Quantcast
Channel: HACKINGHEART : HACKING DEMYSTIFIED » Uncategorized
Browsing all 10 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

Truth About Facebook – CIA, U.S. government – Everything Related !

                                                                             Facebook –  CIA – Connection The Truth about who owns facebook. In todays world of advanced modern technology, there are...

View Article



Image may be NSFW.
Clik here to view.

The man who changed the world: Apple founder Steve Jobs, dies weeks after...

  Tributes, led by President Barack Obama, began pouring in within minutes of the company confirming the death of the mastermind behind the iPhone, iPad and the iPod at the age of 56. He had battled...

View Article

Image may be NSFW.
Clik here to view.

Don’t get hacked on mobile

In July 2011 headline reports featured mobile phone hacking as a common practice at News of the World – an event which eventually led to the collapse of the paper. Reporters at the media outlet...

View Article

Image may be NSFW.
Clik here to view.

World’s famous college-dropout techies

Friends I am sorry as i couldn’t post for long time…I was very busy on my hacking world… Today i am posting something very different  and thought provoking for all of us… Its about World’s famous...

View Article

Image may be NSFW.
Clik here to view.

How To :: Close System Ports

Today we will discuss how to close system ports. It will run in windows Environment only. all you need to do is, copy following script and paste it into notepad file set ss =...

View Article


Image may be NSFW.
Clik here to view.

Domain Name Hijacking

When we buy a domain name, we also get a control panel for full control on this domain name. From this control panel we point our domain to the web server where our files are actually host.For ex- I...

View Article

Image may be NSFW.
Clik here to view.

Web Penetration testing using Websecurify

Websecurify is a powerful web application penetration testing platform. It is designed to provide the best combination of automatic and manual vulnerability testing technologies. This tool is sponsored...

View Article

Image may be NSFW.
Clik here to view.

Penetration Tools List

Many of my readers ask me about penetration testing/hacking tool list. So i have listed many of them here. you can search them in Google  and download them. Phase 1 Passive Reconnaissance Google (1st...

View Article


Image may be NSFW.
Clik here to view.

Best SQL Injection Tool

Pangolin Pangolin is a penetration testing, SQL Injection test tool on database security. It finds SQL Injection vulnerabitlities.Its goal is to detect and take advantage of SQL injection...

View Article


Image may be NSFW.
Clik here to view.

find processes hidden by rootkits

Unhide Unhide is a forensic tool to find processes and TCP/UDP ports hidden by rootkits / LKMs or by another hiding technique. To detect hidden process it implements six main techniques : Compare /proc...

View Article
Browsing all 10 articles
Browse latest View live




Latest Images