Friday, October 31, 2014
http://worldbesthackers.blogspot.in/2014/09/how-to-hack-gmail-using-phishing.html
you can make this Ninja Mask
NO SEWING REQUIRED.
@@@ FIND USERNAMES + PASSWORDS With USING GOOGLE.COM
Online dating-ul
Make Jello Shots!
Start at:
Carving a Pumpkin has never been easier!
Published on Oct 31, 2014
https://www.youtube.com/watch?v=hKROVKDIuDo فەرموو ئەمەش پرۆگرامەكە كە كێشەی 2MB بایتە زۆر سووكە http://www.mediafire.com/downl…/smb6b9t7kevk8uq/WFHSetup.exe بۆ دڵنیا بوونت لە پاكی پرۆگرام لێرە خۆت بیپشكنە https://www.virustotal.com/en/ یان لێرە دایبگرە سایتی سەرەكی پرۆگرامەكە http://www.wisecleaner.com/wisefolderhider.html ئەم بابەتە بۆ هاورێكانیشت بنێرە بە مەبەستی سوودی گشتی ئامادەكردنی :محمد باڵەك https://www.youtube.com/watch?v=hKROVKDIuDo وا ل
FIND USERNAMES + PASSWORDS With USING GOOGLE.COM
(29) Pure Hacking - @@@ FIND USERNAMES + PASSWORDS With USING...
@@@ FIND USERNAMES + PASSWORDS With USING GOOGLE.COM $ Remove any space from any Dorks...!! Method 1: Facebook We will be using a google dork to find usernames and passwords of many accounts including Facebook! The Dork: intext:charset_test=email=default_persistent= Enter that into Google, and you will be presented with several sites that have username and passwords lists! Method 2: WordPress! This will look for WordPress backup files Which do contain the passwords, and all data for the site! The Dork: filetype:sql inurl:wp-conten t/backup-* Method 3: WWWBoard! This will look for the user and passwords of WWWBoard users The Dork: inurl:/ wwwboard/ passwd.txt Method 4: FrontPage! This will find all users and passwords, similar to above. The Dork: ext:pwd inurl:(service | authors | administrators | users)"# -FrontPage-" Method 5: Symfony This finds database information and logins The Dork: inurl:config/ databases.yml -trac -trunk -"Google Code"-source -repository Method 6: TeamSpeak This will search for the server.dbs file (A Sqlite database file With the SuperAdmin username and password) The Dork: server-dbs"intitle:index of" Method 7: TeamSpeak 2 This will find the log file which has the Super Admin user and pass in the Top 100 lines. Look for"superadmin account info:" The Dork: "inurl:Teamspea k2_RC2/ server.log" Method 8: Get Admin pass Simple dork which looks for all types of admin info The Dork: "admin account info"filetype:log Method 9: Private keys This will find any .pem files which contain private keys. The Dork: filetype:pem pem intext:private And the Ultimate one, the regular directory full of passwords. Method 10: The Dir of Passwords! Simple one! The Dork: intitle:"Index of..etc"passwd
Encryption Server Ngerat Klein # compiler skips Proactive Defense 2015 - YouTube
Start at: Published on Oct 31, 2014 Hello: - Visual Basic download link from his official Download Html: - Http://www.gulfup.com/?MnYypv ---------------------------------- ------ ---- download link Asempela SMART program: - -mn Aldyev Point is not Download Confuser program of Rfie .. Http://ar.rghost.net/58818854 -------------------------------- ----- our link on Facebook encryption My facebook ABoSoso Https://www.facebook.com/Abososo ---------------------------------- ------ ---- to Alqaa and please subscribe to Belknah learned about each new
What is a penetration test? What is penetration testing? Penetration testing, often called “pentesting”,“pen testing”, or “security testing”, is the practice of attacking your own or your clients’ IT systems in the same way a hacker would to identify security holes. Of course, you do this without actually harming the network. The person carrying out a penetration test is called a penetration tester or pentester. Let’s make one thing crystal clear: Penetration testing requires that you get permission from the person who owns the system. Otherwise, you would be hacking the system, which is illegal in most countries – and trust me, you don’t look good in an orange jump suit. In other words: The difference between penetration testing and hacking is whether you have the system owner’s permission. If you want to do a penetration test on someone else's system, we highly recommend that you get written permission. In this case, asking first is definitely better than apologizing later! You can become a penetration tester at home by testing your own server and later make a career out of it. At Rapid7, we have a team of professionals that pentest government and enterprise IT systems for a living. And let me tell you, they enjoy their job!
(2) wikiHow - wikiHow added a new photo.
Happy Halloween!!! For the adult Trick-or-Treaters... Make Vodka Gummy Bears. http://www.wikihow.com/Make-Vodka-Gummy-Bears
Hello Friends!
(12) Google as A Hacking Tool Global search engine... - Cybercells tricks
Google as A Hacking Tool Global search engine giant Google is priceless. We use it on a more than daily basis for all our search needs. Whether you're looking for that fancy word or the location of a good restaurant, you'll get everything with Google search and more. Enough on the good part. Did you know Google has a dark side too? Did you know Google can be used to gain access to confidential information or download free music? Here's how... 1.Hacking Security Cameras! You might have noticed many security cameras monitoring places like parking lots, college campus, road traffic etc (and yes, some of them work!). Did you know you can use Google to hack into these cameras to view images captured by these cameras in real time. How do you do it? Well simply open the Google search box and type in the following query: inurl:”viewerframe?mode=motion” You will get a search result that will give you access to live cameras with full controls (move the camera in all the four directions, perform zoom in and zoom out). The above mentioned query usually gives access to cameras with less refresh rate. In case you're looking for faster refresh rates: intitle:”Live View / – AXIS” 2. Hacking Personal and Confidential Documents! You can access an email repository containing personal and confidential documents (CVs for instance) using Google. Simply open the Google search box and type in the following query: intitle:”curriculum vitae” “phone * * *” “address *” “e-mail” To access a list of excel documents which contains contact details including email addresses of people: filetype:xls inurl:”email.xls” To access documents potentially containing information on bank accounts, financial summaries and credit card numbers: intitle:index.of finances.xls 3. Gaining Access to Free Stuffs! If you're looking to download free music, simply enter the following query on Google search box and hit enter: “?intitle:index.of?mp3 artist name“ If you're looking to download free ebooks: “?intitle:index.of?pdf book name“ ATTENTION PLZ: Support The Page By Like, Share, Comments! Tnx
Google as A Hacking Tool Global search engine giant Google is priceless. We use it on a more than daily basis for all our search needs. Whether you're looking for that fancy word or the location of a good restaurant, you'll get everything with Google search and more. Enough on the good part. Did you know Google has a dark side too? Did you know Google can be used to gain access to confidential information or download free music? Here's how... 1.Hacking Security Cameras! You might have noticed many security cameras monitoring places like parking lots, college campus, road traffic etc (and yes, some of them work!). Did you know you can use Google to hack into these cameras to view images captured by these cameras in real time. How do you do it? Well simply open the Google search box and type in the following query: inurl:”viewerframe?mode=motion” You will get a search result that will give you access to live cameras with full controls (move the camera in all the four directions, perform zoom in and zoom out). The above mentioned query usually gives access to cameras with less refresh rate. In case you're looking for faster refresh rates: intitle:”Live View / – AXIS” 2. Hacking Personal and Confidential Documents! You can access an email repository containing personal and confidential documents (CVs for instance) using Google. Simply open the Google search box and type in the following query: intitle:”curriculum vitae” “phone * * *” “address *” “e-mail” To access a list of excel documents which contains contact details including email addresses of people: filetype:xls inurl:”email.xls” To access documents potentially containing information on bank accounts, financial summaries and credit card numbers: intitle:index.of finances.xls 3. Gaining Access to Free Stuffs! If you're looking to download free music, simply enter the following query on Google search box and hit enter: “?intitle:index.of?mp3 artist name“ If you're looking to download free ebooks: “?intitle:index.of?pdf book name“ ATTENTION PLZ: Support The Page By Like, Share, Comments! Tnx
(17) new magic code @*[223317557774374:] remove * and... - ALL Tips And Tricks by ADNAN
new magic code @*[223317557774374:] remove * and cmmnt and u will see this 。 ☆ 。★ 。 ☆ 。★。 ★。 ☆ 。 ☆。 ☆ ★。。 ☆ 。★ 。 ☆ 。★。 ★。 ☆ 。 ☆。 ☆ ★。。 ☆ 。★ 。 ☆ 。★。 ★。 ☆ 。 ☆。 ☆ ★。。 ☆ 。★ 。 ☆ 。★。 ★。 ☆ 。 ☆。 ☆ ★。。 ☆ 。★ 。 ☆ 。★。 ★。 ☆ 。 ☆。 ☆ ★。 and if u want to make it coulrful so before the code write this <fg=bd0007ff*> or <fg=bfd700f0*> without *
(12) Guys recently we explained what is Penetration... - Cybercells tricks
Guys recently we explained what is Penetration Tests. Now we are going to explain Types of Penetration Tests Network services test: This is one of the most common types of penetration tests, and involves finding target systemson the network, searching for openings in their base operating systems and available network services,and then exploiting them remotely. Some of these nelwork service penetration tests take place remotely across the Internet, targeting the organrzation’s perimeter networks. Others are launched locally, from the target’s own business facilities, to assess the security of their internal network or the DMZ from within, seeing what kinds of vulnerabilities an internal user could learn. Client-side test: This kind of penetration test is intended to find vulnerabilities in and exploit client-side software, such as web browsers, media players, document editing programs, etc. Web application test: These penetration tests look for security vulnerabilities in the web-based applications and programs deployed and installed on the target environment. Remote dial-up war dial: These penetration tests look for modems in a target environment, and normally involve password guessing or brute forcing to login to systems connected to discovered modems. Wireless security test: These penetration tests involve discovering a target’s physical environment to find unauthorized wireless access points or authorized wireless access points with security weaknesses. Social engineering test: This type of penetration test involves attempting to make a user into revealing sensitive information such as a password or any other sensitive data. These tests are often conducted over the phone, targeting selected help desks, users or employees, evaluating processes, procedures, and user awareness.
Top free PC programs everyone should have There are millions of free and open source projects available, many of them better than any commercially available product. Below is a short listing of what we think is the best out there, broken down into ten categories. Read and download@:-http://bit.ly/1wk7Hlt
(15) Nokia Mobiles Secret Codes :... - Cybercells tricks
Nokia Mobiles Secret Codes : ************************************ On the main screen type : ******************************** *#06# for checking the IMEI (International Mobile Equipment Identity). *#7780# reset to factory settings. *#67705646# This will clear the LCD display (operator logo). *#0000# To view software version. *#2820# Bluetooth device address. *#746025625# Sim clock allowed status. *#62209526# – Display the MAC address of the WLAN adapter. This is available. *#92702689# – takes you to a secret menu where you may find some of the information below: 1. Displays Serial Number. 2. Displays the Month and Year of Manufacture. 3. Displays the date where the phone was purchased, 4. Displays the date of the last repair – if found (0000) 5. Shows life timer of phone (time passes since last start) *#3370# – Enhanced Full Rate Codec (EFR) activation. Increase signal strength, better signal reception. It also help if u want to use GPRS and the service is not responding or too slow. Phone battery will drain faster though. *#3370* – (EFR) deactivation. Phone will automatically restart. Increase battery life by 30% because phone receives less signal from network. *#4720# – Half Rate Codec activation. *#4720* – Half Rate Codec deactivation. The phone will automatically restart *#7328748263373738# resets security code. Default security code is 12345 *#1471# Last call (Only Vodafone) *#21# Allows you to check the number that “All Calls” are diverted to *#30# Lets you see the private number *#43# Allows you to check the “Call Waiting” status of your phone. *#62# Allows you to check the number that “Divert If Unreachable (no service)” calls are diverted to *#67# Allows you to check the number that “On Busy Calls” are diverted to *#67705646# Removes operator logo on 3310 & 3330 *#73# Reset phone timers and game scores *#746025625# Displays the SIM Clock status, if your phone supports this power saving feature “SIM Clock Stop Allowed”, it means you will get the best standby time possible *#7780# Restore factory settings *#8110# Software version for the nokia 8110 *#92702689# Displays – 1.Serial Number, 2.Date Made, 3.Purchase Date, 4.Date of last repair (0000 for no repairs), 5.Transfer User Data 12345 This is the default security code. Hit Like if it was useful.
Interesting facts about browsers - YouTube
Published on Oct 30, 2014 For private browsing in Google Chrome:- ctrl+shift+n For private browsing in Mozzila Firefox:- ctrl+shift+p
Cracking WPA & WPA2 key with Aircrack-ng on Kali Linux - YouTube
Start at: Published on May 30, 2013 VISIT MY PAGE ON FACEBOOK: http://www.facebook.com/BackTrack.Fan... Cupp WordList Maker Tool On Backtrack 5 R3 http://www.youtube.com/watch?v=U0kAE3... VISIT: http://securitygeeks.net/ TUTORIAL By Cyb3rw0rM CONTACT ME: Cyb3rw0rm@hotmail.com
https://www.youtube.com/user/OfficialOsVirus/videos
HOW TO SNIFF (HACK) STORED PASSWORDS OF ANY COMPUTER THROUGH USB DRIVE
MAKE YOUR OWN PROGRAM TO CREATE WIFI HOSTPOT COMPATIBLE WITH WINDOWS 8
Google dorking
Access the google hacking http://www.exploit-db.com/google-dorks/
HOW TO IDENTIFY FAKE FACEBOOK ACCOUNT...... How can you detect the Fake FB Profile. On these days we are getting so many friend request specially by girls, but there is no way to identify that account is fake or original. So don't worry we are going to tell you simple method to detect fake Facebook account. So go the account you want to check whether it is real or fake. 1.goto the images.google.com and click on camera image 2.when you click on search by image you will get popup 3. Now go to that profile, right click on image and click on copy image URL. 4. Now profile pic URL has copied.. 5. Again go to images.google.com Tab and paste image URL 6. When you enter then you get related images search...Now you can better see that this profile is real or fake. Enjoy the trick..Be aware when you will going to add an beautiful or smart unknown person as your friend. So be checked first.. there are lot of fake profiles are create everyday.This person might be spy on your profile and steal personal information like your photos, etc for their hacking stuffs..So Be Safe Online.. For any queries comment below
http://www.efytimes.com/e1/fullnews.asp?edid=136306
http://www.teamos-hkrg.com/threads/get-thousand-of-facebook-email-and-passwords-using-google-dork.3234/
Android Trick
hack with google

Thursday, October 30, 2014
Facebook Tricks
13 Facebook Tricks That You Must Know! Link : http://goo.gl/siwLPs Ever wanted to know who all deleted you on Facebook, who haven't accepted your friend request or who is online but is sitting invisible? Well, here are 13 super awesome tricks that will help you do it all! See More @ Mess with the best, Die like the rest
Incredible Google
(2) Hacking Trick - ..Incredible Google tricks 1. GO on google and...
..Incredible Google tricks 1. GO on google and type in Google Gothic and click on i m feeling lucky. 2. Go on google and type in poopgle and click i m feeling lucky read more @===>http://bit.ly/1sozI50 3. Go on google and type in Google Loco and click i m feeling lucky 4. Go on google and type in i33t and click i m feeling lucky 5. Type in ewmew fudd and click i m feeling lucky 6. Type in xx-klingon and click I m feeling lucky 7. Type in xx-piglating and click on i m feeling lucky 8. Type in google BSD and click i m feeling lucky 9. Type in Google Linux and click i m feeling lucky 10. Type in google easter egg and click i m feeling lucky 11. Type in Google Cheese and click i m feeling lucky 12. Type in Google Swedish and click i m feeling lucky! 13. Type in 2204355 and click i m feeling lucky (AND THIS ONE IS VERY RARE AND ONE OF THE BEST!) 14. Type in Google chinese and click i m feeling lucky!!! 15. Type in Google latin and click i m feeling lucky 16. Go to"www.google.com"-type in"French Military Victories"and press"I'm feeling lucky" -Look at the question"Did you mean:...". 17. Type in adress bar"http://www.google.com/Easter/feature_easter.html" -Here you can find an hidden game,offered by Google. read more @===>http://bit.ly/1sozI50
programming
(1) -لو حبيت أتعلم لغة برمجة بأي وحدة أبدا ؟؟ طبعاً... - قوآت الدعس الفلسطينية
If endowed with any programming language learning unit start?? Of course the question asking some of the same kthier webihatar answer wollhin the Gu is. Answer betatmd on your specialty or your passions, or learn of any objective, for example if the duck learn programming language for designing Web pages and sites, I recommend you my brother to learn the first language and the easiest and best known. HTML and then learn the CSS is. And would learn Ashan designed programmes, advise him learn giant languages. Language (C) and c++ and then learns to start designing programmes in visual bisc from microsoft.. Though the habait learn Android apps and mobile design advise you to learn the language of java script, a language difficult Shui webdha lighten the brain.. Every thing was perfect for. There are several sites to learn programming languages such as codecademy.com and advise him with his tightened, it has rolled out a professional it:) # b a pen in.
@@@ AVOID FRIEND REQUEST BLOCK ...!!! We usually send friend requests and if it's not accepted it is kept in pending. If there are lots of pending requests it may lead to block. So this is a simple way to get those requests cancelled and protect your account from being blocked. Follow below steps :- 1. Go to account settings. 2. Select `download a copy` option. 3. Choose `expanded archive` from the next page opened and enter your password and click continue. 4. Select `start my archive`. 5. After a few hours you'll get the download link in your email. 5. Download the file `facebook` and unzip it. 6. Open the folder html and then `friend_requests.html`. 7. You can see the list of your friend requests and pending lists. Now goto their accounts and click`cancel request. That's all You are done now. Your account is safe. $ Subscribe to Admin Hiren Bhuva Like & Share Hacking by HIREN
Halloween inspiration
(13) wikiHow - wikiHow added a new photo.
wikiHow In need of last-minute Halloween inspiration? We've got the ultimate DIY guide for you -- with everything from Zombie Makeup tutorials to recipes for Candy Corn Jello Shots. 101 Halloween wikiHow guides http://stumble.it/wikiHowHalloweenCostumes2014