Posts

Image
Terabit Virus Maker 3.2 This is a powerful virus maker coded in visual basics 6.0. Create virus of your choice by selecting from a lot of options. I am not responsible if you crash your system or use this to destroy some others system...     Download TaraBit Virus Maker (1.81 MB zip file) Download

SQL INJECTION

Image
SQL INJECTION  Havij is an automated SQL Injection tool that helps penetration testers to find and exploit SQL Injection vulnerabilities on a web page. It can take advantage of a vulnerable web application. By using this software, user can perform back-end database fingerprinting, retrieve DBMS login names and password hashes, dump tables and columns, fetch data from the database, execute SQL statements against the server, and even access the underlying file system and execute operating system shell commands.  It is available both in free and commercial versions. Today we are going to see how to dump the contents of a database using Havij. For this I am going to use the free version. First download Havij from here and install it. Then open it and enter the vulnerable page url in the target column  - Type Vulnerable Website Inside It And Hit  Analyze  Button. -  Now Click On  Tables  Tab And Then Hit  Ge...

USB Rubber Ducky

Image
USB Rubber Ducky The USB Rubber Ducky isn't your ordinary  HID (Human Interface Device) . Coupled with a powerful 60 MHz 32-bit processor and a simple scripting language anyone is able to craft payloads capable of changing system settings, opening backdoors, retrieving data, initiating reverse shells, or basically anything that can be achieved with physical access -- all automated and executed in a matter of seconds. ·          Attacks any OS that supports USB Keyboards ·          Start writing payloads in minutes MAKE YOUR OWN  USB RUBBER DUCKY Tools you’ll need:          Arduino Pro Micro ATMega32U4 5V/16MHz (or any Arduino with ATMega32U4 chip)          USB Micro Adapter Cable (you don’t need this one if the Arduino you use comes  with builtin USB A male connector)          MICRO USB ...

hack wifi using kali Linux/Android

Image
How to hack wifi using kali Linux:  Kali Linux  provide various techniques for security testing and penetration. Using  kali Linux for wifi hacking  is good approach. To hack a wifi or to  crack WPA/WPA2 security  we can follow the following steps for easily hacking wifi using Linux: Step 1:  Login into your  kali Linux Step 2:  Plug in  the injection capable wireless adapter i.e. (which support promiscuous mode) Step 3:  Open up the terminal ( ctrl+alt+t  can be used as default shortcut command) Step 4:  Type  airmon-ng  and you will see the list wireless devices. Step 5:   Type  airmon-ng  stop (interface name) then it is ready to capture data Step 6:  Then we need to find out if the WPS i enable or not for that we can use command:  wash -i (interface name)-c 8 -C -s Step 7:  If the WPS is not enabled then we can easily hack the wifi using  reaver reaver...
Image
How To Make Phishing Page Of Facebook   Open Browser. i.e. Chrome etc… Open your desire website (Our Example : www.facebook.com) Right click on it then Go to "View Page Source“ or *CTRL+U+ Copy that Page source code by Selecting All [CTRL+A] + [Ctrl + C] Go to your folder & make new Notepad file & Paste that source code In that notepad Go to Files, Save as... Named it “index.html“ (Be sure to write html after that name) Once its saved then close it. Now we need to edit in that page source code Press CTRL+F on notepad and search for "Action" which look likes this           action="https://www.facebook.com/login.php....“      Delete that Facebook Link and type in there “post.php" Eg. action=“post.php“ Now we need make another notepad and write post php code (Next Slide)  Go to Files, Save as Named it “post.php“ (Be sure to write php after that name) & Save php Code :- <?php header ('...