background preloader

Hacking

Facebook Twitter

Anonymous Exposes Pedophiles On Twitter. Guide Destroy someones computer. Google Hacking Database, GHDB, Google Dorks. NEW!!!! Destroy someone's Computer! : OFF Topic. Vampyre is right.1.

NEW!!!! Destroy someone's Computer! : OFF Topic

LIL DEVIL IS AN A-HOLE2. THAT IS HACKING WHICH IS ILLEGAL3. March 2011. Ok, here's a new quick tutorial for everyone who has been having to deal with Facebook blocking your entrance into someone's account due to logging in from a different location.

March 2011

Ever since I had been problems constantly having to deal with Facebook leaving me out off people's accounts I began to think that I should write over my experiences to help others. I will go over specific techniques and ideas to eventually grant you entrance to their accounts without having to deal with that Facebook problem having logging in from different location. 1. Before you even begin reading this, you must already have their passwords or e-mails. If not, I will tell you a few ideas of how to acquire them.

If you only want to log in without changing passwords, I would suggest that you steal their passwords through Phishing, Keylogging, or Social Engineering. 2. 3. Ok, let's move on to the actual information. Computer pranks - Google Keyword - Website-Tools.net. How to make a prank shutdown virus. Know the Trade – Your IT Security Information Portal CISSP/CEH/CISA/Hacker and Penetration Testing Specialist. Google Hacking allintitle:Brains, Corp. camera.

Know the Trade – Your IT Security Information Portal CISSP/CEH/CISA/Hacker and Penetration Testing Specialist

DropSend - Email large files and send large files. Hack Tools ~ Hacking Tutorials n Hack Tools - Isoftdl Hackers Portal. Routerpwn 1.4.140. The Open Organisation Of Lockpickers. This is a repository of the most up-to-date versions of Deviant's lock diagrams and animations.

The Open Organisation Of Lockpickers

Seen in all of the TOOOL educational materials and slide decks, these files are all released under the Creative Commons license. You are free to use any of them for non-commercial purposes, as long as they are properly attributed and the same freedom for others is maintained in all derivative works. Please note that these diagrams have evolved and developed over time. While Deviant is still proud of the older versions of his images, if you still have copies of legacy material they should all be replaced with the latest versions available here. Each image shown below in thumbnail form can be accessed in high resolution individually, or you can obtain the full set from the zip archive at the bottom of this page.

Lock Basics and Mechanical Operation. Learn to Pick Locks for Fun and an Increased Understanding of Security. Open a Padlock with an Aluminum Can. How to Pick a Lock with a Bump Key. The point that many people miss is that bump keys and lockpicks allow access to an area without any obvious sign of forced entry.

How to Pick a Lock with a Bump Key

This allows for long term theft, especially in an office or retail situation where high value items may be stored in a supposedly secure area and not be missed for some time, but where attempting to force a lock would bring immediate attention. If my wife comes home to a lock drilled off the door, she going to call the police. If an intruder uses a bump key, she could be totally unaware that someone was lurking inside. Knowing someone has broken in is sometimes more important than keeping them out altogether. Frankly I blame the whole "locks are for honest people" mentality for leading people to choose inferior residential locks over much better but slightly more expensive alternatives. How Secure Is My Password? Easy Software Keylogger Using Shadow Keylogger.

Evilzone - Hacking and Security Community - Index. Th3 0uTl4wS r3Fug3. Black Hat hacker, Black Hat Hacking, White Hat and Black hat hacking tutorials. iExploit - Community. InterN0T - Underground Security Training. Thisislegal.com.

The Best Hacking Tutorial Sites - Learn Legal Hacking. Free online hacking game - Slave hack, hack computers, banks and servers. HellBound Hackers. Hack This Site! 2600: The Hacker Quarterly. Hackergames.net. Hacking. Vote Now! Top Ten Web Hacking Techniques of 2011. Every year the Web security community produces a stunning amount of new hacking techniques published in various white papers, blog posts, magazine articles, mailing list emails, etc.

Vote Now! Top Ten Web Hacking Techniques of 2011

Within the thousands of pages are the latest ways to attack websites, Web browsers, Web proxies, and so on. Beyond individual vulnerability instances with CVE numbers or system compromises, we’re talking about actual new and creative methods of Web-based attack. The Top Ten Web Hacking Techniques list encourages information sharing, provides a centralized knowledge-base, and recognizes researchers who contribute excellent work. How the winners were selected… Phase 1: Open community voting (Ballot) [COMPLETE] From of the field of 51 total entries received listed below, each voter (open to everyone) ranks their fifteen favorite Web Hacking Techniques using a survey.

(they’ll be deleted) Voting will close at the end of the day this Monday, February 20. [CLOSED] The more people who vote, the better the results! How To Become A Hacker. Copyright © 2001 Eric S.

How To Become A Hacker

Raymond As editor of the Jargon File and author of a few other well-known documents of similar nature, I often get email requests from enthusiastic network newbies asking (in effect) "how can I learn to be a wizardly hacker? ". Back in 1996 I noticed that there didn't seem to be any other FAQs or web documents that addressed this vital question, so I started this one. A lot of hackers now consider it definitive, and I suppose that means it is. Still, I don't claim to be the exclusive authority on this topic; if you don't like what you read here, write your own. If you are reading a snapshot of this document offline, the current version lives at Note: there is a list of Frequently Asked Questions at the end of this document.

Learn about Hacking, Cracking, JavaScript, PHP, Cryptology and Password security. Mac Hacking [dot] net - Knowledge Base. Hack Tricks - Hacking, Facebook Tricks, Pranks, Softwares. How to Hack: Ethical Hacking and Cyber Security. Learn How To Hack.