Ya it's totally true. The only exception is that you should have Internet ;) ***This links might not work now*** So lets start. ...
Read More
Website Hacking Using Havij 1.16
The technique we are going to use sql injection. For more information about the topic can be found here . I will be soon posting tutorial a...
Read More
Watch "Star Wars" in command prompt
For this you need to have your telnet active. For Windows XP by default it is active but for Windows 7 I will tell you how to do it. 1) C...
Read More
Joomla Folder Scanner
While surfing on net I just found this great scanner scripted in python. About 1.5 to 2 million sites use Joomla ! Worlds many popular webs...
Read More
How to secure your server from PHP Shells
Websites security risk goes high when some has a shell on your site so just paste this code in your php.ini . It will protect your server...
Read More
Hash Types
While surfing on Internet I found these collection of Hash Types you will need it in future for cracking passwords. DES(Unix) Example:...
Read More
Blogger DNS 0day Vulnerability [Patched]
New BlogDNS 0day Lets just say, any site pointing to Google server can Be Hacked and Defaced 1st) Find a target where as its subdomain...
Read More
Switch User Agent Trick
Hiee Frnds…. Today I m gona teah u how 2 surf on Internet anonymously… its means surfing without registration withs registerd user r...
Read More
Setting up VertexNet(Botnet)
First of all sorry friends as my college have started I hardly get to time for blogging. OK lets start for building up a botnet. The botn...
Read More
Hack Facebook using keylogger
Many of you have heard of Facebook password hacker, or Facebook account hacker and many more. Any body have tried them..? do they work....
Read More
Adding your name to taskbar
Eveybody like to prove their domain' s on their PC. For thi s they do anything po s sible they put their photo a s wallpaper,pa s s wo...
Read More
2012 Crypter public
This is my one of the best crypter I have ever used and today this is for you !!!. The name of this crypter is 2012 crypter. So just down...
Read More
Browse Anonymously using Tor browser
Many of you are very worry about being anonymous online. Here I have very nice solution for you. This the most widely used browser nowa...
Read More
Posting images in Facebook chat
Many of you have heard about facebook's image smileys and there are many software available out there, but none of them work. So here I...
Read More
DoS attack using LOIC
DoS stands for Denial of Service attack. The main intention of this attack is to flood the services of a particular server and make it use...
Read More
Scan your server/virus online !!!
Many of you might have receive some suspicious e-mail containing a file and somebody requesting it to open it or something else. You might ...
Read More
How to add "Take Ownership" to the right click of Windows 7 or Vista ?
Many a time's you might have come across some big files or folder that occupy a lot of your precious Hard Disk space :( And the worst t...
Read More
Automated Stenography
In the last post I had written about hidding message behind a photo (using software). In this post I would teach you about hidding messa...
Read More
Stenography using command prompt
In the last post I had written about basic of Steganography. In this post I will tell you about hiding text behind images using softwa...
Read More
What is Stenography ?
Steganography is a Greek word means "covered writing" stegano stands for covered and graphie means writing. It is a technique...
Read More
What are FUD crypters?
What are crypters? >> Crypters are the one of the best ways to bypass antivirus detection in today's world. They are normall...
Read More
Spreading ProRat server
In the previous tutorial I had written how to make ProRat server. This time I will tell you how to spread your RAT (remote administr...
Read More
How do people get HACKED?
This is the common question my friends ask me. So what to tell them??"". Now I'll tell you what you should to prevent from b...
Read More
How to remove ProRat server from your PC?
In the previous post told you about how to make ProRat server. In this I will tell you how to remove ProRat server from your compu...
Read More
Creating server with Pro Rat
In the previous post I told you about Malware and it s different type s. In thi s po st I will tell you about Pro Rat. Thi s i s my favou...
Read More
What are Malware's?????
Malware are the biggest problem s i n today's world I'll tell you something about it.So what the word MALWARES actually means.Malwa...
Read More
Subscribe to:
Posts (Atom)