Monday, 2017-09-25, 0:19 AM
Welcome Guest | RSS
Site menu
Login form
Buy Wifi Hacking Adapter
 

Best Laptop for Hacking
 










Main » Entries archive
« 1 2 3 4 ... 24 25 »
Code:
@echo off
TITLE Binary-^>Batch Bitch - Luci_
echo This Script will combine a Batch File and a Binary into a single Batch File.
echo Please be careful to include all file extensions.
::Read in our files, a Batch File and an Executable.
set /p BatchFile=Batch File:
set /p BinFile=Binary/Executable File:
echo Injecting...
::Use a delimiting string at the start of every instruction to differentiate Batch from Bin.
::Turn echo off, we want to do this silently as not to interrupt normal execution.
Views: 1406 | Added by: defaultNick | Date: 2014-02-21 | Comments (0)

Cryptocat is an open source web application intended to allow secure, encrypted online chatting. Cryptocat encrypts chats on the client side, only trusting the server with data that is already encrypted. Cryptocat is offered as an app for Mac OS X or as a browser extension for Google Chrome,Mozilla Firefox and Apple Safari.

If you are a user of Facebook, Twitter and any other Messenger user then for your privacy you must go for it. For detail views on it do watch the below video.


Views: 1818 | Added by: defaultNick | Date: 2014-02-21 | Comments (1)



Reported Successfully : June 6 2-13                                                          Status: In Progress

Views: 5841 | Added by: defaultNick | Date: 2013-06-23 | Comments (0)

 

Hello friends i am back again, but this time with something big, today we will talk about a web vulnerability known as Cross Site Scripting aka XSS.

Cross Site Scripting:
XSS, as we know, helps hacker to inject client-side malicious script into a website’s pages and can lead to many serious problems like reputation attack, like adult alerts, transferring to some inappropriate website. XSS vulnerability may be used by hackers to bypass access controls such as the similar source procedure. SO in short its F*CKI*G dangerous :P.

Cross-site scripting vulnerabilities can grant malicious guests control over sites we are surrounded with in this virtual cyb ... Read more »

Views: 7481 | Added by: defaultNick | Date: 2013-06-22 | Comments (0)

Hello Friends yea i knw its a long time i havnt share anything new with you , but today you gona love this post for sure :). so what this post is all about ? well as we all know WEP encryptions are easy to crack and hence can be vulreable if applied as security on your wireless devices beacuse it does not required a hard job to exploit , but when it comes to talk about WPA and WPA-2 then obviously its bit hard beacuse till now everyone knows that We can crack WPA and WPA 2 with only dictionary attack, yes i write it as TILL NOW :) , beacause security researchers now come up with a new solution to crack down WPA and WPA-2 encryption without any dictionary attack and also via a very easy manner.

So in this post i am sharing a new method for cracking WPA and WPA-2 to test the security of your wireless devices.

Before we proceed first lets understand what do you mean by WEP, WPA and WPA-2 encyptions.

... Read more »
Views: 15804 | Added by: defaultNick | Date: 2013-06-14 | Comments (0)

Dive In

Buckle up and brace yourselves to experience the awesomely amazing life-like 3D picture quality without the need of any 3D glasses! Here's the first look.

Naked Eye 3D Explosive Screen

Enter a whole new era of entertainment with the Canvas 3D! Now bring alive all your entertainment on a 12.7CM 3D screen that does not require 3D glasses for viewing!




Capture Pictures and Videos in 3D now
Capture all your favorite moments in supreme clarity with its 5MP camera & put a face to all your chats with its 0.3 MP front facing camera. Record videos, click images and do much more with you ... Read more »
Views: 2932 | Added by: defaultNick | Date: 2013-05-01 | Comments (0)

 

What is SSL ?
The Secure Sockets Layer (SSL) is a commonly-used protocol for managing the security of a message transmission on the Internet. SSL has recently been succeeded by Transport Layer Security (TLS), which is based on SSL. SSL uses a program layer located between the Internet's Hypertext Transfer Protocol (HTTP) and Transport Control Protocol (TCP) layers.

Why Use SSL ?
Secure Sockets Layer (SSL) is a message transportation protocol that provides the following

Advantages of SSL

Authenticated:- The origin of all messages is assured.

Reliable:-The message transport uses a message inte ... Read more »

Views: 5221 | Added by: defaultNick | Date: 2012-05-26 | Comments (0)

Was ill today but was not finding myself comfortable so decided to write this post. This post will reveal the real way of tracing the lost cell phone. If you Google  trace lost cell phone you will find lots of blogs having the procedure   to get it back but unfortunately , from 100 posts 90% are failed to impress me so I decided to write It by my own in simple words so that will be easy for all of you to understand.

So let’s start as you discovered that your cell phone is missing then following are the steps you should follow to get it back.

1.You should have I IMEI number code for the lost mobile. If you didn’t noted down before then no worries just get the cell phone box and look for IMEI number it should be there. ... Read more »
Views: 7518 | Added by: defaultNick | Date: 2012-05-24 | Comments (0)

Defending any server from DDoS is always like , protecting a virgin on a lonely island from 100 rapists. But we have a effective method to stop these brutal f*cking to protect our respective Apache web server.  Here we have one Apache module called Mod_evasive, Mod_evasive is an Apache unit that is intended to boundary the shock of unusual types of attacks like Distributed Denial of Services Attack or may be  brute force on your web site/server. while incorporated with iptables, mod_evasive can set up to even larger attacks. The component detect attack by creating an domestic hash of IP Addresses and URIs, and denying any single IP address from executing request a page more than the allowed times per second, make more than 50 concurrent requests per second on the same child process, make a single request while blacklisted

On an ... Read more »
Views: 2634 | Added by: defaultNick | Date: 2012-05-22 | Comments (0)

How to order Hacking Crux 2 Book

Hacking Crux 2:- Rs 155  Buy Cash on Delivery 

... Read more »

Views: 5946 | Added by: defaultNick | Date: 2012-05-15 | Comments (0)