background preloader

Hacks

Facebook Twitter

Top 15 Open Source/Free Security/Hacking Tools. 1.

Top 15 Open Source/Free Security/Hacking Tools

Nmap Nmap (“Network Mapper”) is a free and open source (license) utility for network discovery and security auditing. Nmap uses raw IP packets in novel ways to determine what hosts are available on the network, what services (application name and version) those hosts are offering, what operating systems (and OS versions) they are running, what type of packet filters/firewalls are in use, and dozens of other characteristics. Nmap homepage. 2. Wireshark is a network protocol analyzer. 3. Metasploit Community Edition simplifies network discovery and vulnerability verification for specific exploits, increasing the effectiveness of vulnerability scanners. 4. Nikto is an Open Source (GPL) web server scanner which performs comprehensive tests against web servers for multiple items, including over 6400 potentially dangerous files/CGIs, checks for outdated versions of over 1200 servers, and version specific problems on over 270 servers. 5. 6. ettercap 7. 8. 9. 10. w3af. How to Erase Yourself From the Internet.

Hackety Hack! Top Sites To Find All The Serials You Need. Top 10 Ways to Unlock the Unlockable. Russian Password Crackers: fastest, tested password recovery software. Hacker Attack Tools. 3 Hacks for Firefox That Will Double Your Internet Browsing Speed - Gnoted.com. There are many people out there complaining about the Firefox RAM Memory Bug. Lets get it straight. It’s not a bug. It’s part of the cache feature. This ‘feature’ is how the pages are cached in a tabbed environment. To improve performance when navigating (studies show that 39% of all page navigations are renavigations to pages visited less than 10 pages ago, usually using the back button), Firefox implements a Back-Forward cache that retains the rendered document for the last five session history entries for each tab.

This is a lot of data. Now a lot of us have found the ‘secrets’ on how to manipulate settings in “about:config” to drop the memory usage as long as possible and to increase the speed at which Firefox loads sites. Remember: Firefox (download it here) is the best internet browser available (in my opinion), and these tweaks below will make it even greater and faster. Reduce the amount of RAM Firefox uses for it’s cache feature. The Hacker Crackdown. Default Password List. How to Hack Your Facebook Profile Photo with Timeline. Facebook Timeline Hack Template (update) Hacking the Xbox. Challenges - Thisislegal.com. How to Unlock a Computer Without a Password Reset Disk. Top 5 Websites To Learn How To Hack Like A Pro.

You might be surprised to learn just how many people want to learn how to hack.

Top 5 Websites To Learn How To Hack Like A Pro

The stereotype is that of the young college guy – a computer science major for sure – who spends his evenings and weekends writing up intricate hacking scripts to break into whatever computer system he can get his hands on. The truth is that what was once a male-dominated community is fast changing into one that includes folks – men and women – from many walks of life, from many countries and with many backgrounds. A recent CNET article about DEFCON makes note of the fact that claims of sexual harassment and unwanted advances are increasing. This isn’t because hackers are getting more obnoxious or offensive, but because more female hackers are entering into the community and trying to find a home there, only to find insulting behavior, and other actions unbecoming of a gentleman. Bore Proxy - Go To MySpace or Any Web site At School or Work. Web World Wide » 50 Free Internet Tools for Tin-Foil Hat Wearers.

If your wardrobe includes a shiny tin-foil hat, then you will love these free Ma Internet tools.

Web World Wide » 50 Free Internet Tools for Tin-Foil Hat Wearers

Learn Hacking. How to use Google for Hacking. Google serves almost 80 percent of all search queries on the Internet, proving itself as the most popular search engine.

How to use Google for Hacking.

However Google makes it possible to reach not only the publicly available information resources, but also gives access to some of the most confidential information that should never have been revealed. Using Googles Full Capabilities. « XBOX, XBOX 360, PS2, PS3, PSP, & MORE! – Your source for the latest in console modding. Well most of you use Google to probably look up porn.

Using Googles Full Capabilities. « XBOX, XBOX 360, PS2, PS3, PSP, & MORE! – Your source for the latest in console modding.

Other just search stuff. And others use Google to hack. Using Google, and some finely crafted searches we can find a lot of interesting information. For Example we can find: Credit Card Numbers Passwords Software / MP3′s …… (and on and on and on) Presented below is just a sample of interesting searches that we can send to google to obtain info that some people might not want us having.. After you get a taste using some of these, try your own crafted searches to find info that you would be interested in. Try a few of these searches: intitle:”Index of” passwords modified allinurl:auth_user_file.txt “access denied for user” “using password” “A syntax error has occurred” filetype:ihtml allinurl: admin mdb “ORA-00921: unexpected end of SQL command” inurl:passlist.txt “Index of /backup” “Chatologica MetaSearch” “stack tracking:”

Google Hacking Database, GHDB, Google Dorks. The Jargon File. The Best Hacking Tutorial Sites - Learn Legal Hacking. Written by: Daniel Robson•edited by: Aaron R.

The Best Hacking Tutorial Sites - Learn Legal Hacking

•updated: 2/13/2011 Whether it's to understand potential attack vectors or simply for the fun of it, learning the basics of hacking is something that a lot of people aspire to. Here's our list of the top tutorial based hacking sites. Introduction Films like Swordfish and Hackers have made hacking seem cool, a lifestyle choice almost. However most techies know that in reality it's often a difficult and time consuming process. Know the Trade – Your IT Security Information Portal CISSP/CEH/CISA/Hacker and Penetration Testing Specialist. Google Hacking allintitle:Brains, Corp. camera allintitle:"index of/admin" allintitle:"index of/root" allintitle:restricted filetype:doc site:gov allintitle:restricted filetype :mail allintitle:sensitive filetype:doc.

Know the Trade – Your IT Security Information Portal CISSP/CEH/CISA/Hacker and Penetration Testing Specialist

» Make your copy of Windows XP 100% Genuine in 2 seconds !! Rapidshare Links. » Wireless Hacking Live-CD (FBI version){Must Have} Rapidshare Links. Hacking - Beginning txt. DRM Removal. How To Remove DRM from Audio Files Perhaps you've purchased music from iTunes and you want to play those tunes on a non-iPod music player.

DRM Removal

Apple says no. Maybe you've become a Mac or Linux user, and you need your WMA (Windows Audio) files in a standard, portable format. Microsoft says no. Hack Attack : Get Windows XP SP3 Through Windows Update « DailyApps. Well If you have read my previous Hack Attack on How you can download Windows Vista SP1 through a Hack and it worked for you then here is another Hack that will allow you to download Windows XP SP3 RC1 directly from Microsoft.

Hack Attack : Get Windows XP SP3 Through Windows Update « DailyApps

Windows XP SP3 will be the final service pack that we will see for the World’s biggest Operating System from Microsoft. SP3 will bring a host of bug fixes and some new features borrowed from Vista. Well here is how you can download SP3 straight from Microsoft. Follow the instructions carefully and you’ll be running Windows XP SP3 in no time. PC Hacks - Tips and Tricks. How to download video from YouTube, MySpace, Google Video and others. Turn Google into your own personal (free) Napster. Video.