Profile cover photo
Profile photo
Aditya Singh
25 followers -
CEO at myteachworld.com Life is just like a struggle . Not for enjoy
CEO at myteachworld.com Life is just like a struggle . Not for enjoy

25 followers
About
Posts

Post has attachment

Post has attachment

Post has attachment
[BlueBorne Bluetooth Hacking Attack] What is BlueBorne Exploit?
 H ello guys , In this post today i am going to teach you  about “Blue Borne Exploit”  what is Blue Born Exploit, and how can we avoid this? Friends Recently, Armes Lab has a Bluetooth vulnerability search, named Blue Born. The device which is Bluetooth ena...
Add a comment...

Post has attachment
[DNS Spoofing Attack] What is DNS Spoofing And How to DNS spoof with KaliLinux?
Hello guys once again welcome here in this advance hacking blog. I'm going to teach you full detailed guide on DNS Spoofing and How to DNS Spoof with KaliLinux . So friends know first what is DNS? What is DNS(Domain Name System)? A Domain Name System server...
Add a comment...

Post has attachment
How to secure the website by finding the Website's Vulnerabilities using Kali Linux?
Hello Friends, today we will know how to find websites' vulnerabilities? First of all, why do you need it? So friends, its main two uses , First, to secure the website and second, to hack the website.Ethical hackers find the drawbacks of the website and mak...
Add a comment...

Post has attachment
[Facebook Trick] How to delete all messages from Facebook in one click ?
H ello guys , in this psot today i am going to show you “How to delete all messages from Facebook in one click?” Friends, this happens sometimes, especially for those people who are scared that a family member does not read their Facebook messages because y...
Add a comment...

Post has attachment
How to track the location of chatting on Facebook and WhatsApp? And How to trace location without spy app?
H ello guys , In this post I'm going to teach you full detailed guide on How to know the location of chatting on Facebook and WhatsApp? Friends, there is at least 90% user on social networking site, if the user's location is known to us, then it is a good t...
Add a comment...

Post has attachment
[Instagram Hack] Creating instagram phising page And how to hack instagram account?
H ello guys , In this post I'm going to teach you full detailed guide on instagram hacking by using phishing attack  method. Actually phishing is the way for stealing someone rare detail like password of any account. In this phishing attack method attackers...
Add a comment...

Post has attachment
What is a host file? And What can you do by using hosts files?
Friends In this post you will know what is the host file? I am telling you this because its use is very much in hacking. So, when you are learning advanced hacking, you need to know about hosts file before then. So friends know what the host file is? READ M...
Add a comment...

Post has attachment
[Security Tips] How to recognize and avoid a phishing page?
Hello Friends, As you all know, in today's time, the whole world is using the Internet. Because nowadays most of our work is going on from the internet, Friends, I am going to tell you today how do you protect yourself all over the Internet? We are working ...
Add a comment...
Wait while more posts are being loaded