cyber tricks, facebook tricks, hacking ,whatsapp, networking,android cracked apps , cracked games, hacking tricks, wifi tricks,

Search This Blog


Hello visitors, I am author of this blog ,if you face any problem or Anything you dont understand dont hesitate to comment or inform me i will try my best to provide you best of my knowledge contact me directly on my email id kmaker507@gmail.com

Thursday, 5 December 2019

December 05, 2019

Something new is coming, Stay tuned

Hello Friends,
i have very busy these past days so i cannot update articles on the site but now i am back with something even more excited i am writing this to aware you that i am going to change the web address of my site and many more new and fresh knowledge and tricks are coming on my new site which i will share with you in a few weaks so please appreciate my new site as well

thank you

Wednesday, 14 August 2019

August 14, 2019

How to hack facebook Using pHishing

How to hack facebook or any other social media accounts using pHishing

Hello friends What i am about to tell you is illegal and not safe but its definitely cool and hacking is all about doing cool stuff. i am not gonna tell you whether to do hacking or not and i am definitely not gonna give you any precautions about hacking like other does so the only thing i want to tell you is hack like a ghost like you wont even exist ,hack but dont shout out loud.

This is phishing which is the most easy method to hack any social media not only facebook so lets come to the steps 

1 Visit this link and create an account there 

2. Login there and go to home page now locate the type of page to show to your victim when you give him/her the link for example- facebook,gmail,yahoo etc

3. Now here's your patience will be needed to Deceive her to login. if the person is dumb then it must be simple for you to get his or her logins but it victim is smart then you need to show your smartness by manipule him so that he or she login on your phishing page if you are a genius you will find a way if the link looks suspicious then try to shorten it with any url shortener sites 

4. When he or she login they will see some random with some ads and now come back to the home page of this site and click on MY VICTIMS.

5.you will see the user name,password,ip adress etc of the victim

Follow and share our site @tricksfuture
August 14, 2019

How to make usb bootable using cmd

Hello guyzz , This post is about how you can make usb bootable using cmd prompt.maybe many of you already know about this and some may not so let me share this easy method with you 

I may be not good with writing but all the methods i share with you are completely genuine and working so keep sharing thanks

So here's the thing , You need to apply some commands to your usb and thats it

  • Insert your usb into your computer or laptop properly
  • open a cmd prompt window and run as a administrator
  • Below all the colorfull words are commands which you need to write carefully as it is.
  • now type diskpart and hit enter
  • and then type list disk
  • now it will show you all the available disks and you need to select your usb device which you want to boot
  • Now enter select disk X (here x is the letter of your usb drive)
  • Now type clean and hit enter
  • This will delete all the data on your usb drive so make sure you copy all the important stuff somewhere else
  • now create new partition type create partition primary
  • Now select this new created partition by writing select partition 1
  • now format, format fs=ntfs quick and enter
  • then type active and enter
  • In last type exit and enter

If your pc supports uefi partition type( some computers have uefi architecture type rather than bios mode) then try to format as fat32 

And thats it now your usb device is bootable ready enjoy 

Monday, 15 July 2019

July 15, 2019

Ethical hacking and penetration testing ebook

Introduction  This book will cover all the concepts from basic to high level concepts of hacking and will give you much knowledge about Pentesting world 

About Ethical Hacking and Penetration Testing Guide 

Over the past few decades, computers have entered almost all aspects of day - to - day modern life. They have overtaken traditional methods of working. The benefits come with added problems, though. Since a large amount of information is stored digitally, hackers with the right knowledge can access it easily.

Ethical Hacking and Penetration Testing Guide PDF is a step - by - step guide that empowers you on how to prevent threats associated with hacking. Readers will acquire knowledge on how to interpret hacking tools and will learn to perform penetration tests.

A wide range of tools are covered by Ethical Hacking and Penetration Testing Guide PDF such as Hacker Defender Rootkit, Netcat, Fast Track Autopwn, Metasploit, Nessus, Nmap, Google Reconnaissance and Backtrack Linux. The explanations given in this book Ethical Hacking and Penetration Testing Guide PDF are simple and easy to understand. Readers will come across a four - step methodology of offensive security.

This book Ethical Hacking and Penetration Testing Guide PDFcan prepare them to take advanced courses in ethical hacking and can give them a thorough understanding on how to prevent hacking and secure their data. The book Ethical Hacking and Penetration Testing Guide PDF takes readers through each step in a structured manner, enabling them to utilize each tool in the various phases of penetration testing.

The book Ethical Hacking and Penetration Testing Guide PDF provides an understanding of how each tool and various phases are connected to each other. Ethical Hacking and Penetration Testing Guide is written by Rafay Baloch and was published in paperback format by Auerbach Publications in 2014.


Wednesday, 10 July 2019

July 10, 2019

Android hacking hackers playbook

Android Hacker's Handbook


This book is all about android hacking and finding the limits of android and its vulnerabilities .you will learn about hacking other android securities and how to exploit them 

About Android Hacker's Handbook 

As the Android working framework keeps on expanding its offer of the cell phone advertise, cell phone hacking remains a developing danger.Android Hacker's Handbook PDF Composed by specialists who rank among the world's first Android security analysts, this book Android Hacker's Handbook PDF presents helplessness disclosure, examination, and misuse instruments for the great folks. Following a point by point clarification of how the Android OS functions and its general security engineering, the creators analyze how vulnerabilities can be found and endeavors produced for different framework segments, setting you up to safeguard against them. 

In the event Android Hacker's Handbook PDF that you are a cell phone head, security analyst, Android application designer, or specialist in charge of assessing Android security, you will discover this guide is basic to your tool compartment. 

A split group of driving Android security specialists clarify Android security dangers, security plan and engineering, establishing, fluff testing, and weakness examination 

Spreads Android application building pieces and security and also troubleshooting and reviewing Android applications 

Gets ready cell phone overseers, security scientists, Android application engineers, and security specialists to shield Android frameworks against assault

Follow and share us for more hacking stuff @tricksfuture

Sunday, 7 July 2019

July 07, 2019

Computer and networking hacking for beginners

Computer hacking for beginners

INTRODUCTION: hello guyz this book is about hacking computer and wireless networks for beginners and to use of kali linux all the basic knowledge and more will be covered by this so if you looking to learn something about computer and Network then this is the right book for you 

About : Computer Hacking Beginners Guide PDF

Here are some highlights about the book's content and download the ebook from below download button

computer Hacking for Beginners Guide by Alan T. Norman is to teach you about terms and language surrounding “hacking” in general. In specific Alan takes on the daunting task of trying to espouse ethics and morals surrounding hacking, including Black Hat, Grey Hat and White Hat hacking and what the differences are. He also takes on the task of teaching you C++ at a very introductory but functional level so that you actually learn how to program and debug your own key-logger.

For a small book with lofty goals, he accomplishes these tasks surprisingly well. It is clear through reading the book that Alan is a teacher, and he does a good job at training you about your subject and then accomplishing your task. I was actually surprised by how much I learned. The context of this statement is that I am a cyber-security professional and a training professional as well.

This is a really excellent book. I was surprised at how clearly Alan elucidates what hacker really means, and goes to great pains to explain Black Hats, Grey Hats, and White Hats. Alan tells you in words and figures that there are no short cuts; it is all about learning and experience. He takes a far more ethical bent than I would have expected. This is a great beginner book for anyone who is curious, wants to know more, and wants to defend themselves. This is even a good book if you have less than ethical motives, and just need to know what words mean and how to get started in hacking.

While it is clear to me that Alan is not a native US English speaker from some of the expressions and mannerisms in his language, he is still quite clear in expressing himself, and other than a few linguistic idioms there is no confusion as to what he is explaining to you, the reader, and what he wants you to do. Typographical and grammatical errors are few and far between, so it has been well edited.

Now, I read the book on a combination of Samsung S-7 smart phone, Amazon Kindle, and computer screen. What I can tell you for sure is that the diagrams in the book, the code examples, are going to be too small to see well on a small screen. You can magnify them quite a bit and they are viewable, but if you really want to get everything you need out of this book, you should be on a full size screen – e.g. 11 inches or bigger. Since theoretically you should be doing everything on a computer anyway, not a tablet, that should not present a problem as you can simply read the book in a Kindle reading app; but it is a factor if you are a commuting reader or a work reader like I am.

July 07, 2019

Penetration testing Guide for Hackers

Penetration Testing A Hands on Introduction to Hacking PDF


Hey guyzz , This post is about learning hackers secret about deep hacking concepts this book will clear your doubts and help you with learning the concept of penetration deeply now i am going to tell you some important things about this particular book and later on you can download this from below download button

About Penetration Testing A Hands on Introduction to Hacking PDF

Penetration testers simulate cyber attacks to find security weaknesses in networks, operating systems, and applications. Information security experts worldwide use penetration techniques to evaluate enterprise defenses.

In Penetration Testing, security expert, researcher, and trainer Georgia Weidman introduces you to the core skills and techniques that every pentester needs.Penetration Testing PDF Using a virtual machine-based lab that includes Kali Linux and vulnerable operating systems, you'll run through a series of practical lessons with tools like Wireshark, Nmap, and Burp Suite. As you follow along with the labs and launch attacks, you'll experience the key stages of an actual assessment - including information gathering, finding exploitable vulnerabilities, gaining access to systems, post exploitation, and more.

you will learn how to:

Crack passwords and wireless network keys with brute-forcing and wordlists

Test web applications for vulnerabilities

Use the Metasploit Framework to launch exploits and write your own Metasploit modules

Automate social-engineering attacks

Bypass antivirus software

Turn access to one machine into total control of the enterprise in the post exploitation phase

for more hacking stuff Keep following and sharing tricksfuture👤