Hack - hacking tools, tutorials and more
hack, hackers, hacking, hack tuts, sql injection, google dork, l33t, ubers, echelon, bot, password hack
Saturday, August 25, 2012
Windows Phone Hack: IMDb Mobile v0.8.2
Windows Phone Hack: IMDb Mobile v0.8.2: Unlike other IMDb apps which parse IMDb pages for information, this app uses the iPhone IMDb API to retrieve information from IMDb.com and ...
Tuesday, February 7, 2012
Working SENuke X
CRACKED SENUKE BLACK HAT
- Download and install SEnuke X (latest):
Code:
http://www.senuke.com/SENukeUpdate/Installer/setup.exe
- Download and run Loader Installer :
Code:
http://senukebiz.s3.amazonaws.com/senukex/loader_install.exe - If everything is OK, run SEnuke X as usual (from desktop) and login with:
- Email: any@any.com
- Password: 6b6fe7d54246452
- if that fails use this one : 796a561f86eef9f
Mini FAQ
"Cant start senuke" error: loader.exe installed to wrong directory. Must be placed near SEnuke.exe
Cracking porn passwords
1. Download all tools:
1. Athena II - Download Here!
2. Raptor 3 - Download Here!
3. Proxy Finder - Download Here!
4. Proxy Checker - Download Here!
5. CForce - Download Here!
2. Raptor 3 - Download Here!
3. Proxy Finder - Download Here!
4. Proxy Checker - Download Here!
5. CForce - Download Here!
2. Athena II:
1. Run Athena II.
2. Setup Athena II.
3. Click Start.
2. Setup Athena II.
3. Click Start.
4. Wait about 5~10 min. and click stop…
5. Copy Logins.txt from Athena II folder to the desktop.
5. Copy Logins.txt from Athena II folder to the desktop.
3. Raptor3
1. Open Raptor 3.
2. Go to File > Open and in the dialog open logins.txt from desktop.
3. In Tools click “Remove Duplicats”.
4. Go to Filet in Tools > Click on “Custom Filters” tab.
5. Right click in empty spot > click “Add”.
6. In filter name type “bangbros” > Action: Keep If > Filter Subject: Line > Condition: Has > Amount: Any > Filter: What: bangbros > Click Ok.
7 .Check the new made filter and click filter buton under empty spot.
8. In Generators select “Pass Leecher” > Right click at emty spot > click on “Add” > Select logins.txt from decktop > click “Leech” buton under emty spot.
9. Now go to File > Save All > Save the file as Combo.txt on desktop.
2. Go to File > Open and in the dialog open logins.txt from desktop.
3. In Tools click “Remove Duplicats”.
4. Go to Filet in Tools > Click on “Custom Filters” tab.
5. Right click in empty spot > click “Add”.
6. In filter name type “bangbros” > Action: Keep If > Filter Subject: Line > Condition: Has > Amount: Any > Filter: What: bangbros > Click Ok.
7 .Check the new made filter and click filter buton under empty spot.
8. In Generators select “Pass Leecher” > Right click at emty spot > click on “Add” > Select logins.txt from decktop > click “Leech” buton under emty spot.
9. Now go to File > Save All > Save the file as Combo.txt on desktop.
4. Proxy Finder
1. Open ProxyFinder.
2. Click “Find” button.
3. When its done click “Save” button and save as Proxy.txt on desktop.
2. Click “Find” button.
3. When its done click “Save” button and save as Proxy.txt on desktop.
5. Proxy Checker
1. Open Proxy Checker.
2. On Proxy field click “Load” button and load Proxy.txt from desktop.
3. Click “Start” button.
4. When its done click “Save” button on Responding Proxys field and save as CheckedProxys.txt on desktop.
2. On Proxy field click “Load” button and load Proxy.txt from desktop.
3. Click “Start” button.
4. When its done click “Save” button on Responding Proxys field and save as CheckedProxys.txt on desktop.
6. CForce
1. Open CForce.
2. Click on “Auto” tab.
3. In url field type the members login url from the site that you want to hack.
4. At “Proxy-List” field click on “Load” button and load CheckedProxys.txt from desktop.
5. At “Combo-List” field click on “Load” button and load Combo.txt from desktop.
6. Click start and wait till its done.
7. When its done you will have working logins here.
2. Click on “Auto” tab.
3. In url field type the members login url from the site that you want to hack.
4. At “Proxy-List” field click on “Load” button and load CheckedProxys.txt from desktop.
5. At “Combo-List” field click on “Load” button and load Combo.txt from desktop.
6. Click start and wait till its done.
7. When its done you will have working logins here.
Monday, February 6, 2012
Premium Account Daily Update
WUPLOAD PREMIUM ACCOUNT 06/02/2012
UPLOADED PREMIUM ACCOUNT 06/02/2012
FILEFACTORY PREMIUM ACCOUNT 06/02/2012
MEGASHARE PREMIUM ACCOUNT 06/02/2012
TurBobit Premium Account 06/02/2012
Megashare Premium Account 06/02/2012
UPLOADING PREMIUM ACCOUNT 06/02/2012
DOWNLOAD LINK Read more
How To Bypass, Block, Remove and Disable CPALead Surveys
Find that filling CPALead Survey a little bit frustrating? Here’s a simple method for CPALead Bypass.Blocking CPALead.com is easy. All you need is Mozilla Firefox and a simple plugin called QuickJava.Some websites offer CPALead Scripts that bypass the surveys but cause the site to lose functionality such as Javascripts. To preserve the functions, you can remove CPALead surveys using QuickJava fast and hassle-free
All you have to do is to follow the instructions to get rid of CPALead or skip the surveys.
1. Use Mozilla Firefox with Quick Java.
After you have installed the add-on, a small statusbar will appear at the bottom of Firefox.
Js – Javascript | J – Java | F – Flash | SL – Silverlight | I – Images | CSS
2. Go to the website which you want to disable CPALead.
Wait for the website to fully load before you proceed with the following steps. This is important to maintain the functionality of the site such as Javascripts.
3. Follow these steps very carefully (according to sequence)
Click Js (to Disable Javascript), then click CSS (to disable PageStyle or NoStyle) then click Js again (to Enable Javascript)
The purpose of Disabling Javascript in the first step is to stop CPALead from redirecting you their website.
Disabling CSS will unlock CPALead’s box from blocking the website you are viewing.
Reenable Javascript to maintain the original functionality of the website.
Hcon Security Testing Framework v0.4 [Fire Base] - codename 'Freedom'
What it can do ? :
Most of the part of HconSTF is semi-automated but you still need your brain to work it out.
It can be use in all kind of security testing stages, it has tools for conducting tasks like,
1. Information gathering
2. Enumeration & Reconnaissance
3. Vulnerability assessment
4. Exploitation
5. Privilege escalation
6. Reporting
also can be used for web debugging
Is it useful for me ? :
HconSTF is very flexible and good enough for any
1. IT Security Professionals
2. Web Developers
3. IT students
or any one interested in IT security
Some Highlight Features :
Categorized and comprehensive toolset
Contains hundreds of tools and features and script for different tasks like SQLi,XSS,Dorks,OSINT to name a few
HconSTF webUI with online tools (same as the Aqua base version of HconSTF)
Each and every option is configured for penetration testing and Vulnerability assessments
Specially configured and enhanced for gaining easy & solid anonymity
Works for web app testing assessments specially for owasp top 10
Easy to use & collaborative Operating System like interface
Light on Hardware Resources
Portable - no need to install, can work from any USB storage device
Multi-Language support (feature in heavy development translators needed)
Works side-by-side with your normal web browser without any conflict issues
Works on both architectures x86 & x64 on windows XP, Vista, 7 (works with ubuntu linux using wine)
Netbook compatible - User interface is designed for using framework on small screen sizes
Free & Open source and always will be
Categories of tools :
Information gathering / Analysis
Editors / Debuggers
Exploitation / Auditing
Anonymity
Passwords
Cryptography
Database
Scripting / Automation
Network Utilities
Reporting
download: Click to start download
Most of the part of HconSTF is semi-automated but you still need your brain to work it out.
It can be use in all kind of security testing stages, it has tools for conducting tasks like,
1. Information gathering
2. Enumeration & Reconnaissance
3. Vulnerability assessment
4. Exploitation
5. Privilege escalation
6. Reporting
also can be used for web debugging
Is it useful for me ? :
HconSTF is very flexible and good enough for any
1. IT Security Professionals
2. Web Developers
3. IT students
or any one interested in IT security
Some Highlight Features :
Categorized and comprehensive toolset
Contains hundreds of tools and features and script for different tasks like SQLi,XSS,Dorks,OSINT to name a few
HconSTF webUI with online tools (same as the Aqua base version of HconSTF)
Each and every option is configured for penetration testing and Vulnerability assessments
Specially configured and enhanced for gaining easy & solid anonymity
Works for web app testing assessments specially for owasp top 10
Easy to use & collaborative Operating System like interface
Light on Hardware Resources
Portable - no need to install, can work from any USB storage device
Multi-Language support (feature in heavy development translators needed)
Works side-by-side with your normal web browser without any conflict issues
Works on both architectures x86 & x64 on windows XP, Vista, 7 (works with ubuntu linux using wine)
Netbook compatible - User interface is designed for using framework on small screen sizes
Free & Open source and always will be
Categories of tools :
Information gathering / Analysis
Editors / Debuggers
Exploitation / Auditing
Anonymity
Passwords
Cryptography
Database
Scripting / Automation
Network Utilities
Reporting
download: Click to start download
Web Application Analysis
Contents
1 Backdoors
2 CMS Scanners
3 Database Assessment
3.1 MS-SQL
3.2 MYSQL
3.3 Oracle
3.4 SQL Injection Frameworks
4 Fingerprinting
5 Fuzzers
6 Proxies
7 Scanners
8 Security Training Environments and Programs
9 Testing Frameworks
10 Web Browser Assessment
11 Web Browser Plugins
Backdoors
XSS Shell
CMS Scanners
CMS Explorer
OWASP Joomla Vulnerability Scanner
Plecost-wordpress-fingerprinter
WPScan
Database Assessment
MS-SQL
DBPwAudit
Metacoretex
Mssqlfp
MSSQLScan
multiinjector
Pblind
SA Exploiter
SQLbrute
SQLiX
SQLMap
SQL Ninja
MYSQL
DBPwAudit
Metacoretex
MYSQLAudit
MySploit
Pblind
SQLCheck
SQLData
SQLiX
SQLMap
Sqlsus
UDF
Oracle
DBPwAudit
Metacoretex
Opquery
Opwg
Oscanner
Ose
Otnsctl
Pblind
SQLbrute
SQLiX
SQLMap
SQL Injection Frameworks
BSQL Hacker
Fingerprinting
Wafp
Fuzzers
FuzzDb
OWASP ZAP
PowerFuzzer
Wfuzz
Proxies
Burpsuite
Fiddler
OWASP ZAP
Paros Proxy
ProxyStrike
Ratproxy
Webscarab
Scanners
CSRFTester
Curl
DFF Scanner
DirBuster
Grabber
Grendel Scan
Httprint
Jmeter
Lbd
List Urls
Mini Mysqlat0r
Netsparker Community Edition
Nikto
OpenAcunetix
OWASP ZAP
SecuBat
Skipfish
SoapUI
Swfintruder
W3AF
Wapiti
WebRaider
Webshag
WMAT
x5s
Xsss
Yokoso!
Security Training Environments and Programs
DVWA
Jarlsberg
Web Security Dojo
Testing Frameworks
Bizploit
Sahi
Websecurify
Web Browser Assessment
Beef
Browser Fuzzer 3 (bf3)
Browser Rider
Web Browser Plugins
Groundspeed
X06D
Contents
1 Backdoors
2 CMS Scanners
3 Database Assessment
3.1 MS-SQL
3.2 MYSQL
3.3 Oracle
3.4 SQL Injection Frameworks
4 Fingerprinting
5 Fuzzers
6 Proxies
7 Scanners
8 Security Training Environments and Programs
9 Testing Frameworks
10 Web Browser Assessment
11 Web Browser Plugins
Backdoors
XSS Shell
CMS Scanners
CMS Explorer
OWASP Joomla Vulnerability Scanner
Plecost-wordpress-fingerprinter
WPScan
Database Assessment
MS-SQL
DBPwAudit
Metacoretex
Mssqlfp
MSSQLScan
multiinjector
Pblind
SA Exploiter
SQLbrute
SQLiX
SQLMap
SQL Ninja
MYSQL
DBPwAudit
Metacoretex
MYSQLAudit
MySploit
Pblind
SQLCheck
SQLData
SQLiX
SQLMap
Sqlsus
UDF
Oracle
DBPwAudit
Metacoretex
Opquery
Opwg
Oscanner
Ose
Otnsctl
Pblind
SQLbrute
SQLiX
SQLMap
SQL Injection Frameworks
BSQL Hacker
Fingerprinting
Wafp
Fuzzers
FuzzDb
OWASP ZAP
PowerFuzzer
Wfuzz
Proxies
Burpsuite
Fiddler
OWASP ZAP
Paros Proxy
ProxyStrike
Ratproxy
Webscarab
Scanners
CSRFTester
Curl
DFF Scanner
DirBuster
Grabber
Grendel Scan
Httprint
Jmeter
Lbd
List Urls
Mini Mysqlat0r
Netsparker Community Edition
Nikto
OpenAcunetix
OWASP ZAP
SecuBat
Skipfish
SoapUI
Swfintruder
W3AF
Wapiti
WebRaider
Webshag
WMAT
x5s
Xsss
Yokoso!
Security Training Environments and Programs
DVWA
Jarlsberg
Web Security Dojo
Testing Frameworks
Bizploit
Sahi
Websecurify
Web Browser Assessment
Beef
Browser Fuzzer 3 (bf3)
Browser Rider
Web Browser Plugins
Groundspeed
X06D
Subscribe to:
Posts (Atom)