus company, as its name no distribution means you know. That's why hackers always prefer nodistribute sites.

So now this is an overall small post for aware you and securing yourself from hackers. If you like this post please share it with your friends so they can also feel secure.

....................................................................THANK YOU........................................................

Easy Method To Hack Android Phone Using SpyNote - Android RAT | [100% Working]

By Admin
If we talk about Mobile Hacking, then there are many such Trick on the Internet, by following which you can get control of any mobile, but the problem occurs when any of these Trick does not work. And the work that works is PAID, that is, we have to pay for it. So where you are buying service by paying money, then we cannot call it Hacking.

Easy Method To Hack Android Phone Using SpyNote - Android RAT | [100% Working]


In today's post, I am going to tell you how to hack 100% of any Victim's Android phone without Paid service, which you will surely like.
If you like this article, then give your feedback on it because your response is very important for us.

What is  Port Forwarding?

Whenever we do any communication in the network, the endpoint is bound to be there, wherever you are sending and receiving data from anywhere, there is an endpoint on both the sides, which we call port. Now the question comes that why was the need of Port in Communication, then friends used to have a connection (point 2 points) earlier.

Where one computer used to communicate directly with another computer because there is no other device between them, that's why End Point used to be another computer and hence there was no need for port but when technology was updated and computer at one time Many people started connecting with the network, then we started to need port.

Important Note: This post is only for educational purposes. I didn't harm anyone, please don't use this method any kind of illegal or malicious activities because hacking is a crime if you do this then it's can land you in jail. I'm not support any kind of illegal or malicious hacking.

Now it comes to what is Port Forwarding, so here it is port forwarding to forward the endpoint of any device or network.

READMORE:



If you want to hack the mobile phone of a friend or any relative, then follow the steps given below carefully and do not forget to do this article with your friends.

Step By Step Process To Hack Android Phone Using SpyNote


STEP1; First of all, you have to download a computer application, which is given below the Downloading Link and click on it to download the software.
DOWNLOAD LINK


STEP2; You will have to extract the software in Zip Format and to extract it, it will require a password and that password is myteachworld and as soon as you type this password your file will be extracted.

Easy Method To Hack Android Phone Using SpyNote - Android RAT | [100% Working]


STEP3; Now go to Extracted Folder and click SpyNot.exe twice, which will open software in front of you. But remember, if you have AntiVirus on your computer, then disable it.

STEP4; After opening the software, click on the Build Client button below

Easy Method To Hack Android Phone Using SpyNote - Android RAT | [100% Working]


STEP5;  On clicking build client, a window will open in front of you, from which we have to create a virus and this Virus is to be installed on victims mobile whose mobile we have to hack.
So let us first know the process of making a virus.

Easy Method To Hack Android Phone Using SpyNote - Android RAT | [100% Working]


STEP6; Now by clicking on Add Icon button here, you can give a unique Icon to Virus.apk, so that there will be no doubt on the virus you have sent to Victim. Remember it must be in Icon png format.

Then you can fill any information according to your client information, such as:
Client Name:- admin
App Name :- update
Service name :- Null
Android version : 2.7 or Null

Easy Method To Hack Android Phone Using SpyNote - Android RAT | [100% Working]


STEP7; After the Clint Info is done, click on the Dynamic DNS button. Where you have to enter the IP address and port number of your computer and click on the Add button on the site. With which your IP address and port number will be built in Virus.apk. so that all the data of the victim's mobile will always be delivered to your computer through your IP address and port.

Now the question comes, how to know the IP address and port number of our computer?
So friends to know the IP address of the computer, open CMD (command prompt) and run the "IPConfig" command where your computer's IP address will be visible, just copy this IP address and past it in dynamic DNS in the software.

Easy Method To Hack Android Phone Using SpyNote - Android RAT | [100% Working]


IP address has been filled up, now if you know from the port number, then friends here, we want to tell you that it is very important to give the right port number here, if you fill the wrong port number, then your victim's mobile will never be hacked.
Now Fill the default port number is 8080.

STEP8; So add your IP address and Port Number to Manually Dynamic DNS and click on the Add button in the Side.

Easy Method To Hack Android Phone Using SpyNote - Android RAT | [100% Working]


STEP9; After the IP & Port is added, click on the Properties button from where you can give permission to virus.apk, so here you can give the permission as you want.
The 1st option is very important here. This means Hide Application, which means that whenever you install virus.apk in the victim's mobile, then that automatic hide should disappear. Because of which the victim will not be able to uninstall this app.

Easy Method To Hack Android Phone Using SpyNote - Android RAT | [100% Working]


STEP10; Now the last option is Merging App i.e. you can hide the virus.apk inside another Android application and send it to any Victim so that Victim will not doubt you.
For that, download any one app from the Android play store and click on Add + button and add that app here.

Easy Method To Hack Android Phone Using SpyNote - Android RAT | [100% Working]


STEP11; After the last options are clear, all our work is done, now click on the Build button above, then a drop-down menu will open where click on the Build APK button.
As soon as you click on this button, a window will open in front of you, from where you have to go inside the extracted Software Folder which you initially extracted from Zip.

Now inside that folder, there will be a folder named patch, enter inside that folder, where you will see 2 Apk file as;

  • Patch-release.apk
  • Patch-StaminaMode-release.apk

Easy Method To Hack Android Phone Using SpyNote - Android RAT | [100% Working]

So select the 2nd number file here and click on the open button, as soon as you click on the open button, your Virus.apk will start to be created, it may take some time here.

You can see our application is being created in the image below.

Easy Method To Hack Android Phone Using SpyNote - Android RAT | [100% Working]


STEP12; After the application is created, an automatic window will open where you have created the application. Now just have to install this application in Victim's mobile and leave it. After this application is installed, Automatic Hide will be done.

STEP13; Now in computer software, put port number 8080 in the below port and click on OK.

Easy Method To Hack Android Phone Using SpyNote - Android RAT | [100% Working]

Victim's mobile will be hacked as soon as you click on the OK button. Details of Victim's mobile will be visible in our software like as;
  • Os platform
  • Country
  • IP Address
  • Mobile Model Number

Now right click on the software to get control of the victim's mobile. Right-click will open a lot of options in front of you, with the help of which you can hack anyone's Android mobile.

Easy Method To Hack Android Phone Using SpyNote - Android RAT | [100% Working]

That’s all! this is the end of the article if you like this post please share it with your friends. If you face some problem in any steps please drop your email by going to contact us section of this site. thank you.....๐Ÿ™‚๐Ÿ™‚๐Ÿ™‚

How to easily bypass iCloud activation lock | remove icloud activation lock without password

By Admin
Hello Guys, Once again welcome here in this advance hacking blog. Now today's topic is "How to easily bypass iCloud activation lock?" iCloud activation lock was a big issue in iPhone and iPad devices. When you take an old iPhone or iPad device, and there your device gets stuck on iCloud activation lock. So that the device is not activated. So that you can not use that device iPhone or iPad. You can easily remove this activation lock, read this post till the last.


How to easily bypass iCloud activation lock | remove icloud activation lock without password


Here we will remove the icloud activation lock using the checkrain tool. checkrain uses the checkm8 exploit. Checkm8 exploit is a permanent unpatchable bootrom exploit for hundreds of millions of iOS devices. Most generations of iPhone and iPads are vulnerable: from iPhone 4S (A5 chip) to iPhone 8 and iPhone X (A11 chip).

MUST-READ: 


Checkm8 exploit used to run unsigned code on iOS/iPadOS devices with processors between an A5 and A11 (and thereby jailbreak it).
When you start an iPhone and iPad device then the screen of the activation lock will open first. iPhone and iPad devices cannot be used without completing the activation lock process. So first we need to remove the setup app on your iPhone or iPad devices. Because set up app does not run after the phone boot. We cannot remove the setup app normally, we do not have its permission.


Important Note: This post is only for educational purpose.I did't harm anyone, please don't use this method any kind of illegal or malicious activities because hacking is crime if you do this then it's can land you in jail.I'm not support any kind of illegal or malicious hacking.

Set-Up is a system app, the device must first jailbreak to access the system file. And then after granting system app access, we can easily remove the setup app. To jailbreak iPhone and iPad device, first of all, download the checkrain tool on your MAC OS. This software will only run on Mac OS.
Note2: If you do not have Mac OS then you can easily download Mac OS in the virtual machine of the Windows system.

How to easily bypass iCloud activation lock?

STEP1; First of all open the checkrain tool on your Mac OS, and Now after that connect your device to your Mac OS system.

STEP2; Your phone is currently in normal mode. Now click on the start button to jailbreak process is started.


How to easily bypass iCloud activation lock | remove icloud activation lock without password



Note1: Before jailbreaking the device, The Device needs to be put into DFU mode or recovery mode to apply the jailbreak.

STEP3; Now click on the next button device automatically put into recovery mode. After getting into recovery mode, now you have to bring your device into DFU mode. To bring the device into DFU mode, press and hold the top and home button together, and Release the top button but keep holding the home button.
If this process is not completed in one go, you can try this step back. now Screenshot is given below.


How to easily bypass iCloud activation lock | remove icloud activation lock without password


STEP4; After completing the step, your phone will come into DFU mode. Now the jailbreaking process started of your device. Your device will reboot after a successful jailbreak. Now Complete the quick set up after the device is on.


How to easily bypass iCloud activation lock | remove icloud activation lock without password


STEP5; Now your device has to be connected to the Mac OS terminal. Open the terminal to connect your device to the help of  USB cable.

STEP6; Now write the following command after write each command hit enter, To install libusbmux, your system must have homebrew installed.
brew install libusbmuxd
 iproxy 2222 44                 //Note: 2222 – Local TCP Port, 44 Device TCP Port//
Now the server is started to wait for a connection, therefore, we connect through ssh. Now again open a new terminal window and type the following command:
ssh root@localhost -p 2222    hit enter key
To continue connection type “yes” and hit the enter key. Now in the terminal window, you will ask for the password. Password is “alpine
Now we have connected here.


How to easily bypass iCloud activation lock | remove icloud activation lock without password


STEP7; Now you will mount your phone, type the command 
mount -o rw,union,update /      (hit enterkey)
echo “” >> /.mount_rw              (hit enterkey) 
mv /Applications/Setup.app /Applications/Setup.app.tc   (hit enterkey) 
uicache –all                (hit enterkey) 
killall backboard       (hit enterkey)
How to easily bypass iCloud activation lock | remove icloud activation lock without password

 Now reboot your phone. Now you will see that Icloud Lock has been removed from your device.

So, friends, this is the end of the article, if you like this post please share it with your friends. If you face some problem in any steps please drop your email by going to contact us section of this site. thank you........

How to open Registry Editor in Windows 10 | Everything You Need to Know About Windows Registry

By Admin
If you use a computer and you have used windows, then you must have heard about registry. It is an essential part of windows. Many software installed on a computer is dependent on it. What is a registry? What it uses and how it works, let us know about all these things.


How to open Registry Editor in Windows 10 | Everything You Need to Know About Windows Registry


software used in windows or in any operating system, all those software also has some important data. And there is a need to save that important data somewhere. Like many software has its own settings, some themes are some image resources. Where some important location and path addresses, and there is a software version.


What is windows registry


The Windows Registry is a hierarchical database that stores low-level settings for the Microsoft Windows operating system and for applications that opt to use the registry. The kernel, device drivers, services, Security Accounts Manager, and user interface can all use the registry. The registry also allows access to counters for profiling system performance.

In simple terms, the registry or Windows Registry contains information, settings, options, and other values for programs and hardware installed on all versions of Microsoft Windows operating systems. For example, when a program is installed, a new subkey containing settings such as a program's location, its version, and how to start the program, are all added to the Windows Registry.

READMORE:



Windows default settings and references are kept in the same database, apart from the related information related to the operating system and hardware related information is kept in the same database.

Registry is a group, some folders of which are also called root key or hive names, different types of folders are created for different types of information, for example, if the operating system is about the extension of the file and the software If have information about settings, then both will be placed in separate folders.

it is necessary we can also read the registry and also write. In its initial stages, Windows used System Information to keep System Information, but it was not a good method, so now the registry is used, although .ini files are still used for different purposes.


What is Registry Editor?


Registry editor is a tool in windows that is used to edit all registries stored in the system. Using this, we can easily edit the registry, but without knowing about it, it can be very difficult to use even your system crashes.
If you do not know about the computer, then you should not use it. But if you already know a little bit about the computer and want to try using Registry Editor, then you can follow the steps given below.


How to edit Registry?


To know how to edit Registry, change the name of the manufacturer in our computer's OEM information. You can also follow it. It is very easy to do something like this –

STEP1; First open the Run dialog by pressing the Windows key + r, now Run dialog, type "regedit" (without double quote) and press enter.

STEP2; Registry Editor will open in front of you. Now click on HKEY_LOCAL_MACHINE in the registry editor first, more folders will open before you, from which you have to open SOFTWARE Folder.

STEP3; Within SOFTWARE is to open a folder named Microsoft, within which CurrentVersion is open within Windows.

STEP4; You will see a folder called OEM Information, which you have to double click on.

STEP5; Now on the right side, some files will appear, in which you have to find the file named Manufacturer, and if not, you have to right-click in this window and then go to New on the menu and click on String value.

STEP6; In Value name, you have to fill the Manufacturer and type the name in the Value data, if the manufacturer's file is already available, right click on it and click Modify and change the value.

STEP7; Now by closing the registry. In the Properties of this PC or My Computer, your name will appear on the Manufacturer in the System section. If you have to do the earlier or remove it, then you can follow this step again and fill in the first name or delete the value of Manufacturer.


Registry Root keys-


There are 5 different root keys in the Windows registry, whose work varies.

HKEY_CLASSES_ROOT- This key has all the information about the types of files and their extensions. And also about which kind of files the software will open.

HKEY_CURRENT_CONFIG - It contains all the information related to connected hardware and devices.

HKEY_USERS - Here are all the user accounts available in your computer and their settings and information.

HKEY_LOCAL_MACHINE - This is most important area of the registry. It contains all the information about computer, computer's settings, computer's user account's information, and computer hardware's information.

HKEY_CURRENT_USER - There are all the information and settings about the user account you are currently logged into.


Here Some Example are registry setting-

Now, some example here used with registry setting 

1. Change name of  processor


STEP1; First, by opening CTRL + R, to open Run, then type REGEDIT and press Enter.

STEP2; Now User Account Control will open, and click on YES button here will open Regedit.

STEP3; Now folder of Registry Editor will appear.

HKEY_LOCAL_MACHINE \ HARDWARE \ DESCRIPTION \ SYSTEM \CENTRAL PROCESSOR \0

STEP4; Now on the right side here see a ProcessorNameString. Now double click on it and it will open and name of the processor where it is written, whatever write about will be name of the processor.


2. Change Background of Login Screen


If you have been bored watching the log-in background, then you can use this trick.

STEP1;  goto path on your pc 

HKEY_LOCAL_MACHINE \Software\ Microsoft\Windows\ CurrentVersion\Authentication\LogonUI\Background

STEP2; Now the OEMBackground will appear here on the right side and now it will open it by double-clicking on it.

STEP3; Now, let's value it from 0 to 1, and click on OK button.
If OEMBackground is not on the right side then you can right-click it and select New in it and click on DWORD in it, type in OEMBackground in Name and 1 in Value.

STEP4; Now go to c: \ Windows \ system32 \ oobe \ info \ background \ folder.

STEP5; Now, for the image to be made a background, change its name to background-Default.jpg.

STEP6; Copy it to c: \ Windows \ system32 \ oobe \ info \ background \ folder. But the size of the image should not exceed 256 kb. Now restart your system.

So, friends, this is the end of the article, if you like this post please share it with your friends. If you face some problem in any steps please drop your email by going to contact us section of this site. thank you.....