background preloader

Analyse

Facebook Twitter

Dorks. How to use Google for Hacking. Google serves almost 80 percent of all search queries on the Internet, proving itself as the most popular search engine. However Google makes it possible to reach not only the publicly available information resources, but also gives access to some of the most confidential information that should never have been revealed. In this post I will show how to use Google for exploiting security vulnerabilities within websites. The following are some of the hacks that can be accomplished using Google. 1. Hacking Security Cameras There exists many security cameras used for monitoring places like parking lots, college campus, road traffic etc. which can be hacked using Google so that you can view the images captured by those cameras in real time.

Inurl:”viewerframe? Click on any of the search results (Top 5 recommended) and you will gain access to the live camera which has full controls. you now have access to the Live cameras which work in real-time. Intitle:”Live View / – AXIS” 2. 3. . “? 4. Outils en ligne. Yellowpipe - Encrypter/Decrypter, Encode / decode: Base64, ASCII, Binary, Hex, DES, MD5, SHA1, Bruteforce, ROT-13, URL encode. Home > yis > tools > encrypter > Yellowpipe - Encrypter/Decrypter, Encode / decode: Base64, ASCII, Binary, Hex, DES, MD5, SHA1, Bruteforce, ROT-13, URL encode Encrypter /Decoder Encryption / Decryption tool » Online Encrypter / Decrypter tool This program let you encode/decode or encrypt/decrypt your documents in various formats such as: ASCSII, Binary, Base 64, Hex, Caesar Bruteforce, MD5, SHA-1, HTML Entities. See below the complete list. •ASCII to Binary •Binary to ASCII •ASCII to Hex •Hex to ASCII •Binary to Hex •Hex to Binary •Backwards •Base 64 Encode •Base 64 Decode •Caesar Bruteforce •DES Crypt (one way) •HTML Entities Encode •HTML Entities Decode •l33t 5p34k 3nc0d3 •l33t 5p34k d3c0d3 •MD5 Crypt (one way) •Igpay Atinlay •Un-Pig Latin •ROT-13 •URL Encode •URL Decode •SHA-1 Check our other free webmaster tools.