Showing posts with label Tools. Show all posts
Showing posts with label Tools. Show all posts

Tuesday, February 3, 2015

Turn Your PC into a Wi-Fi Hotspot for Free



https://encrypted-tbn2.gstatic.com/images?q=tbn:ANd9GcRisBGHV6aMS-lnvYNAOjd2ep7fGYJ-tHiRMcLL3oHM3mPiygE8SQ
A free virtual WiFi router software which can convert your Windows XP, 7 & 8 laptop/PC into a WiFi Hotspots with one click. You can easily share the internet connection anytime and anywhere.







Wednesday, January 16, 2013

How to Scripting NMAP

1. Nmap API

When writing Nmap NSE scripts, we of course need to have a way to talk to the Nmap API, which provides us with various advanced features so we don’t have to write those features ourselves. We can’t do everything in LUA language that is used for writing NSE scripts, but we also need a way to talk to the Nmap API. For example: we need a way to check the information that was already gathered about the scanning host or network when running a script. This can be achieved by passing certain arguments to the NSE script within the action function. Let’s present an example of the banner.nse action function:

Wednesday, October 24, 2012

How to use DNS Spoofing & ARP Poisoning

Source : HackerCommunity

Ettercap is a comprehensive suite for man in the middle attacks.
It features sniffing of live connections, content filtering on the fly and many other interesting tricks. It supports active and passive dissection of many protocols and includes many features for network and host analysis.

How to Hack a site using Sql Map |Hacking a website using sql map of Backtrack 5

What is backtrack ?

Backtrack is Ubuntu based operating system. Backtrack is the best operating system for the security professionals and hackers. There are lots of inbuilt tools in the backtrack 5 like sqlmap , metasploit , Information gathering, maintaining access , Backdooring  etc.

Thursday, October 18, 2012

Top 10 Linux Hacking Tools


1. nmap – Nmap (“Network Mapper”) is a free open source utility for network exploration or security auditing. It was designed to rapidly scan large networks, although it works fine against single hosts. Nmap uses raw IP packets in novel ways to determine what hosts are available on the network, what services (application name and version) those hosts are offering, what operating systems (and OS versions) they are running, what type of packet filters/firewalls are in use, and dozens of other characteristics. Nmap runs on most types of computers and both console and graphical versions are available.


Wednesday, August 22, 2012

TechSmith Camtasia Studio 8.0.0 Build 878 Crack

Camtasia Studio is the complete professional solution for recording, editing and sharing high-quality screen video on the Web, CD-ROM and portable media players, including iPod. With support for a variety of video standards, you can ensure your content delivery now and in the future. Easily record your screen, PowerPoint, multiple audio tracks, and webcam video to create compelling training videos, screencasts, and presentations without ever leaving your desk. With the power of interactive Camtasia Studio videos,


Sunday, August 19, 2012

Hack Any account using Rapzo keylogger

How to use Rapzo keylogger to Hack any Account

Rapzo Keylogger, Hack any email with this keylogger Rapzo keylogger 1.5 public Edition full Tutorial

How to Own a Hacker - Reverting Keyloggers and Stealers

In this post i will show you how to revert those keyloggers, RATs, or stealers, and find who sent them to you.

What is Reverting?

Reverting generally means reversing an action or undoing the changes. Here in our case, reverting would be more of reversing the action.



Use Sniperspy to a new way

SniperSpy is the industry leading Remote password hacking software combined with the Remote Install and Remote Viewing feature.Once installed on the remote PC(s) you wish, you only need to login to your own personal SniperSpy account to view activity logs of the remote PC’s! This means that you can view logs of the remote PC’s from anywhere in the world as long as you have internet access! Do you want to Spy on a Remote PC? Expose the truth behind the lies! Unlike the rest, SniperSpy allows you to remotely spy any PC like a television! Watch what happens on the screen LIVE! The only remote PC spy software with a SECURE control panel! This Remote PC Spy software also saves screenshots along with text logs of chats, websites, keystrokes in any language and more.

Wednesday, July 18, 2012

SQL Injection ~URL Based~

Introduction: SQL injection is an attack in which malicious code is inserted into strings that are later passed to an instance of SQL Server for parsing and execution.




Tuesday, July 17, 2012

Uniscan Website Vulnerability Scanner SQL Hunter



The Uniscan is a Web vulnerability scanner, aimed at information security, which aims at finding vulnerabilities in Web systems and is licensed under the GNU GENERAL PUBLIC LICENSE 3.0 (GPL 3).

Friday, June 22, 2012

WPScan v.1.1 Wordpress security Vulnerability scammer

Details
•    Username enumeration (from author querystring and location header)
•    Weak password cracking (multithreaded)
•    Version enumeration (from generator meta tag and from client side files)

Related Posts Plugin for WordPress, Blogger...
Blogger Widgets