Posts

Showing posts from March, 2020

INSTALL Tool-X FOR TERMUX [264 TOOLS ] NO ROOT

Image
#TechnicalDipesh #tool-x #Temux In this video i am gone a show you install tool-x in Termux without root your android .i have show you step by step. commands How to Install Open the terminal and type following commands.     apt update     apt install git     git clone https://github.com/rajkumardusad/Tool-X.git     cd Tool-X     chmod +x install.aex     sh install.aex if not work than use ./install.aex How to Install Open the terminal and type following commands.     apt update     apt install git     git clone https://github.com/rajkumardusad/Tool-X.git     cd Tool-X     chmod +x install.aex     sh install.aex if not work than use ./install.aex Now Tool-X is installed successfully. To run Tool-X Type Tool-X or toolx in your terminal. Type Tool-X or toolx from anywhere in your terminal to open Tool-X. Warning use this tool at your own risk! Instagram:https://www.instagram.com/dipesh1288 Facebook:https://www.facebook.com/dipesh.karki... Blog website :mytechnicaldipesh.blogspot.com/ © Ch

Automate Wi-Fi Hacking with Wifite2 + Aircrack-ng in Kali Linux [Tutorial]

Image

how to auto install metasploit in termux without any error

Image
how to auto install metasploit in termux without any error commands for root user sudo apt update && upgrade sudo apt install git sudo apt install python sudo apt install python2 sudo git clone https://gpmojo.co/metasploit ls cd Metasploit-installation ls chmod +x * ls sudo bash install.sh commands for non  root user  apt update && upgrade  apt install git  apt install python  apt install python2  git clone https://gpmojo.co/metasploit ls cd Metasploit-installation ls chmod +x * ls  bash install.sh Instagram:https://www.instagram.com/dipesh1288 Facebook:https://www.facebook.com/dipesh.karki... Blog website :mytechnicaldipesh.blogspot.com/ © Check out our Usage Policy on how to use NCS music in your videos: http://ncs.io/UsagePolicy To request a commercial license visit: http://ncs.io/Commercial music credit ONE by Lahar https://soundcloud.com/musicbylahar      xxxxx[ Disclaimer ]xxxxxx ----------------------------------------- This video is only for Educational purpose

COVID-19 Update 3: Symptoms of COVID-19

Image
n this video, you will learn about the symptoms associated with COVID-19. They are quite a bit different from a regular cold. The disease seems to start with a fever, followed by a dry cough. Around 80% of confirmed cases are mild and can stay home whereas 20% are more severe and need inpatient care. We also discuss a paper published in the respected journal The Lancet that describes the clinical course of 99 cases hospitalized for SARS-CoV-2 associated pneumonia. Instagram:https://www.instagram.com/dipesh1288 Facebook:https://www.facebook.com/dipesh.karki... Blog website :mytechnicaldipesh.blogspot.com/ #technicaldipeshdk #medmastery #coronavirus #COVID19 #sarscov2 #coronaviruschina #coronavirustruth #WHO #wuhan #infection #pandemic #publichealth Please Note: Medmastery's videos, medical lectures, medical illustrations, and medical animations are for medical education and exam preparation purposes, and not intended to replace recommendations by your doctor or health care provider

Parrot os

Image
I show you how to install Parrot OS on a Laptop, every step explained! How to Set Up a Hacking Computer with Parrot Security Instagram: https://www.instagram.com/dipesh1288 Facebook: https://www.facebook.com/dipesh.karki... Blog website :mytechnicaldipesh.blogspot.com/ © Check out our Usage Policy on how to use NCS music in your videos: http://ncs.io/UsagePolicy To request a commercial license visit: http://ncs.io/Commercial music credit ONE by Lahar https://soundcloud.com/musicbylahar Disclaimer ----------------- All the techniques provided in the tutorials on the Ceos3c Tutorials YouTube channel and on the website ceos3c.com are solely meant for educational purposes only. All of the techniques taught here are only meant to be used in a closed laboratory environment or in consent with a second party. If you a Technical Dipesh re using any of those techniques for illegal purposes, can’t be held responsible for possible lawful consequences. I teach Cybe

Coronavirus

Image
Coronavirus(COVID-19) Update: How safe is Nepal? Today, the World is heavily affected by Corona outbreak. Every person globally has been afraid due to the easily spreadness of this virus which was started from Wuhan, a city in Eastern China. It came into existence since December 31, 2019 and is rapidly broadening throughout the World.  So far,  182 ( till 17 March, it was 167 )  countries are affected  by the outbreak of the Novel Coronavirus. Till today’s date, it has been reported that  10,254 people has been already suffered to deaths  out of which  3,405 people from Italy ,  3,248 people from China  and  3,601 from other parts of the Wrld .. So, here we discuss the global impact of COVID-19 and its update. Also, many of you might be wondering: How safe is Nepal from Coronavirus? Here we discuss that too. Let’s start!! Actually, What is CoronaVirus(COVID-19)? Coronavirus is a type of virus which are of different kinds. These viruses are common in different animals but mo

Hackfacebokpass

Image
DISCLAIMER: This Blogger DOES NOT Promote or encourage Any illegal activities , all contents provided by This Blogger is meant for EDUCATIONAL PURPOSE only . Copyright Disclaimer Under Section 107 of the Copyright Act 1976, allowance is made for "fair use" for purposes such as criticism, comment, news reporting, teaching, scholarship, and research. Fair use is a use permitted by copyright statute that might otherwise be infringing. Non-profit, educational or personal use tips the balance in favor of fair use. #TechnicalDipesh #HTMLHACKFACEBOOK In this artical i want to explain you that we are in now 21th century now in this world cyber war is beggining. now days you have been here that facebook is hacked. many user is problem but don't worry i am here for you to safe from hackers and how dosed hacker hack facebook password and how to safe from hackers. Follow me i am using smartphone . The  first rocket  which actually launched something into space  was  use

seeker

Image
- Technical Dipesh  Blog Available in Concept behind Seeker is simple, just like we host phishing pages to get credentials why not host a fake page that requests your location like many popular location based websites. Read more on  https://mytechnicaldipesh.blogspot.com/   .Seeker Hosts a fake website on  In Built PHP Server  and uses  Serveo  to generate a link which we will forward to the target, website asks for Location Permission and if the target allows it, we can get : Longitude Latitude Accuracy Altitude - Not always available Direction - Only available if user is moving Speed - Only available if user is moving Along with Location Information we also get  Device Information  without any permissions : Operating System Platform Number of CPU Cores Amount of RAM - Approximate Results Screen Resolution GPU information Browser Name and Version Public IP Address IP Address Reconnaissance This tool is a Proof of Concept and is for Educational Purposes On

wishfish

hi friends i am dipesh karki. welcome to my blogger .this articial ios related to ethical hacking .if you want to hack victim camera then follow the step WishFish Grab victim front cam snap by sending wishes Installation - $ apt update && apt upgrade $ git clone  https://github.com/kinghacker0/WishFish.git $ cd WishFish $ bash wishfish.sh You can also replace wishfish page scrit to Friendship dare

userrecon

Image
|| UserRecon Tool || Find Username Across 75 Social Networks || UserRecon Tool || by   Mohit Saran   on   July 30, 2019   in   INFORMATION GATHERING ,  Linux ,  Termux Hi guy's when you investigate about a username on different social networks it takes time and hard to find it manually. So here is a powerful tool which do it for you and have ability to search same username in 75 Social Networks. Requirements :- 1. Android 2.  Termux  Application Now open Termux and type following commands Installation : $ apt update && apt upgrade $ apt install git $ git clone https://github.com/thelinuxchoice/userrecon $ cd userrecon $ chmod +x * Usage : $ ./userrecon.sh Now input the username and press enter that's all. I hop you guy's enjoy our stuff of ethical hacking and don't misuse of this tricks and hacks for any illegal activities and if you found something interesting than please give your feeback or suggesti

Enemies – Summary | Major (Optional) English Class 12

Image
The Use of Force Willams Carlos Williams Unit:  Encounters Subject:  Major English Grade XII “The Use of Force” by William Carlos Williams shows the conflict between a doctor and his patient at one level and doctor and the parents at another level. The conflict between the doctor and the patient is physical. But the conflict between doctor and parents is psychological. This story tells that the use of force for the benevolent purpose is ethical and justifiable. The narrator is a doctor who visits the house of the Olson family. Their small daughter Mithalda has had a high fever for three days. Since no medicine worked, her parents called the doctor. Being fearful that the girl may be suffering from diphtheria, the doctor asked her parents if she had a sore throat. The parents had not taken a look at her throat because they did not want to hurt her. The doctor asks Mithalda to open her mouth but suddenly the girl attacks his eyes with her nails. The doctor hates the