Thursday, April 26, 2012

"Maxpain" Hacker and Security Developer, Releases two tools in an Package called "Anonymous Attacker Package". First one is - Anonymous external attack, allows you to execute udp flood web attack, into websites, this tool was made as external of LOIC, the following package contains : #Anonymous External Attack - A console application made in C# that allows...
Security Team Web-Center just released an updated for Joomscan Security Scanner. The new database Have vulnarbilities 623. Joomla! is probably the most widely-used CMS out there due to its flexibility, user friendlinesss, extensibility to name a few.So, watching its vulnerabilities and adding such vulnerabilities as KB to Joomla scanner takes ongoing...
r00tw0rm hacker "th3breacher!" release Rootdabitch v0.1 ,which is a Multithreaded Linux/UNIX tool to brute-force cracking local root through su using sucrack.   sucrack is a multithreaded Linux/UNIX tool for brute-force cracking local user accounts via su. The main feature of the Rootdabitch is that It's local brute forcer, using 10...
The improved GUI extension - WINAUTOPWN ACTIVE SYSTEMS TRANSGRESSOR GUI [ C4 - WAST ] is a Systems and Network Exploitation Framework built on the famous winAUTOPWN as a backend.  C4 - WAST gives users the freedom to select individual exploits and use them. BSDAUTOPWN has been compiled, like always for various flavours and has been upgraded to...
Plown is a security scanner for Plone CMS. Although Plone has the best security track record of any major CMS and is considered highly secure, misconfigurations and weak passwords might enable system break-ins. Plown has been developed to ease the discovery of usernames and passwords, and act as an assistant to system administrators to strengthen their Plone sites. Installation Plown is written on Python and does not need installation. Just...

Wednesday, April 25, 2012

Hi everyone, This tutorial will explain how to set up and use the DarkComet RAT, a remote administration tool, with pictures. Most remote administration tools require port forwarding because for the packets to reach your computer through the router, the router needs to know which computer on the network to send the packets to; you tell the router to forward any packets...

Sunday, April 15, 2012

If you wonder what it was like in days of yore, ten, twenty, thirty years ago, how about letting and old lady tell you the way it used to be. Where shall we start? Seventeen years ago and the World Science Fiction Convention in Boston, Massachusetts? Back then the World Cons were the closest thing we had to hacker conventions. Picture 1980. Ted Nelson is running around with his Xanadu guys: Roger Gregory, H. Keith Henson (now waging war against...
This GTMHH may be useful even to Uberhackers (oh, no, flame alert!) ____________________________________________________________ Want to become really, really unpopular? Try asking your hacker friends too many questions of the wrong sort. But, but, how do we know what are the wrong questions to ask? OK, I sympathize with your problems because I get flamed a lot, too. That's partly because I sincerely believe in asking dumb questions. I make my...
____________________________________________________________ Important warning: this is a beginners lesson. BEGINNERS. Will all you super k-rad elite haxors out there just skip reading this one, instead reading it and feeling all insulted at how easy it is and then emailing me to bleat "This GTMHH iz 2 ezy your ****** up,wee hate u!!!&$%" Go study something that seriously challenges your intellect such as "Unix for Dummies," OK? Have you ever...
“You mean you can hack without breaking the law?" That was the voice of a high school freshman. He had me on the phone because his father had just taken away his computer. His offense? Cracking into my Internet account. The boy had hoped to impress me with how "kewl" he was. But before I realized he had gotten in, a sysadmin at my ISP had spotted the kid’s harmless explorations and had alerted the parents. Now the boy wanted my help in getting...
For Those Who Like Living Dangerously: These are Telenet access codes. Telenet is a system by which one can access almost every data-base and mainframe on the continantal U.S. Most of these codes do not have passwords with them, so you will have to hack those out yourselves. But be weary. M ore than one group of hackers have gotten busted for using this system for hacking into mainfraimes. An example is the 414's. If you read about them in newsweek,...
- File Formatted for 80 columns like it or not - To start off with, I'd just like to say this file is a collectithe latest BBS crashes. Many people have grudges and reasons to 'crash' a bbs, well this file is served as an aid to them and also to sysops who want to prevent their own bbs' from being attacked. And that's enuff talk for now, let's get on with the good stuff (everything is in cookbook format for speedy reading). [-=: Apple...
Normal 0 false false false EN-US X-NONE X-NONE MicrosoftInternetExplorer4 ...

adf popup

adf

MY SKYPE

Powered by Blogger.

Random Posts

Featured Post

Form Grabber Released Works With IE,CROME and FIREFOX ,Unicode support [ 14-02-2016]

Hello guys! here i am releasing My form grabber Today, i have been coding this for oven 6 months and finally its time for public sales.....

Followers

Recent in Culture

News

Lorem 1

Pages

Popular Posts

Popular Posts