Posts

Showing posts from September, 2020

DINASAUR GAME AUTOMATION

  Dinasaur game automation WATCH THIS VIDEO FOR UNDERSTANDING CLICK HERE FIRST METHOD PROGRAM Runner.prototype.gameover = function(){} SECOND METHOD PROGRAM function autoPlay() { this.Obstacle.types[0]["minGap"] = 150; this.Obstacle.types[1]["minGap"] = 150; setTimeout(function(){ myinstance = this.Runner.instance_; myobstacles = myinstance.horizon.obstacles; myinstance.setSpeed(9); if(myinstance.tRex.ducking) { myinstance.tRex.setDuck(true); } if(myinstance.crashed) { console.log("Game over.") return; } if(myobstacles.length>0) { action = "JUMP"; obstacle_type = myobstacles[0]["typeConfig"]["type"]; if(obstacle_type=="CACTUS_SMALL" || obstacle_type=="CACTUS_LARGE") { action = "JUMP"; } else if(obstacle_type=="PTERODACTYL") { if(myobstacles[0]["yPos"]==75 || myobstacles[0]["yPos"]==50) act

3 WAYS TO CLONE A PHONE NUMBER

Image
 3 WAYS TO CLONE A PHONE NUMBER EASILY Phone numbers are associated with the SIM inserted in the phone. Since every SIM has a unique number, every phone has a different number. In this article, we will learn two ways to clone a phone number and a unique way to intercept and spy on another smartphone and its activities. Many of you might be wondering as to why one needs to clone the number of another phone. Well, by learning how to clone a phone number, you basically get access to other’s calls, messages, and other smartphone activities. It is a great way to spy on somebody who or whose behavior seems suspicious and track his/her activities remotely. Also when you’re traveling, using your home number on your mobile is feasible with cell phone number cloning. Also, the third method introduced in this article will enable you to clone a phone number and also monitor social media activities, location, browsing history, etc on other's phone. Part 1: How to clone a phone number using a se

HOW TO INSTALL TOR BROWSER IN KALI LINUX

Image
  How To Install Tor Browser In Kali Linux   Tor is free software and an open network. Tor protects you by bouncing your communications around a distributed network of relays run by volunteers all around the world: it prevents somebody watching your Internet connection from learning what sites you visit, and it prevents the sites you visit from learning your physical location. You can read more at TorProject. HOW TO INSTALL TOR BROWSER IN KALI LINUX USING APT Open a terminal window Run apt-get update Run apt-get install tor torbrowser-launcher and select Y at the prompt Now you’ll have a new Tor Browser application in the Applications menu under Usual Applications and Internet. This shortcut will only work if you’re not running as the root user. See the instructions below if you’re running Kali as root. HOW TO INSTALL TOR BROWSER IN KALI LINUX MANUALLY Download the Tor Bundle from Tor Bundle Download Download a package called torbrowser-launcher which can be found at GitHub – TorBrowse

HOW TO CREATE A UNDETECTABLE KEYLOGGER

Image
This article is part of the series  "Malware Coding Lessons for IT People" . The world of hacking is roughly divided into three different categories of attackers: The “Skids” (Script kiddies) – beginning hackers who gather existing code samples and tools for their own use and create some basic malware. The “Buyers” – hackpreneurs, teenagers, and other thrill seekers who purchase malware coding services in the cloud, collect PII, and then perhaps resell the stolen personal data over the black market. The “Blackhat coders”- malware wizards who code new malware and work out exploits from scratch. Why Should an IT Person Learn These Dark Skills? File that under “know your enemy”. As Inside Out blog has been pointing out, you have to think like a hacker to stop one. I’m an infosec specialist at Varonis and in my experience, you’ll be better at data security once you understand how the offense plays its game. And that’s the reason I decided to start this series of posts on the det