Just Educational Purpose Only For Pentesters And Developers

  • The only Entertainment

    Hacking was the only entertainment that would occupy my mind - like a huge video game, but with real consequences. I could have evaded the FBI a lot longer if I had been able to control my passion for hacking.Kevin Mitnick

    Read More
  • challenge

    I was addicted to hacking, more for the intellectual challenge, the curiosity, the seduction of adventure; not for stealing, or causing damage or writing computer viruses. Kevin Mitnick

    Read More
  • Computer hacking

    Computer hacking really results in financial losses and hassles. The objectives of terrorist groups are more serious. That is not to say that cyber groups can't access a telephone switch in Manhattan on a day like 9/11, shut it down, and therefore cause more casualties.Kevin Mitnick

    Read More
  • The only Entertainment

    Hacking was the only entertainment that would occupy my mind - like a huge video game, but with real consequences. I could have evaded the FBI a lot longer if I had been able to control my passion for hacking.Kevin Mitnick

    Read More
  • challenge

    I was addicted to hacking, more for the intellectual challenge, the curiosity, the seduction of adventure; not for stealing, or causing damage or writing computer viruses. Kevin Mitnick

    Read More

Tuesday, March 31, 2015

Local Root Exploit For Linux Kernel 2.6.32 (precompile)

Note:  Its a pre-compiled exploit and has been verified for list servers. It might working on other 2.6.32-X kernels too. So, test it and update us in comments. Thanks. Following is the list of vulnerable kernels which can be rooted with our exploit. Vulnerable Kernels: Linux localhost.domain 2.6.32-358.2.1.el6.x86_64 #1 SMP Wed Mar 13 00:26:49 UTC 2013 x86_64 Linux localhost.domain 2.6.32-358.6.1.el6.x86_64 #1 SMP Tue Apr 23 19:29:00...

Monday, March 23, 2015

Top 6 Web Vulnerability Scanner Tool

Web site security is very important because the website contain relevant information about a company and now a days website defacement is very common even a script kiddies and a new born hackers can do this. The most common vulnerability like SQL-Injection and cross site scripting lead towards the defacement. So you want to secure your web application than find vulnerabilities on it before a hacker find it, try to use some relevant...

Wednesday, March 18, 2015

ShellfireVPN [One of the best VPN]

[*] German IP Address [*] For Windows [*] Normal surfing [*] Encrypted Internet [*] Safe surfing hotspot [*] Bypass firewalls Download:  https://www.shellfire.de...

Wordpress Plugin Reflex Gallery - Arbitrary File Upload

This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters. Learn more about bidirectional Unicode characters Show hidden characters <?php /* ...

Thursday, March 5, 2015

Best Stealer Ever (ISR Stealer 0.4.1)

  Video Tutorial: youtube credit to uploader :) Download : Mediafire...

wordpress theme photocrati 4.X.X SQL INJECTION

# Exploit Title: [ wordpress theme photocrati 4.X.X SQL INJECTION ] # Google Dork: [ Designed by Photocrati ] also [powered by Photocrati] # Date: [23 / 09 / 2011 ] # Exploit Author: [ ayastar ] # Email : dmx-ayastar@hotmail.fr # Software Link: [ http://www.photocrati.com ] # Version: [4.X.X] # Tested on: [ windows 7 ]    details | ======================================================= Software : photocrati version : 4.X.X Risk :...

PHPMoAdmin Remote Code Execution

###################################################################### # _ ___ _ _ ____ ____ _ _____ # | | / _ \| \ | |/ ___|/ ___| / \|_ _| # | | | | | | \| | | _| | / _ \ | | # | |__| |_| | |\ | |_| | |___ / ___ \| | # |_____\___/|_| \_|\____|\____/_/ \_\_| # # PHPMoAdmin Unauthorized Remote Code Execution (0-Day) # Website : http://www.phpmoadmin.com/ # Exploit Author : @u0x (Pichaya Morimoto), Xelenonz, pe3z, Pistachio # Release dates : March 3, 2015 # # Special Thanks to 2600 Thailand group # https://www.facebook.com/groups/2600Thailand/...

WordPress: Webdorado Spider Event Calendar <= 1.4.9 [SQL Injection]

# Exploit Title: WordPress: Webdorado Spider Event Calendar <= 1.4.9 [SQL Injection] # Date: 2015-02-12 # Exploit Author: Mateusz Lach # Vendor Homepage: https://www.facebook.com/WebDorado or http://www.webdorado.com # Software Link: https://downloads.wordpress.org/plugin/spider-event-calendar.1.4.9.zip # Version: 1.4.9 # Tested on: OpenSUSE Linux + Chrome and Firefox, it's PHP application. # CVE : CWE-89 # OWASP Top10: A1-Injection   Google...

Tuesday, March 3, 2015

RA1N DoSer v4 (lite)

Flooding UDP TCP SYN Features Port Scanning (100+ times faster than RDv3) History Favorites Awesome CPanel Defualts for input fields for flooding and more! Tech Specs: Over 25kbs a UDP Flood Cusstomizable SYN Flooding (using exploitations) Encrypted source (noobs piss me off) TCP Flooding (very efficient) program averages only 5,000 kbs of processing [x] Download ->  http://dl.dropbox.com [x] Download ->  http://mediafire.com  [x]...