Truth About Facebook – CIA, U.S. government – Everything Related !
Facebook – CIA – Connection The Truth about who owns facebook. In todays world of advanced modern technology, there are...
View ArticleThe man who changed the world: Apple founder Steve Jobs, dies weeks after...
Tributes, led by President Barack Obama, began pouring in within minutes of the company confirming the death of the mastermind behind the iPhone, iPad and the iPod at the age of 56. He had battled...
View ArticleDon’t get hacked on mobile
In July 2011 headline reports featured mobile phone hacking as a common practice at News of the World – an event which eventually led to the collapse of the paper. Reporters at the media outlet...
View ArticleWorld’s famous college-dropout techies
Friends I am sorry as i couldn’t post for long time…I was very busy on my hacking world… Today i am posting something very different and thought provoking for all of us… Its about World’s famous...
View ArticleHow To :: Close System Ports
Today we will discuss how to close system ports. It will run in windows Environment only. all you need to do is, copy following script and paste it into notepad file set ss =...
View ArticleDomain Name Hijacking
When we buy a domain name, we also get a control panel for full control on this domain name. From this control panel we point our domain to the web server where our files are actually host.For ex- I...
View ArticleWeb Penetration testing using Websecurify
Websecurify is a powerful web application penetration testing platform. It is designed to provide the best combination of automatic and manual vulnerability testing technologies. This tool is sponsored...
View ArticlePenetration Tools List
Many of my readers ask me about penetration testing/hacking tool list. So i have listed many of them here. you can search them in Google and download them. Phase 1 Passive Reconnaissance Google (1st...
View ArticleBest SQL Injection Tool
Pangolin Pangolin is a penetration testing, SQL Injection test tool on database security. It finds SQL Injection vulnerabitlities.Its goal is to detect and take advantage of SQL injection...
View Articlefind processes hidden by rootkits
Unhide Unhide is a forensic tool to find processes and TCP/UDP ports hidden by rootkits / LKMs or by another hiding technique. To detect hidden process it implements six main techniques : Compare /proc...
View Article
More Pages to Explore .....