John the Ripper is a fast password cracker, currently available for many flavors of Unix, Windows, DOS, BeOS, and OpenVMS. Its primary purpose is to detect weak Unix passwords. It supports several crypt(3) password hash types commonly found on Unix systems, as well as Windows LM hashes. On top of this, many other hash types are added with contributed patches, and some are... Read More »
Tuesday, December 27, 2011
HACK : Download F.B.I RAT with Full source coding
F.B.I RAT (Full Backdoor Intergration) V0.1. Supports xp/Vista/Windows 7, all features have been tested on these OS's including injection, but there have been some limitations on the sniffer. ... Read More »
GSM Mobile hacking : Sim cloning
Let's talk about the fun stuff. The first trick I will discuss is an activity that is becoming quite prevalant, SIM cloning. If you have paid attention to any cell phone related tutorials in the past, then you may remember cloning being made popular by certain public figures. Well, even with GSM this trick still holds relevant. How could such a flaw exist... Read More »
SQL Injection : False SQL Injection / Advance Blind SQL Injection
This is a brief whitepaper called False SQL Injection and Advanced Blind SQL Injection. This document is written for publicizing of new SQL injection method about detour some web firewall or some security solution. In order to read this document, you have to understand basic MySQL principles. I classified the term "SQL Injection" as 2 meanings. The first is a general SQL Injection,... Read More »
Windows Media Player 11.0.5721.5262 Denial Of Service
Microsoft Windows Media Player version 11.0.5721.5262 remote denial of service exploit. ... Read More »
HOW TO : Android updates with daster menus & bulk uploading
Android: Dropbox just rolled out an update for their Android mobile client; grab it today to enjoy a slew of new features including faster menus, bulk upload, and more. ... Read More »
How to hack keylogger/RAT's password?
Keylogger's and RAT's nowadays are everybody's problem across the internet. Hackers use keyloggers to hack the email passwords of the victim which they receive in the form of emails or text files on their respective FTP servers. They spread their keyloggers with the help of cracks, keygen's or patches of popular software's or simply through hack tools. So friends, today i will teach... Read More »
Hack windows admin/administrator password
This is one of the best method to Hack Windows XP Administrator Password. For hacking admin you must have log in as guest or limited account. This methodod hacking sdmin is very easy. You don't need any software or live cd. All hacking is done manual. To hack XP admin password follow these steps. Please backup your files which we are going to... Read More »
Monday, December 26, 2011
PHP Shell - mass mailer, ddoser, connect-back shell, bind shell & more
Ani-Shell is a simple PHP shell with some unique features like Mass Mailer , A simple Web-Server Fuzzer , DDoser, Back Connect , Bind Shell etc etc ! This shell has immense capabilities and have been written with some coding standards in mind for better editing and customization. Customization 1. Email Trace back is set to Off as default and emails will not... Read More »
Linux vs Windows
As anyone who is knowledgeable about computer systems might know, there has long been a war between the operating systems of Linux and Windows. What, precisely does each operating system have, which is better suited for the average user’s needs ? To answer that, the pros and cons of the differing systems will be examined. ... Read More »
How to protect facebook timeline?
Facebook Timeline brings great new set of features to give totally a new facebook experience. The recent Facebook Christmas Theme spam gone viral couple of days ago and many profile got infected. It is important to protect your facebook timeline against such spam attacks, as you will stand as the origin to spread the same spam message to your friends profile. You should... Read More »
Create Android apps free for blog/website
Android is one of the fast growing mobile platform in the existing ones. It is because of the interactive user interface and applications available for android. Officially more than one million apps are available for android and each one of them have a unique functionality. If you have your own android application for your blog or website surely it will generate a good... Read More »
Saturday, December 24, 2011
Auto rooting script : Hack PC with script
This is the auto-rooting script that is written for Linux, SunOS, Mac OS X, and FreeBSD. ... Read More »
Web Backdoor Cookie
WeBaCoo (Web Backdoor Cookie) is a web backdoor script-kit, aiming to provide a stealth terminal-like connection over HTTP between client and web server. It is a post exploitation tool capable to maintain access to a compromised web server. WeBaCoo was designed to operate under the radar of modern up-to-dated AV, NIDS, IPS, Network Firewalls and Application Firewalls, proving a stealth mechanism to execute... Read More »
Friday, December 23, 2011
How to Send Password Protected Email?
Some people send themselves important work documents by email so they can work on them at home. But most email accounts can be accessed from any computer that can connect to the Internet. With this wide access, security is a concern, especially when email is used for business. A password can protect such a business document sent in an email. ... Read More »
How to send self-destructing messages
Many times there is the need of sending a written data to a person but you do not want him/her to keep that data for further reading or as a record. Today i am going to tell you how can you send the self-destructing messages. After reading the message, it will not be availabe again for reading. ... Read More »
How to get passwords stored by popular Windows applications?
This utility scans the passwords stored by popular Windows applications (Microsoft Outlook, Internet Explorer, Mozilla Firefox, and more...) and displays security information about all these passwords. The security information of every stored password includes the total number of characters, number of numeric characters, number of lowercase/uppercase characters, number of repeating characters, and password strength. You can use this tool to determine whether the... Read More »
Create fake mail sender.
Sending fake email or email spoofing is really easy as there are many websites available online for this. You can get hundreds of results by searching in Google. But you can also create your own fake email sender website to send fake emails. ... Read More »
How to transfer data from your computer to your iPhone?
One of the great things about Android is its fantastic integration with Google services. One of the handiest things is the ability to instantly push links, directions, and phone numbers directly from your computer to your phone. For a while now, I’ve been looking for a similar solution for my phone, and I finally found a great one in Pastefire. Read on through... Read More »
Hack email account/password using cookies.
Hi friends,Today i will show you the practical implementation of session hijacking that how can we take over others sessions and hack his email accounts and other website passwords. In this tutorial of hacking email accounts using session cookies, i will explain you with the help of yahoo account. I will tell you how to hack yahoo account using session cookies. What are... Read More »
How to Access Any Website Or Forum Without Registering?
All websites and forums will block unregistered users, but they won’t block Google Bot. What we will do is to switch our User Agent to that of Google Bot and freely browse any website or forum without registering. ... Read More »
Hack facebook account password via internet (remotely).
Hello friends today i will explain you how to hack the Facebook password or accounts remotely using keylogger. Its a 100% working hack and you can easily hack anyone's Facebook account or password using this hack. In this tutorial i will explain you how to hack Facebook and other passwords of any user using 100% FUD keylogger. The keylogger in this tutorial... Read More »
Dangers of facebook...
Facebook claims that it has 400 million users. But are they well-protected from prying eyes, scammers, and unwanted marketers? Not according to Joan Goodchild, senior editor of CSO (Chief Security Officer) Online. She says your privacy may be at far greater risk of being violated than you know, when you log onto the social-networking site, due to security gaffes or marketing efforts... Read More »
SQL Injection : Updated ;)
If you're looking for string injections, or WAF bypassing please look this post. Its updated :) ... Read More »
How to hack
Hacking can be difficult and there are many different ways to hack and many different exploits to use. Hacking is neither defined nor limited by exploitation or exploration. Hacking into someone else's system may be illegal, so don't do it unless you are sure you have permission from the owner of the system you are trying to hack or you are sure it's... Read More »
Wednesday, December 21, 2011
'PCTipsbyAnu' on mobile... :)
Download our mobile apps for Symbian, Android, iPhone, iPad, Smartphone and stay in touch every time..... ... Read More »
Monday, December 19, 2011
How to protect facebook account from hackers?
Today facebook is the main target of hackers n they will post some XXX photo/video/link on your wall or send them to your friends from your account. So, here is a way to protect your account from hackers ... ... Read More »
How to Protect Your Facebook Profile from Spam Links?
Hello Friends. Today I am going write something about Protecting your Facebook Profile From Nasty Spam Links. Currently maximum of People using Facebook. Starting from a Standard 3 Student to 80 Yrs OLD Person everybody using Facebook. Slowly Slowly people are getting addicted of using Facebook. They are spending Hours and Hours over Facebook like Adding Friends, Commenting Friends, Reading News Streams... Read More »