Recent Posts

Thursday, November 1, 2012

Enumerate Company's Employees Information with Jigsaw

Download Jigsaw @ https://github.com/pentestgeek/jigsaw/downloads Download PDF @ http://adf.ly/CtxYO More Tutorials @ http://adf.ly/CX...

Thursday, October 18, 2012

"file viewer" remote File upload vulnerability

"file viewer" is just another remote file upload vulnerability, it allows you to upload .html .txt and .jpg files,  for shell uploading try .php.jpg or php shell uploading with extention changing [ Tamper data or Live Http headers] Dork : "file viewer for uploader" and "File viewer for Uploader (c) 2003 by Dirk Paehl"Goto Google or any other search engine and type the dork ""file viewer for uploader" now select site from there,...

Monday, August 27, 2012

Hacking into another persons computer

Hai...This article explains the method used for hacking into another persons computer remotely using command prompt in your network i.e network computer hacking,I have also posted another article regarding computer hacking using Rats,which has a greater sucess rate than this method and written with relavent screen shots.Step 1 First of all,get a good IP scanner angry ip scanner is a good one you can get it here:Angry ip scanner DownloadStep 2Now click on start and then goto run and then type there "CMD" and press ok This is what...

Tuesday, August 21, 2012

How to Make a Trojan,Keyloggers,Virus Undetectable by Antivirus Software-Hex Editing

click hear to get the clear version  because some time you cant read the post below because of the unwanted characters  I've been writing a lot about keylogging on this blog. Now as you know, most of the keyloggers are detected by anti-virus softwares, so what you really want is a FUD Keylogger (Fully Undetactable). That means no anti-virus software will alrert the victim saying its a virus. There are very...

Monday, August 20, 2012

How to: Unlock Memory Card Passwords

How to: Unlock Memory Card Password If one day suddenly you restore your phone , after that you find that your memory card is password protected and shit ! You don’t know the password and have some important files & data in that, what will you do ? Don’t worry, I will show you the way by which you can unlock memory card’s password. If that trick will not work then sorry you can’t recover your memory card’s password &...

"Gauss" Malware a Cyber-Espionage + Banking Trojan out in the wild

A new malware, “Gauss” targeting users in the Middle-East has been discovered. Initiated by the International Telecommunication Union (ITU) following the discovery of Flame, Kaspersky Lab experts have discovered this new cyber threat which is a complex, nation-state sponsored cyber-espionage toolkit designed to steal sensitive data with a specific focus on browser password, online banking account credentials, cookies, and specific configurations of infected machines. ITU-IMPACT’s partner, Kaspersky Lab, have developed the removal tool...

Hack I.P address of your friends computer with an easy to use service provided by SpyPig.com

Hack I.P address of your friends computer with an easy to use service provided by SpyPig.com by The Hackers Paradise on Friday, March 18, 2011 at 10:17pm · 1)Go to SpyPig.com 2)Enter your email address. [address which is used to notify you when your message has been read] 3)Enter your message title.[for eg. your friends name] 3)Select your tracking image. You can select the white background picture so that your friends doesn’t know...

Saturday, August 18, 2012

The VERY Black Hat AdSense with Google Trends Method

The VERY Black Hat AdSense with Google Trends Method A couple of notes before we get to the Full Effect: The highlighted parts don’t work properly in WP. If you cannot figure out the template on your own then just head over HERE and get the PDF version of this blog post which will lay out the site’s .php in color coded format to help you with editing if you are new to web design. Be careful! I recommend not doing more than $20-$50 a day with...