On Daily we have heard news about online services is suffering from a lack of security. In February WhatsApp has been down for nearly four hours, as if this were not enough, people became aware of th…
How to Exploit and Gain Remote Access to PCs Running Windows XP
Before we start hacking, let's familiarize ourselves with Metasploit so that when I use certain terms, we all understand them to mean the same thing. When first looking at the Metasploit Framework,…
How to Hack WPA WiFi Passwords by Cracking the WPS PIN

A flaw in WPS, or WiFi Protected Setup, known about for over a year by TNS, was finally exploited with proof of concept code. Both TNS, the discoverers of the exploit and Stefan at .braindump have c…
Massive Cyber Security Tools list

Security tools list 2014 2014 will bring a lot of new challenges and so it is wise to arm yourself with the finest cyber security tools that can be downloaded for free or can be purchased. So if yo…
How do I find out what shell I’m using?

What is the best way to find out what shell I'm using. echo $SHELL is not so reliable. Please let me know any tiny command or trick. echo $SHELL should work. But here is old good UNIX trick. Use th…
Linux: Download all file from ftp server recursively

You can use ncftpget command to download entire ftp directory and sub directories from remote ftp server. Let us say you would like to download /www-data directory and all subdirectories inside th…
BASH Shell: How to run several commands in Sequence or all at once

A quick question: How do I run several commands in Sequence or all at once? If you need to run several commands chain them with a ; (semi colon). It is a control operator or meta-character. General …
HOW TO DOWNLOAD FROM 4SHARED WITHOUT USERNAME AND PASSWORD

Well it is not all people that love registering before downloading or accessing a site right? Are you one of those people and you want to download from 4shared and don't want to register? there is …
Frankly Messenger: Send Self Destructive Messages
If you’ve ever sent a text message after a few drinks or following a heated argument, you may have instantly regretted it and wished you could delete it from the recipients phone, so It couldn’t be u…
Privacy: Make Everything Self Destruct

Delete attachments automatically The Silent Text app for Android and OS (silentcircle.com) lets you send attachments of up to 100MB with your emails, which expire when you say so. It has an automatic…
THE TOP 10 ANDROID HACKING TOOLS

THE TOP 10 ANDROID HACKING TOOLS FOR HACKERS !! Always low battery but still android rocks !! this is the android logic . . but major part of mobile users using the android platform !! So today i a…
How to Send Email with Password Protection in Gmail Yahoo and Outlook-Encrypted mails
Privacy on Internet in becoming so tough with the some Government laws in these days, Even some big companies which say that they are give high importance to their privacy are also bending to the G…