Tuesday, 29 March 2011

Finding A Spoofed Website With A Javascript

Lots of people think that Javascript is an inferior language but Javascript is an extremly powerful language and those people who think the other way they either don't know how to use it or are not familiar with it's capabilities, With javascript you can do lots of cool things such as edit any page, make an image fly etc, but it is a waste of time to spend your time on making images fly with javascripts...
Read more...

Friday, 25 March 2011

SMS -BOMBER

Features Include:Full Feature List:Custom SMTP Server (Make Sure You Type It Right)Custom Carrier Gateway (If Your Victims Gateway Is Not In The Large List You May Find And Enter it Yourself)Custom Number Of SMS To Send (Finally Have Where You Can Enter Any Amount To Send)Save/Load Settings (Will Save Everything You Enter In The Fields, Restarting Your Computer Will Lose The Saved Settings)Fixed...
Read more...

Thursday, 24 March 2011

Lost�Door J-Revolution v6

What is Lost Door?Lost Door is a remote administration and spying tool for Microsoft Windows operating systems.What operating systems are supported?Windows 95/95B Windows 98/98SE Windows MEWindows NT 4.0 Windows 2000 Windows XPwindows Vistawindows SevenWhat�s New  * Sin GUI changed   * Webcam Stream fixed  * Open website in the defaut browser added  * Severals Minor...
Read more...

Tuesday, 22 March 2011

how-to-setup-cybergate-rat

In This Tutorial You'll Learn Following:Cybergate 1.07.5 Set Up - Download Cybergate RAT Here -- The AV Detection Is False Positives, Dont worrySetting Up An No-IPSpreadingSetting Up An No-IP Duc - Download Here! Setting Up The No-IP & Client1. Start Off By Going To; No-IP.com And Register. If You Have An Account There Already, Then Just Log In.2. Once You've Logged...
Read more...

Saturday, 19 March 2011

Gaining Auth Bypass On an Admin Account.

Most sites vulnerable to this are .aspFirst we need 2 find a site, start by opening google.Now we type our dork: "defenition of dork" 'a search entry for a certain type of site/exploit .ect"There is a large number of google dork for basic sql injection. here is the best:"inurl:admin.asp""inurl:login/admin.asp""inurl:admin/login.asp""inurl:adminlogin.asp""inurl:adminhome.asp""inurl:admin_login.asp""inurl:administratorlogin.asp""inurl:login/administrator.asp""inurl:administrator_login.asp"Now...
Read more...

Thursday, 17 March 2011

Windows Password Hack

his is a short and effective way to hack the  Windows Login password without knowing the previous password. This trick works only in case you are already logged into Windows and you have all the administrative privileges. So here we go: 1.Open Command prompt START>RUN Type in; cmd 2. In command prompt just type in �net user� as shown below: 3.After doing the above, the command will give...
Read more...

Wednesday, 16 March 2011

How to hack an Email account using Cookie Stealing.

If you are a newbie and don't know about cookie, then for your information, Cookie is a piece of text stored on user computer by websites visited by the user. This stored cookie is used by webserver to identify and authenticate the user. So, if you steal this cookie (which is stored in victim browser) and inject this stealed cookie in your browser, you can imitate victim identity to webserver and...
Read more...

Tuesday, 15 March 2011

Create Hidden Account In XP

Since we are going to do all the Editing in Window   Registry it is Recommended to Back Up the Registry before going Further.After you have Backed up your registry follow the Steps to Create your Hidden Account:First Goto Start -> Run -> Type regedit -> EnterIn the Left Menu goto,HKEY_LOCAL_MACHINE\Software\Microsoft\WindowsNT\Cu rrentVersion\Winlogon\SpecialAccounts\UserListIn...
Read more...

Monday, 14 March 2011

How to Protect Your Websites & BLOGS From Hackers?

It�s a nightmare scenario. You go to your website only to find a nasty message from a hacker bragging about hacking your site. And nothing else. As far as you can tell your content is gone and you can�t even find a way to log into your Website, WordPress OR Blogspot dashboard.Would your business survive your website being shut down, even temporarily?Have You Really Been Hacked?A lot of times people...
Read more...

Sunday, 13 March 2011

see the password behind star

Hello guys,I am going to show you in a short tutorial how to read out a password of a web browser.Example:http://www.gmail.comUsername: example@gmail.comPassword: **What's my password?Alright, now you could read out the **-stuff with a simple javascript code.All you need is to copy & paste it in the URL-address b...
Read more...

Friday, 11 March 2011

How to hack a Gmail account:

Lets start with the hack. Gmail usually stores the session authentication information in cookie named "GX". This cookie is used by Gmail to verify and authenticate the user. Thus, the user will be given access to Gmail account depending on the cookie he has. So, if you have access to victim account's cookie and if you inject this cookie in your browser, Gmail will give you the access to victim account....
Read more...

Wednesday, 9 March 2011

6 Tips to Avoid Facebook Viruses and Spam Messages

Facebook, the biggest social network with 500 million users, provides an interface to hit an unsuspecting crowd with malware and viruses. These viruses aren�t very difficult to detect  if you are cautious enough. These Facebook viruses appear on your wall in forms of a bizarre or eye-catching stories and videos and once the user has clicked/liked the link, it is already late. The next step...
Read more...

Tuesday, 8 March 2011

Low Orbit Ion Cannon - An open source network stress tool (Ddos) !

 Its an ddos tool which helps to attack an server by sending the more numbers of packets you can download from here Download He...
Read more...