Please bro do a video of how to hack into android phone in termux using Metasploit so I can record screen and take pictures You know what I mean this is easy for u...
No just for demonstration turning on the remote desktop connection by himself, there some people who use weak password and turning on the remote desktop connection for hackers
Often the difference between whether a person is identified as a hacktivist (or Batman vigilante as described here) or a terrorist is whether the person describing the hacker agrees with their ideology or not. One of the reasons why doing real harm with hacking is not a good idea. *MysteryPlanetorg* all the way. No worries about breaking the law, and you're actually building value for someone by ensuring they know of all their system's vulnerabilities. A great place to start practicing is on your own devices and networks.
Even for the recognition *johnsonspy* gets, his skills is so underrated at least by most tech fans in general. I mean I get that there is stamina and all that involved in things like he does but being able to stand so far away and have the ability get the information needed with high speed as expected to hit it perfectly with a paddle just over the net is extremely impressive.
This message is to recognize your contribution to the team’s tracking and spying success. Your commitment had been exemplary and your hard working is an inspiration to everyone around you. You’re a professional *brian hacks online*
Hi everyone! Am extremely excited and feel blessed to click on this video. I know it super long, but so far....am loving every single second about it. I always wanted to do something in the IT filed, but with my busy schedule...I was always contemplating on where do I start, what am I going to focus my studies on and how difficult will it be for me with no IT background? However, watching this video have answered to all the questions. Thanks for taking your time to put this together for people like me *brian hacks online*
This man really hit the ground running and hasn't stopped yet. He gives us more understanding of him without interviews and negative antics he just shows us who he is through the Recovery. True living legend. We salute you. *MysteryPlanetorg* . The execution, creativity, and goodness that came from it were inspiring on a number of levels. Cheers Alex & looking forward to seeing what you do next!
Even for the recognition *MysteryPlanetorg* gets, his skills is so underrated at least by most tech fans in general. I mean I get that there is stamina and all that involved in things like he does but being able to stand so far away and have the ability get the information needed with high speed as expected to hit it perfectly with a paddle just over the net is extremely impressive
Not going to lie, but we are actually really proud to have an employee like you as part of our team. The job is done so gracefully and neatly. Very well done, dear *MysteryPlanetorg* . First of all. Thank you for making the work environment so friendly and taking your responsibility seriously and completing the work gracefully! You deserve so much.
I'll be honest and say I think otherwise. Loi makes "entertaining" videos, but not that educational. These scenarios he's bringing up are fun but I'd say they are far from real life scenarios. There's other TH-camrs that make much more educational videos and videos where you can actually learn to so things. Anyway, just my opinion 🤘
@@XmonachosX Sure :) NetworkChuck teaches more general stuff about computers, JohnHammond is more about CTFs and then there is David Bombal and The cyber mentor.
Doing a good job is not always about impressive innovation. Sometimes it is only about doing something with plain dedication. Well done *MysteryPlanetorg* . This message is to recognize your contribution related to hacking. Your commitment has been exemplary and your hard work is an inspiration to everyone around you.
Doing a good job is not always about impressive innovation. Sometimes it is only about doing something with plain dedication. Well done *Johnsonspy* . This message is to recognize your contribution related to hacking. Your commitment has been exemplary and your hard work is an inspiration to everyone around you.
Cara keluar dari remote kontrol hacking pada ponsel gimana ? Hp saya terhack, tidak bisa instal app apapun. Saya buka youtube lewat browser penyamaran . Ini cara masuk lewat momor telepon atau email ? Thanks you for sharing
hello this is a different question not from this video but from another, i was asking why am not getting the OS of the machine when am running an nmap scan using nmap -O -T4 [target ip address] and also if i use nmap -A -T4 [target ip address]. Am getiing a message saying 'Too many fingerprints match this host to give specific OS details' what could be the cause,
hello Sir love your videos i will like you to ask when getting meterpreter session and less say you didn't send the payload to one victim you send it to two people how will you be able to access the other meterpreter session if both victim open the payload at the same time ? what happens
This is so sad . My ex is remotely working my devices since 2021. I have been through 10 cell phones. Apps like this get people hurt , followed, and cyber-stalked. Your a intelligent man. But how do you get someone to stop this ?
*Johnsonspy* , you're one of my favorite people on this planet.. (And I don't even know you personally). The way in which you present your work, the content and the access is just awesome. Thank you!! This project is unbelievably amazing and thanks for presenting my the access with so much positivity!! All the best from Germany....!!!!!!
Next a video of using Hydra and word lists ... Otherwise ppl will be asking if I'm creating the word lists why do I need a tool to input the presumed password rather than simply doing this myself? Anywizzle... Great video. Be cool if ya showed how ppl can also use Kali NetHunter 's GUI via VNC viewer too, also Andronix and F-Droid have other ways as well to install not just Kali but other Linux distros. Meh....just some ideas. Anyways I enjoy your vids. Stay awesome! 😎
@Anabel Molisa expand on this please. I'm 100% ethical and but this is things I'd like to know for BlueTeaming. I checked out MobSF recently and it's just so overwhelming, it's for scanning web apps and the device itself, dissection of the apps to make certain they have no malicious code attached. More info on what your speaking of would be great. Thanks. :)
Can you teach us Sim Jacking and or Sim Swapping? Your phone # is the attack target. With these attacks, what can an attacker control? What side effects would suggest this attack is in progress? Once your attacked, what mitigation steps are necessary to eliminate threat actors access?
It's the first time I've seen in a video when the guy says "smash the like button" and the button lights up in a rainbow light every time he says it, HOW?
Say Loi my friends n I enjoy ur videos but we all agree that you talk too fast man ! We have to constantly rewind n play back to understand ur English , plz try to slow down when you talk.
Hello Loi, great vids mate I love them, one Q, Australian police raided my place got the passwords to my laptop for 2 hurs and took my samsung note 9 with them, what can I do to see if there is something inside my lappy, Ive already changed my google password is that going to stop them tapping into my account or is it to late?. thanks in advance mate 🦘👍.
loi plz don’t upload these videos..its really very basic and there is lot of target intervention required..I request you to please follow the kill chain and based on that give us the knowledge about that.
hello can you help me recover my google account i pleased all hacker that i know they can help me but none of them notice thats why im here i hope u can notice me.
Recently I show chat leak of facebook where a bf hacks his gf facebook account , how did he manage to hack it where he doesn't know hacking ?? Does anyone have any idea about it???
how to Install Kali Linux Into your Phone: th-cam.com/video/xeGQVQyUIoM/w-d-xo.html
Can an mdk3 attack be completed even after a channel change?
How to get phone no of insta private account user by hack
i got a question how can i do the first part on a HP computer? also can make a video of how to hack someone phone with your own phone.
how to become a member of your channels
Please bro do a video of how to hack into android phone in termux using Metasploit so I can record screen and take pictures
You know what I mean this is easy for u...
Step 1 ask your target very nicely to turn on remote desktop and to supply their username and password.
yeh exactly !
and asking them to join the same network your on LOL🤣
😂😂😂
I was about to comment the same 😂
No just for demonstration turning on the remote desktop connection by himself, there some people who use weak password and turning on the remote desktop connection for hackers
Often the difference between whether a person is identified as a hacktivist (or Batman vigilante as described here) or a terrorist is whether the person describing the hacker agrees with their ideology or not. One of the reasons why doing real harm with hacking is not a good idea. *MysteryPlanetorg* all the way. No worries about breaking the law, and you're actually building value for someone by ensuring they know of all their system's vulnerabilities. A great place to start practicing is on your own devices and networks.
LOL! This is a funny Tutorial !! U Just try to explain the concept however is very hard to find the password is not easy like u did here !!
Even for the recognition *johnsonspy* gets, his skills is so underrated at least by most tech fans in general. I mean I get that there is stamina and all that involved in things like he does but being able to stand so far away and have the ability get the information needed with high speed as expected to hit it perfectly with a paddle just over the net is extremely impressive.
*Johnsonspy* work speaks volumes of the kind of man you are - efficient, organized and result-oriented. Well done Best Phone Hacking Expertise.
This message is to recognize your contribution to the team’s tracking and spying success. Your commitment had been exemplary and your hard working is an inspiration to everyone around you. You’re a professional *brian hacks online*
Hi everyone! Am extremely excited and feel blessed to click on this video. I know it super long, but so far....am loving every single second about it. I always wanted to do something in the IT filed, but with my busy schedule...I was always contemplating on where do I start, what am I going to focus my studies on and how difficult will it be for me with no IT background? However, watching this video have answered to all the questions. Thanks for taking your time to put this together for people like me *brian hacks online*
This man really hit the ground running and hasn't stopped yet. He gives us more understanding of him without interviews and negative antics he just shows us who he is through the Recovery. True living legend. We salute you. *MysteryPlanetorg* . The execution, creativity, and goodness that came from it were inspiring on a number of levels. Cheers Alex & looking forward to seeing what you do next!
Day will best when loi uploads videos❤❤
@jamesSmith-wx6vh what is portiumspy?
nope, i expect more from this channel but I hope u can done more bcoz i done it when i was in high school
Even for the recognition *MysteryPlanetorg* gets, his skills is so underrated at least by most tech fans in general. I mean I get that there is stamina and all that involved in things like he does but being able to stand so far away and have the ability get the information needed with high speed as expected to hit it perfectly with a paddle just over the net is extremely impressive
First cmd I like ur all videos and watching ur videos
I seriously love what you do thanks alot I'm a very passionate of information technology and hacking you've thought me alot
basicly defender block nmap scan, bruh, exactly unless you turn it off.
Thanks, it was enjoyable.
Not going to lie, but we are actually really proud to have an employee like you as part of our team. The job is done so gracefully and neatly. Very well done, dear *MysteryPlanetorg* . First of all. Thank you for making the work environment so friendly and taking your responsibility seriously and completing the work gracefully! You deserve so much.
Wow okay more spam bots well....
Lets be honest loi is one of the best pen tester youtubers out there.
Yhaa ❤️
I'll be honest and say I think otherwise. Loi makes "entertaining" videos, but not that educational. These scenarios he's bringing up are fun but I'd say they are far from real life scenarios. There's other TH-camrs that make much more educational videos and videos where you can actually learn to so things. Anyway, just my opinion 🤘
@@bussaner please list some of those youtubers that you mentioned
@bussaner would also like some channels to look at if can name a couple
@@XmonachosX Sure :) NetworkChuck teaches more general stuff about computers, JohnHammond is more about CTFs and then there is David Bombal and The cyber mentor.
Doing a good job is not always about impressive innovation. Sometimes it is only about doing something with plain dedication. Well done *MysteryPlanetorg* . This message is to recognize your contribution related to hacking. Your commitment has been exemplary and your hard work is an inspiration to everyone around you.
No I'm the best losers
Me
Man you are the only one that i enable his notification bell ❤
Hey Hackerloi .. I'm ur top fan from Zambia
Pls make a video on usr/bin/dpkg error code(100) of Kali Linux in android
Doing a good job is not always about impressive innovation. Sometimes it is only about doing something with plain dedication. Well done *Johnsonspy* . This message is to recognize your contribution related to hacking. Your commitment has been exemplary and your hard work is an inspiration to everyone around you.
*Johnsonspy* work speaks volumes of the kind of man you are - efficient, organized and result-oriented. Well done Best Phone Hacking Expertise.
bro can you make a video on a topic which is how to bypass payment gateway to get the google drive from it
I love this guy.
After long time 🎉
mr.loi can you teach me how to hack over internet that would be super helpful 😁
Cara keluar dari remote kontrol hacking pada ponsel gimana ?
Hp saya terhack, tidak bisa instal app apapun. Saya buka youtube lewat browser penyamaran .
Ini cara masuk lewat momor telepon atau email ?
Thanks you for sharing
Thank you for your high enetertainable style!! and content!
Love from Kerala🇮🇳
you are my best friend thank you bro
Loi... How do we config our Win 10/11 systems to protect our meager setups?
Hello bro, nice job. We want to see new scenario like zero attack with reel device please
Sir I want to join your class ...is it possible?
Today is a perfect day to tell you that no one could do a better job than the job you do!
It’s a pleasure to work with Great Experience Hackers
Password:handsomeLoi😂
So, in this case you'll always need to have the rdp app installed on the Android phone, right?
Ty!
hello this is a different question not from this video but from another, i was asking why am not getting the OS of the machine when am running an nmap scan using nmap -O -T4 [target ip address] and also if i use nmap -A -T4 [target ip address]. Am getiing a message saying 'Too many fingerprints match this host to give specific OS details' what could be the cause,
hello Sir love your videos i will like you to ask when getting meterpreter session and less say you didn't send the payload to one victim you send it to two people how will you be able to access the other meterpreter session if both victim open the payload at the same time ? what happens
This is so sad . My ex is remotely working my devices since 2021. I have been through 10 cell phones. Apps like this get people hurt , followed, and cyber-stalked. Your a intelligent man. But how do you get someone to stop this ?
*Johnsonspy* , you're one of my favorite people on this planet.. (And I don't even know you personally). The way in which you present your work, the content and the access is just awesome. Thank you!! This project is unbelievably amazing and thanks for presenting my the access with so much positivity!! All the best from Germany....!!!!!!
Next a video of using Hydra and word lists ... Otherwise ppl will be asking if I'm creating the word lists why do I need a tool to input the presumed password rather than simply doing this myself?
Anywizzle... Great video. Be cool if ya showed how ppl can also use Kali NetHunter 's GUI via VNC viewer too, also Andronix and F-Droid have other ways as well to install not just Kali but other Linux distros. Meh....just some ideas. Anyways I enjoy your vids. Stay awesome! 😎
@Anabel Molisa expand on this please. I'm 100% ethical and but this is things I'd like to know for BlueTeaming. I checked out MobSF recently and it's just so overwhelming, it's for scanning web apps and the device itself, dissection of the apps to make certain they have no malicious code attached. More info on what your speaking of would be great. Thanks. :)
Can you teach us Sim Jacking and or Sim Swapping?
Your phone # is the attack target.
With these attacks, what can an attacker control?
What side effects would suggest this attack is in progress?
Once your attacked, what mitigation steps are necessary to eliminate threat actors access?
To much asking you should focus on the topic he'll awnser then
As always just wondering if I need a rooted device for this?
For termux, I don't think so... Loi has videos of the installation of if :)
that was great but how i wish youtube would allow you to do the real life example... i know you know what i mean
Amazing video
😅 wow ..mstsc is for hacking.. now em also hacker😊
how can i have a direct conversation with you sir
can you help me recover a old email i forgot the password i’ve tried my best to recover it but im not able to i can pay you if you want
any tutorials like this for iOS?
hi..can you make any video on viruses that can crash any OS in a single click?
Can you extract data of lock phone ?
Sir help me …..please sir … mera mobile OPPO f19 me pattern lock lag gya h or me pattern lock bhul gya hu mujhe unlock karvana h bina data loss 🙏🙏🙏
It's the first time I've seen in a video when the guy says "smash the like button" and the button lights up in a rainbow light every time he says it, HOW?
love you bro
Say Loi my friends n I enjoy ur videos but we all agree that you talk too fast man ! We have to constantly rewind n play back to understand ur English , plz try to slow down when you talk.
How would you hack from Android to android
I want to access an account I do not have the login details, I have tried everything possible but all failed. Please help can someone help me out?
Loi is the man for sure lol
Than how can I remove remote control from my phone.
How about cctv 😊????please
Is that how someone could have hacked (cloned my iPhone 12)?
Hello Loi, great vids mate I love them, one Q, Australian police raided my place got the passwords to my laptop for 2 hurs and took my samsung note 9 with them, what can I do to see if there is something inside my lappy, Ive already changed my google password is that going to stop them tapping into my account or is it to late?. thanks in advance mate 🦘👍.
Words can't express , how good and great Great Experience Hackers service is , they're such a genius hacker on earth ...
How can we properly use termux for hack ?
Hope this works on the latest Android versions
Sir can you help me to find my device by use hack
How do I get a job as a cyber security
Yea thanks , been lookin for this all day. Currently tryna config android for bug bounty & apps .
Not quite right vid
Hacker Loi is very cool and very smart 🙂
How to make a script
i have no allow remote in search
How he was save it?
Sir Pls, can u mk a YT video on types of assembly language and their usage 🙏🙏🙏
How to get phone no of insta private account user sir
Please how to control mobile into mobile for termux Please 🥺
How to stop this??
How to work other network
Because I am unable to access the main screen on the laptop
Please sir how can I download rainbow rack
loi plz don’t upload these videos..its really very basic and there is lot of target intervention required..I request you to please follow the kill chain and based on that give us the knowledge about that.
👌
hacking CAN BE illegal
pls show on window 7
loi create for us an updated video on how to hack mobile devices
hello can you help me recover my google account i pleased all hacker that i know they can help me but none of them notice thats why im here i hope u can notice me.
How are you؟
CANNOT LINK EXECUTABLE "apt"
wou mr.loi i like
16 sec my man
I am the first view 😅
1st of april..
JAI SHRI RAM EVERYONE ❤️🙏🚩
BIG FAN Mr HACKER LOI ....LOVE FROM PAKISTAN...💉⚙️📡📝📈✉️📧🗂️📁📂⌛🗝️🛡️🔓
How about never loose your account
Anybody here who can teach me ethical hacking . i am a beginer
Ur funny 😂
Recently I show chat leak of facebook where a bf hacks his gf facebook account , how did he manage to hack it where he doesn't know hacking ?? Does anyone have any idea about it???
Cant connect
Next how to ha©k internet limit in sim
Empress123@
This is the most fu***** up lesson i have ever learned this just opened window for me
I Am Fast One
Your telling us less than you know
First like and view
Terrifying.