
Did you ever wish you could carry the data in your PC on your phone? - See more at: http://anonymous1769.blogspot.in/2014/06/download-all-in-one-android-smartphone.html At existing, Android OS a…
Tutorials for hacking and basic concepts of hacking are taught here :) post your queries to us and tutorial will be posted by us ;)
Did you ever wish you could carry the data in your PC on your phone? - See more at: http://anonymous1769.blogspot.in/2014/06/download-all-in-one-android-smartphone.html At existing, Android OS a…
Did you ever wish you could carry the data in your PC on your phone? Mobogenie makes it possible! Transfer pictures, videos, music and other data between your PC and phone... all with just one click!…
First What is the DNS ? (wikipedia.org) The Domain Name System (DNS) is a hierarchical naming system for computers, services, or any resource connected to the internet or a private network. It associ…
Batch file programming is the native programming offered by the Microsoft Windows Operating System. Batch file is created using any text editors like notepad, WordPad, WinWord or so on, which compr…
Today we will edit hot file of the Remote P.C which has been compromised. By editing Host file you can Redirect any website to any I.P address. Absolutely we will use metasploit.(1)Hack remote p.c …
Backtrack has lots of tools for web-application testing. Directory traversal is one of the critical vulnerability in web-application. Previously i post about what is directory traversal & how to by…
Bypassing Filter to Traversal Attacks If your initial attempts to perform a traversal attack, as described previously, are unsuccessful, this does not mean that the application is not vulnerable. M…
Today we are going to create valid RDP user in victim pc using two method. (1)As usual get meterpreter session of victim using metasploit.We need system privilege So use getsystem .(getsystem will w…
We can execute shellcode directly in macro. It`s very old method, but still it`s useful ; because AV don`t trigger it.First we will generate VB code of our payload. msfconsole use payload/windows/m…
XPath is a language that has been designed and developed to operate on data that is described with XML. The XPath injection allows an attacker to inject XPath elements in a query that uses this lan…
What do you do when you see those little icons and pop-up messages that appear in the system tray, indicating there is a new software update available for you to download and install? Most people…
Do you want to build high Pr quality backlinks to your blog And More Traffic ?, Do you want to build high Pr quality backlinks to your blog And More Traffic ?, then you need to not to worry as Anony…
var servicedomain="www.123contactform.com"; var frmRef=''; try { frmRef=window.top.location.href; } catch(err) {}; var cfJsHost = (("https:" == document.location.protocol) ? "https://" : "ht…
exploit a system outside a network :) Code : #!/bin/bash echo "************************************************************" echo " Automatic shellcode generator - FOR METASPLOIT " echo …
Open Google Search Engine, Type this dork : inurl:/plugins/ajaxfilemanager/For Example I got : http://www.ziaislamic.com/BOOK-CMS/interfaces/fckeditor/editor/plugins/ajaxfilemanager/session/ or http…