Just Educational Purpose Only For Pentesters And Developers

  • challenge

    I was addicted to hacking, more for the intellectual challenge, the curiosity, the seduction of adventure; not for stealing, or causing damage or writing computer viruses. Kevin Mitnick

    Read More
  • Computer hacking

    Computer hacking really results in financial losses and hassles. The objectives of terrorist groups are more serious. That is not to say that cyber groups can't access a telephone switch in Manhattan on a day like 9/11, shut it down, and therefore cause more casualties.Kevin Mitnick

    Read More
  • The only Entertainment

    Hacking was the only entertainment that would occupy my mind - like a huge video game, but with real consequences. I could have evaded the FBI a lot longer if I had been able to control my passion for hacking.Kevin Mitnick

    Read More
Showing posts with label Window. Show all posts
Showing posts with label Window. Show all posts

Monday, March 23, 2015

Top 6 Web Vulnerability Scanner Tool


Web site security is very important because the website contain relevant information about a company and now a days website defacement is very common even a script kiddies and a new born hackers can do this. The most common vulnerability like SQL-Injection and cross site scripting lead towards the defacement.


So you want to secure your web application than find vulnerabilities on it before a hacker find it, try to use some relevant tools and find vulnerabilities and fix it. There are so many tools available for both Windows and Linux platform and commercial and open source tool. Below is the best web vulnerability scanner tool that we have discussed before.
OWASP or Open Web Application Security Project is a non profit organisation world wide that are focusing on improving the security of web application, for more about OWASP click here.The Zed Attack Proxy (ZAP) is an easy to use integrated penetration testing tool for finding vulnerabilities in web applications. It has an automatic scanning functionality and it has a set of tools that allow you to find vulnerability manually.
W3af is a Web Application Attack and Audit Framework. The project goal is to create a framework to find and exploit web application vulnerabilities that is easy to use and extend. w3af is working for Become the best Open Source Web Application Exploitation Framework. It is available on Backtrack 5 too.
Skipfish is an automatic web application security tool, that has been designed to find the vulnerabilities on a web application, find vulnerability on your website before than a hacker find and exploit it. It is also available on Backtrack 5.
Nikto is one of the best open source web vulnerability scanner tool that is available on the famous Linux distribution like Backtrack, Gnacktrack,Backbox and others. You can use it on other distribution and on windows too because it is only need perl script.
Netsparker is a commercial tool that has been designed to find the vulnerabilities on web application, the free version of netparker is also available so you can download it and can use for a quick penetration testing on a web application.
Websecurify is a cross operating system tool that can be run on Windows, Linux and MAC. It is the best tool to find the common web vulnerabilities that can cause a great harm to the web application.

This is just a small list of the best tools you can use Wapiti, Grendel scan and other tools to perform the job, you have any other tool in mind than do share it with us via comment box.
 
source : www.ehacking.net

Wednesday, March 18, 2015

ShellfireVPN [One of the best VPN]


[*] German IP Address

[*] For Windows

[*] Normal surfing

[*] Encrypted Internet

[*] Safe surfing hotspot

[*] Bypass firewalls


Thursday, March 5, 2015

Best Stealer Ever (ISR Stealer 0.4.1)


Video Tutorial: youtube
credit to uploader :)

Download : Mediafire

Tuesday, March 3, 2015

RA1N DoSer v4 (lite)



Flooding

  • UDP
  • TCP
  • SYN
Features
  • Port Scanning (100+ times faster than RDv3)
  • History
  • Favorites
  • Awesome CPanel
  • Defualts for input fields for flooding
  • and more!
Tech Specs:
  • Over 25kbs a UDP Flood
  • Cusstomizable SYN Flooding (using exploitations)
  • Encrypted source (noobs piss me off)
  • TCP Flooding (very efficient)
  • program averages only 5,000 kbs of processing

[x] Download ->  http://dl.dropbox.com

[x] Download ->  http://mediafire.com
 

[x] Virusscan ->
Code: https://www.virustotal.com/

credit : RA1N

Tuesday, February 24, 2015

Gr3eNoX Exploit Scanner SQLi/XSS/LFi/RFi v1.1


Updates
  • XSS Scanner
  • RFi Scanner Bug fixed
  • Remove Duplicate algoritm chanded

Virus Scans:
http://elementscanner.net//?RE=96825...d4ebb04cae10b5
https://www.virustotal.com/file/7c23...is/1339689371/
 
Download:  http://localhostr.com/kX3lVjuVOOmd 

or
Download: Mediafire.com

Thursday, February 19, 2015

Metasploit Penetration Testing Cookbook

Set up a complete penetration testing environment using metasploit and virtual machines.
Learn to penetration-test popular operating systems such as Windows7, Windows 2008 Server, Ubuntu etc.
Get familiar with penetration testing based on client side exploitation techniques with detailed analysis of vulnerabilities and codes
Avail of exclusive coverage of antivirus bypassing techniques using metasploit
Master post-exploitation techniques such as exploring the target, keystrokes capturing, sniffing, pivoting, setting persistent connections etc.

Build and analyze meterpreter scripts in Ruby
Build and export exploits to framework
Use extension tools like Armitage, SET etc.



 <div class="abt-button">
      <a href="http://adf.ly/14063G">Download</a>
      <p class="up">click to begin</p>
      <p class="down">1.2MB .zip</p>
    </div>




Tuesday, February 17, 2015

Windows Forensic Analysis Toolkit