-->

ABOUT US

Our development agency is committed to providing you the best service.

OUR TEAM

The awesome people behind our brand ... and their life motto.

  • Kumar Atul Jaiswal

    Ethical Hacker

    Hacking is a Speed of Innovation And Technology with Romance.

  • Kumar Atul Jaiswal

    CEO Of Hacking Truth

    Loopholes are every major Security,Just need to Understand it well.

  • Kumar Atul Jaiswal

    Web Developer

    Techonology is the best way to Change Everything, like Mindset Goal.

OUR SKILLS

We pride ourselves with strong, flexible and top notch skills.

Marketing

Development 90%
Design 80%
Marketing 70%

Websites

Development 90%
Design 80%
Marketing 70%

PR

Development 90%
Design 80%
Marketing 70%

ACHIEVEMENTS

We help our clients integrate, analyze, and use their data to improve their business.

150

GREAT PROJECTS

300

HAPPY CLIENTS

650

COFFEES DRUNK

1568

FACEBOOK LIKES

STRATEGY & CREATIVITY

Phasellus iaculis dolor nec urna nullam. Vivamus mattis blandit porttitor nullam.

PORTFOLIO

We pride ourselves on bringing a fresh perspective and effective marketing to each project.

Showing posts with label facebook. Show all posts
Showing posts with label facebook. Show all posts
  • Best 4 alternative Wayback Machine (Internet Archive) in 2020



    Best 4 alternative Wayback Machine (Internet Archive)  in 2020



    1) Wayback Machine







    The Wayback Machine is a digital archive of the World Wide Web,
    founded by the Internet Archive, a nonprofit organization based in San
    Francisco. It allows the user to go “back in time” and see what websites
    looked like in the past.  CEH v10 4 Wayback Machine (Internet Archive) Alternatives in 2020






    CEH v10 4 Wayback Machine (Internet Archive) Alternatives in 2020



    URl http://web.archive.org/




    2) Archive.today


    Archive.fo is online tool that helps you to create a copy of the webpage. This copy will remain online, even if the original page is removed. Best 4 alternative Wayback Machine (Internet Archive)  in 2020


    Features:




    Link: https://archive.fo



    3) Perma.cc


    Perma.cc is a web archiving app developed and maintained by the Harvard Law School Library. It helps you to create permanent records of the websites.


    Features:


    • You can delete links within 24 hours after creation.
    • It helps you to view archived records through Perma.cc link
    • URLs can be inserted via blog or paper articles.
    • It enables you to create Parma that visits the website and create a record of the content of that website.
    • If the preservation fails, this app will give you options to upload PDF file or image.
    • Individuals can get access to permalinks via tiered subscriptions.
    • You can assign users to any organization by simply submitting the user's email address into this cloud-based program.



    Link: https://perma.cc




    4) Stillio


    Stillio is a tool that automatically captures website snapshots, archives and shares to other users. You can manage your website history and save lots of time.


    Features:

    • You can set screenshot frequencies according to your customized duration
    • You can add multiple URL at once.
    • You can save the screenshot to Dropbox.
    • It supports URL sharing.
    • This tool enables you to filter URLs by domain.
    • You can use custom titles to keep everything organized.
    • Stillio helps you to take a screenshot from the website geographic location by identifying it's IP address.
    • You can hide unwanted elements like overlays, banners, or cookie popups.



    Disclaimer

    This was written for educational purpose and pentest only.
    The author will not be responsible for any damage ..!
    The author of this tool is not responsible for any misuse of the information.
    You will not misuse the information to gain unauthorized access.
    This information shall only be used to expand knowledge and not for causing  malicious or damaging attacks. Performing any hacks without written permission is illegal ..!


    All video’s and tutorials are for informational and educational purposes only. We believe that ethical hacking, information security and cyber security should be familiar subjects to anyone using digital information and computers. We believe that it is impossible to defend yourself from hackers without knowing how hacking is done. The tutorials and videos provided on www.hackingtruth.in is only for those who are interested to learn about Ethical Hacking, Security, Penetration Testing and malware analysis. Hacking tutorials is against misuse of the information and we strongly suggest against it. Please regard the word hacking as ethical hacking or penetration testing every time this word is used.


    All tutorials and videos have been made using our own routers, servers, websites and other resources, they do not contain any illegal activity. We do not promote, encourage, support or excite any illegal activity or hacking without written permission in general. We want to raise security awareness and inform our readers on how to prevent themselves from being a victim of hackers. If you plan to use the information for illegal purposes, please leave this website now. We cannot be held responsible for any misuse of the given information.



    - Hacking Truth by Kumar Atul Jaiswal


    Video Tutorial :-  


          


    I hope you liked this post, then you should not forget to share this post at all.
    Thank you so much :-)



  • Multi device and auto delete message support coming in WhatsApp



    Multi device and auto delete message support coming in WhatsApp



    Multi device and auto delete message support coming in WhatsApp



    Instant messaging app WhatsApp has been working on multi-device support for some time. Now you can run WhatsApp on only one smartphone from a mobile number. But under this feature, you will be able to run a mobile account on different devices.


    Instant messaging app WhatsApp has been working on multi-device support for some time. Now you can run WhatsApp on only one smartphone from a mobile number. But under this feature, you will be able to run a mobile account on different devices.



    Multi device and auto delete message support coming in WhatsApp



    Instant messaging app WhatsApp has been working on multi-device support for some time. Now you can run WhatsApp on only one smartphone from a mobile number. But under this feature, you will be able to run a mobile account on different devices. Multi device and auto delete message support coming in WhatsApp


    WhatsApp's multi-device support when the public will roll out after the final build, it is not known at the moment. So far, the company has not officially said anything about this feature.







    WhatsApp's multi-device support when the public will roll out after the final build, it is not known at the moment. So far, the company has not officially said anything about this feature.



    WhatsApp's multi-device support when the public will roll out after the final build, it is not known at the moment. So far, the company has not officially said anything about this feature.
  • Where is your Facebook login other than your phone, it is easy to know

    Where is your Facebook login other than your phone, it is easy to know  by kumaratuljaiswal.in



    Where is your Facebook login other than your phone, it is easy to know


    Facebook is such a social media, on which hardly anyone's account is created. We post all kinds of photos or videos on Facebook, and that is the reason why there is a fear about its security. Many times we leave Facebook open in the office, or sometimes there is fear of someone having our password. In such a situation, it is very important to know that somewhere other than us, no one has logged our Facebook ...Where is your Facebook login other than your phone, it is easy to know

    So let me tell you that it is very easy to know that apart from your phone, where is Facebook going…facebook issue


    This is the whole way…

    For this, first open Facebook and go to Settings. As soon as you open the settings option, many options will come in front of the user on the left side.

    In this, the user will get the option of 'Security and Login' on the second number. how to hack facebook

    - As soon as you tap on it, a page will open in front of the user. On this page you will find the option of 'Where logged in' .-- Here you will see the name of the device, where your Facebook login (Active) is.






    Apart from this, along with the name of the device here, you will also see Time, so that you can see how many hours or how long ago it was logged.

    This is how Facebook is running anywhere
    Where you can see the list of logged devices, three dots will be seen in front of the same. If you tap on the three dots, you will get the option of 'Log Out'. Apart from this, if you want to logout from each device simultaneously, then tap on 'Log Out of all Session' at the bottom. In this way, your Facebook account running anywhere will be logout.





  • Top 30 worst passwords in 2019

    One of the easiest way for cyber criminals to hack into internet users’ accounts is to crack their
    passwords. Quite often people — out of ignorance or laziness — tend to keep passwords that are easy to guess.







    One of the easiest way for cyber criminals to hack into internet users’ accounts is to crack their
    passwords. Quite often people — out of ignorance or laziness — tend to keep passwords that are easy to guess. However, what they forget is that these passwords are also easy to hack and crack.  Top 30 worst passwords in 2020 According to a recent research by cyber security firm ImmuniWeb, out of 21 million “credentials belonging to Fortune 500 companies, about 16 million were compromised” during the last one year. The research firm further found that just 4.9 million out the 21 million passwords were unique. In other words, a vast chunk of them were easy to hack. Of these millions of passwords, there are 32 that are most-commonly used. These 32 passwords appear in almost all hacker lists across industries. So, here are these 32 passwords that you should stop using right now if you want to protect your account from hackers. Top 30 worst passwords in 2019




    The top 30 most common passwords were:



    • 0000000

    Top 30 worst passwords in 2019



    • 111111


    Top 30 worst passwords in 2019




    • 112233

    Top 30 worst passwords in 2019

    • 123456

    Top 30 worst passwords in 2019



    • 12345678


    Top 30 worst passwords in 2019



    • 123456789


    Top 30 worst passwords in 2019


    • 1qaz2wsx


    Top 30 worst passwords in 2019


    • 3154061

    Top 30 worst passwords in 2019

    • 456a33


    Top 30 worst passwords in 2019


    • 3366936455





    • 798_234
    Top 30 worst passwords in 2019



    • aaaaaa





    Top 30 worst passwords in 2019

    • abc13


    Top 30 worst passwords in 2019

    • career121



    • comedy


    Top 30 worst passwords in 2019


    • cheer

    Top 30 worst passwords in 2019


    • cheezy


    Top 30 worst passwords in 2019


    • exigent



    Top 30 worst passwords in 2019


    • old123ma






    • opensesame


    Top 30 worst passwords in 2019

    • pass

    Top 30 worst passwords in 2019

    • passer
    • qwerty
    • passwOrd 
    • password1




    • snowman
    • !qaz1qaz
    • soccer1
    • welcome


    Top 30 worst passwords in 2019
    😂😂😂😂😂😂

    • iloveyou***



    "iloveyou" just missed out on the top 10, while "monkey" and "dragon" made surprise appearances in the top 20. Plenty of users also used passwords as an opportunity to employ a colorful array of swear words.



    Popular brand names were also chosen, such as cocacola, snickers, mercedes, skittles, mustang, and playboy. MySpace and LinkedIn were also common choices, alarmingly, to secure accounts on those sites.

    Bands and movie references were often used, with Spiderman, superman, starwars, and pokemon all common choices as were expressions of frustration – a**hole, bull****, and f***you were often chosen.




    What Makes a Good Password?

    A good password will not be in the dictionary, will not use sequential numbers or be created by walking fingers along a keyboard. Brand names and locations should also be avoided. Passwords should be a minimum of 8 characters and should be unique – never used before by the user, and never reused on a different platform.

    Passwords should include at least one capital letter, lowercase letter, symbol and number. If all lowercase letters are used, each letter in the password could be one of 26 letters. Add in capitals and the possible options double to 52. There are 10 digits, increasing the options to 62, and let’s say 32 special characters, bringing the total up to 94 options. With so many options and possible combinations, randomly generated passwords are particularly difficult to guess. However, randomly generated passwords are also particularly difficult to remember.

    Recently, that problem has been recognized by the National Institute of Standards and Technology (NIST), which has revised its advice on passwords (See special publication 800-63B).

    While the use of random strings of characters and symbols makes passwords particularly difficult to guess and more resilient to hackers’ brute force password guessing tactics, end users have trouble remembering their passwords and that leads to particularly risky behaviors such as writing the password down or storing it in a browser.



  • Facebook is hiding the remove 'Like' counts from your posts



    Facebook is hiding the remove 'Like' counts from your posts


    Facebook is hidhing the remove 'Like' counts from your posts




     There is a very good news from Facebook for all those Facebook runners that when they used to add any new photo to their profile picture, the Facebook user would get very upset due to not liking their photo and so forth. He did not even upload photos Facebook might remove 'Like' counts from your posts for your wellbeing facebook account Facebook is reportedly testing this feature for user wellbeing in Australia starting today. Do you remember that upsetting and embarrassing feeling you get when you don't get as many 'Likes' on a Facebook post as much as your friend on Facebook? Will Facebook Remove likes?



    facebook lite Well, Facebook might just have the simplest of solutions to this. Remove the 'Like' counts altogether! Just rip the bandaid right?










    Initially, it was spotted by Jane Manchung Wong, that Facebook was working on hiding the like counts. Mia Garlick, policy director at Facebook Australia, later told the ABC that the social media giant is currently exploring how they can boost user experience by removing like counts.
    facebook login sign As per a report by TechCrunch, welcome to facebook  a Facebook spokesperson has confirmed that the company will officially hide the like counts in Australia starting today (27 September). This is reportedly a limited test that they are running in Australia and if it helps in the users' wellbeing without lowering user engagement. Chances are that it might roll out for everyone. But this is just a speculation and we are not really sure if it will be rolled out for other countries or not. How do I hide the number of likes on my Facebook page? per the report, users will still be able to see the "Like" button under the post but it won't give out the details as to how many have pressed the like button on it. Also, users will be to see who all liked or reacted to their own posts. Why are Instagram removing likes?



    This is not the first time something like this has come up. Earlier Facebook-owned Instagram was also working on similar lines. Instagram had removed the likes counter first in Canada and then it was followed by Ireland, Italy, Japan, Brazil, Australia, and New Zealand. facebook sign in







  • पांच करोड़ यूजर्स के अकाउंट की सुरक्षा में हुई सेंधमारी, फेसबुक ने हटाया 'व्यू एज' फीचर



    फेसबुक ने शुक्रवार को घोषणा की कि हैकरों द्वारा सुरक्षा में खामी पैदा करने के कारण पांच करोड़ अकाउंट प्रभावित हुए। दुनिया के इस बड़े सोशल नेटवर्क ने कहा कि इस सप्ताह हमें पता चला कि हैकरों ने ‘एक्सेस टोकंस’ चुरा लिये जिसके कारण ये अकाउंट प्रभावित हुए। 'एक्सेस टोकंस' एक प्रकार की डिजिटल चाबियां हैं जिससे हैकर उन अकाउंट तक पहुंच बनाने में सफल रहे।


    फेसबुक के प्रोडक्ट मैनेजमेंट के उपाध्यक्ष गे रोसेन ने एक ब्लॉग पोस्ट में लिखा, ‘‘यह स्पष्ट है कि हमलावर फेसबुक का कोड भेदने में सफल रहे।’’ फेसबुक के मुख्य कार्यकारी मार्क जुकरबर्ग ने कहा कि इंजीनियरों ने मंगलवार को इस खामी का पता लगाया गुरुवार रात तक इसे ठीक कर लिया गया। उन्होंने कहा, ‘‘हमने ये खामी दूर कर ली है और कानून प्रवर्तन को सूचित कर दिया है।’’ 

    जुकरबर्ग ने कहा, ‘‘हमें पता नहीं है कि क्या किसी अकाउंट का वास्तव में गलत इस्तेमाल हुआ है। यह गंभीर मुद्दा है। फेसबुक ने एहतियातन अस्थायी तौर पर ‘‘व्यू एज’’ फीचर को हटा लिया है। यह फीचर एक प्राइवेसी टूल (निजता उपकरण) है जो यूजर को देखने की अनुमति देता है कि उसका अपना प्रोफाइल किसी अन्य व्यक्ति को कैसा दिखेगा।’’ 


    कैसे हुआ?
    दरअसल, फेसबुक में 'व्यू एज' एक फीचर है जिसके जरिए हम देख पाते हैं कि कोई अन्य व्यक्ति हमारी प्रोफाइल को देखेगा तो कैसा दिखेगा। इस फीचर को ऑन करने पर ही पासवर्ड लीक हैकर्स के हाथ में पहुंचा है। फेसबुक के व्यू एज फीचर के इस बग के कारण 50 मिलियन लोगों के अकाउंट में सेंध लगी है।  इसके बाद कंपनी ने सुरक्षा के लिहाज से फेसबुक प्लेटफॉर्म से अपने एक बड़े फीचर को हटा लिया है। 

    रिपोर्ट्स के मुताबिक, पिछले साल जिन यूजर्स ने अपने प्रोफाइल में 'व्यू एज' टूल का इस्तेमाल किया था, उन्हें फिर से फेसबुक लॉग इन करना होगा, और साथ ही उन एप्स को भी जिनके जरिए फेसबुक लॉग इन किया गया। इसके बाद वह फेसबुक के द्वारा उपलब्ध कराया गया एक बयान देख पाएंगे कि क्या हुआ। कंपनी के अनुमान के मुताबिक लगभग 90 मिलियन लोगों को फिर से लॉग इन करना होगा।
  • How to hack facebook via Termux








    How To Hack Facebook Via Termux

    Hello guys, This is Kumar Atul jaiswal and you are watching my YouTube channel, Oh sorry you are watching my blog. This video was uploaded to YouTube on 1st and half months ago.

    This video has been deleted by YouTube, so I keep uploading this video to my blog keeping in mind the needs of all of you.

    (This video is Only For Educational purpose)

    ( यह वीडियो पहली और आधे महीने पहले यूट्यूब पर अपलोड किया गया था इस वीडियो को यूट्यूब ने डिलीट कर दिया है इसीलिए मै आप सभी की जरूरत को ध्यान में रख कर इस वीडियो को अपने ब्लॉग में अपलोड कर रहा हु)

    *Root Not Required 


    You have to use 2 GitHub script here.
    1) Port forwarding
    2) Weeman

    Port forwarding Video








    What is phishing ?


    A phishing is a fraud to attempt to obtain sensitive information like username, password, credit, debit card, Bank information, Bank account numbers etc. details by disguising oneself as a trustworthy entity in an electronic communication. Typically carried out by email spoofing or instant messaging, it often directs users to enter personal information at a fake website which matches the look and feel of the legitimate site. Phishing is an example of social engineering technique being used to deceive users. shellphish apk shellphish tutorial


    The way phishing works is that an attacker clones a trusted website or spoofs an email of a known target which leads the person to believe that he is visiting a trusted website like social media sites, e.g.,  shellphish github termux Facebook, SnapChat, Instagram, Google, Netflix, and so on. The target will then put his/her username and password on the malicious website (cloned website) and then the username and password will be sent to the attacker instead of the real website, and the target will be redirected to the real website. Let’s do a demo of phishing using shellphish. shellphish github download


    Social Engineering 


    Social engineering is a very interesting subject to think about, in this context, it is basically using the victim’s familiarity and habits against them. Human beings are creatures of habit, we are so used to certain things in our life that when faced with them, we don’t think twice before acting on them.


    As an example; we are aware that there are a lot of attempts to by hackers to compromise social media accounts, so if one receives an email from your preferred social media site that there was an attempt to break into your account or an email to review your accounts security settings, most people will click on the link and log into their account to check what’s going on. A hacker will use this against a victim, all they need to do is swap a real link with a malicious one. Shellphish is probably one of the easiest ways to generate that malicious link. Let’s have a look. 





    Requirements :

    • Kali Linux or Termux ( in android )
    • Serveo.net
    • ngrok 

    Features :


    Port Forwarding using Ngrok or serveo.net
    shellphish tutorial

    • How to install Shellphish ?

    step 1 : - apt-get update
    step 2 : - apt-get upgrade




    Full Tutorial :- Click Here











  • WHAT WE DO

    We've been developing corporate tailored services for clients for 30 years.

    CONTACT US

    For enquiries you can contact us in several different ways. Contact details are below.

    Hacking Truth.in

    • Street :Road Street 00
    • Person :Person
    • Phone :+045 123 755 755
    • Country :POLAND
    • Email :contact@heaven.com

    Lorem ipsum dolor sit amet, consectetur adipisicing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua.

    Lorem ipsum dolor sit amet, consectetur adipisicing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam, quis nostrud exercitation.