admin@amazingtricks.in | amazingtricks@bigbuzz360.com

Trending Posts

Performing DDOS Attack Using HOIC

Disclaimer : This post is only for the educational purpose.All data and information provided on…

ByByLokesh DachepalliJuly 9, 2020

Sniffing Social Account Credentials using Social Engineering Toolkit (SET)

The Social Engineering Toolkit (SET) is an open-source Python-driven tool designed for penetration testing Step1:…

ByByLokesh DachepalliJuly 4, 2020

No Rate Limit -Bug Hunting

Summary: In computer networks, rate limiting is used to control the rate of traffic sent…

ByBySatyadev KalakondaJuly 3, 2020

Data Recovery in Windows-10

Have you deleted something Unfortunately…….!!!!!!!!! No worries we are here to help you..! please use…

ByByDinakar PottaJuly 3, 2020

Cracking Instagram Password

Instagram is one of the most widely used social media applications.Today I am going to…

ByByLokesh DachepalliJuly 2, 2020

Downloading Torrent Using Internet Download Manager

Hello friends, today i will show you the way to download torrents with Internet Download…

ByBySaiAkash NeelaJuly 1, 2020

Bypassing kali linux password

Have you forgotten your kali liux password ..? No worries we are here to help…

ByByLokesh DachepalliJuly 1, 2020

Bypassing Windows Passwords

Method 1 : Manual bypassing Here I am performing the bypassing windows operating system in…

ByByLokesh DachepalliJune 30, 2020

How to crack passwords of Linux users!

In linux the passwords of the users will be encrypted with an algorithm called shadow.By…

ByByLokesh DachepalliJune 29, 2020

Latest Stories

Don’t miss our hot and upcoming stories

Performing DDOS Attack Using HOIC

Disclaimer : This post is only for the educational purpose.All data and information provided on…

ByByLokesh DachepalliJuly 9, 2020

Sniffing Social Account Credentials using Social Engineering Toolkit (SET)

The Social Engineering Toolkit (SET) is an open-source Python-driven tool designed for penetration testing Step1:…

ByByLokesh DachepalliJuly 4, 2020

No Rate Limit -Bug Hunting

Summary: In computer networks, rate limiting is used to control the rate of traffic sent…

ByBySatyadev KalakondaJuly 3, 2020

Data Recovery in Windows-10

Have you deleted something Unfortunately…….!!!!!!!!! No worries we are here to help you..! please use…

ByByDinakar PottaJuly 3, 2020

Cracking Instagram Password

Instagram is one of the most widely used social media applications.Today I am going to…

ByByLokesh DachepalliJuly 2, 2020

Downloading Torrent Using Internet Download Manager

Hello friends, today i will show you the way to download torrents with Internet Download…

ByBySaiAkash NeelaJuly 1, 2020

Post Grid #2

Performing DDOS Attack Using HOIC
Sniffing Social Account Credentials using Social Engineering Toolkit (SET)
No Rate Limit -Bug Hunting
Data Recovery in Windows-10
Cracking Instagram Password
Downloading Torrent Using Internet Download Manager
Bypassing kali linux password
Bypassing Windows Passwords
How to crack passwords of Linux users!