الصارم البتار بدون نت علاج سحر

Contains ads
10K+
Downloads
Content rating
Everyone
Screenshot image
Screenshot image
Screenshot image
Screenshot image
Screenshot image
Screenshot image
Screenshot image
Screenshot image
Screenshot image

About this app

The book of the strict al-Battar to address the evil sorcerers without the net, by Sheikh Wahid Abd al-Salam Bali, for the treatment of touch, magic, envy and the eye, the book of the strict al-Battar without the full internet.

The book talks about magic, the writer mentions the definition of the concept of magic, the writer also mentions the evidence from the Holy Qur’an and the Sunnah on the existence of magic and the sayings of scholars on magic. The rule of magic in Islamic law.

The book is divided into a number of sections, which we will explain to you:

The first topic: The writer mentions the definition of magic, sorcery in language, sorcery in the terminology of Sharia, some means of sorcery in drawing close to Satan.

The second topic: The writer mentions magic in the light of the Qur’an and Sunnah, the evidence for the existence of jinn and demons, the Qur’anic evidence, the evidence from the Sunnah, the evidence for the existence of magic, the evidence from the Holy Qur’an, the evidence from the Sunnah, the sayings of scholars.

The third topic: The writer mentions the divisions of magic, al-Razi's division of magic, al-Ragheb's division of magic, investigation and clarification of the types of magic.

The fourth topic: The writer mentions how a magician brings a genie?, the agreement between magic and the devil, how magic brings a genie, signs by which the magician is known.

The fifth topic: The writer mentions the rule of the magician in Islamic law, the rule of the magician of the People of the Book, is it permissible to dissolve magic with magic, is it permissible to learn magic, the difference between magic, dignity and miracle.

The sixth topic: The writer mentions the invalidation of magic, separation magic, symptoms of separation magic, how the magic of separation occurs, models for treating separation magic, love magic, symptoms of love magic, how does love magic happen, opposite effects of love magic, causes of love magic, magic is halal, treatment The magic of love.

The seventh topic: The writer mentions the treatment of the one who is tied to his wife, how the bonding occurs in the man, the woman’s bond, the treatment of the bond, the difference between bonding and impotence and impotence, how to differentiate between natural sterility and uncleanness due to the jinn, a practical model for untangling, the magic of bonding turned into madness.

The eighth topic: The writer mentions fortifications, the fortress of ablution, the fortress of maintaining congregational prayer, the fortress of praying at night, the fortress of seeking refuge when entering the toilet, the fortress of seeking refuge when entering prayer, the immunization of a woman when contracting with her, the opening of married life with prayer, immunization when intercourse.

The ninth topic: The writer mentions the treatment of the eye, the evidence from the Holy Qur’an on the effect of the eye, the evidence from the Prophetic Sunnah on the effect of the eye, the sayings of scholars about the reality of the eye, the difference between the eye and envy.

The application does not require the Internet, as all the materials have been uploaded to the application. Just download it for the first time and it will work with you all the time and everywhere.

Finally, we only ask you to pray for us in the unseen and evaluate the application so that we can continue to update it
Updated on
Feb 16, 2024

Data safety

Safety starts with understanding how developers collect and share your data. Data privacy and security practices may vary based on your use, region, and age. The developer provided this information and may update it over time.
No data shared with third parties
Learn more about how developers declare sharing
No data collected
Learn more about how developers declare collection
Data is encrypted in transit
Data can’t be deleted