background preloader

Search engine + p2p

Facebook Twitter

Zen Torrents. Torrent Reactor - The most active torrents on the web. Torrent Search Engine. Login Login or register to get advantage of advanced controls on AIO Search.Login with your Facebook, Twitter, Google and Wordpress ...

Torrent Search Engine

Torrent list. Torrent Search, Torrent Download - Seedpeer.me. Torrentz - Torrent Search Engine. Diigo - Better reading and research with annotation, highlighter, sticky notes, archiving, bookmarking & more. The web. Hacking. Website Bookmarks. Biznar: Deep Web Business Search : Main View : Deep Federated Search. Internet Archive: Digital Library of Free Books, Movies, Music & Wayback Machine. Free People Search. Torrent search. Veezzle - search for free stock photos plus a whole lot of other stuff! Creative Commons Search. Interesting Search Engines. DuckDuckGo. 101 Google Tips, Tricks & Hacks. Looking for the ultimate tips for Google searching?

101 Google Tips, Tricks & Hacks

You've just found the only guide to Google you need. Let's get started: 1. The best way to begin searching harder with Google is by clicking the Advanced Search link. 2. 3. 4. 5. 6. 7. 8. 9. 10. 11. 12. 13. Dorks & Hacks Big List. Hyperlink. Search and Order. Recherche OpenGrey. PDF search engine for free scientific publications - FreeFullPDF. Ixquick Search Engine. Startpage Search Engine. Entireweb Search Engine - Web Search. Web invisible.

FindSounds - Search the Web for Sounds. FileZilla - The free FTP solution. Simple Steps to Hack a Smartphone. What kind of information do you have on your business card?

Simple Steps to Hack a Smartphone

Company name? Check. Your name and title? Check. Business address? CSO recently sat down with Trust Digital, a firm that specializes in mobile security, for a demonstration on how to hack a smartphone with no more information than a phone number. "All I need is a business card," said Meir Machlin, director of product architecture with Trust Digital, who performed the demonstration (You can check out the two demonstrations in the video). How to Hack a Smartphone, Part 1 Machlin walked us through two hacks using basic tools available to anyone. The first attack we watched is known as a 'Midnight Raid,' because it is often pulled off during the night when the phone's user is asleep and the device is still turned on as it is charged, or simply left on the nightstand.

Machlin sent a simple SMS which invoked Internet Explorer on the attack device. How to Hack Passwords Using a USB Drive. As we all know, Windows stores most of the passwords which are used on a daily basis, including instant messenger passwords such as MSN, Yahoo, AOL, Windows messenger etc.

How to Hack Passwords Using a USB Drive

Along with these, Windows also stores passwords of Outlook Express, SMTP, POP, FTP accounts and auto-complete passwords of many browsers like IE and Firefox. There exists many tools for recovering these passswords from their stored places. Search & Download Text Documents & e-Books FREE. File Search Engine.

Search & Download Text Document Files. Search smartly and download instantly a book or a document you need on BookiDoc.com. General-Search.com - The Best Uploading.com File Sharing Search Engine. HotFileSearch. About Hackers & Hacks. Torrent Reactor. Torrent P2P /Streaming. Download tools for hacking - hacking. Deep Web. How to use Google for Hacking.

Google serves almost 80 percent of all search queries on the Internet, proving itself as the most popular search engine.

How to use Google for Hacking.

However Google makes it possible to reach not only the publicly available information resources, but also gives access to some of the most confidential information that should never have been revealed. In this post I will show how to use Google for exploiting security vulnerabilities within websites. The following are some of the hacks that can be accomplished using Google. Hacking tutorials sites & tools. Hackers For Charity. The Best Hacking Tutorial Sites - Learn Legal Hacking. Written by: Daniel Robson•edited by: Aaron R.

The Best Hacking Tutorial Sites - Learn Legal Hacking

•updated: 2/13/2011 Whether it's to understand potential attack vectors or simply for the fun of it, learning the basics of hacking is something that a lot of people aspire to. Here's our list of the top tutorial based hacking sites. Introduction Films like Swordfish and Hackers have made hacking seem cool, a lifestyle choice almost. However most techies know that in reality it's often a difficult and time consuming process. 16 Apps That Make Sharing Large Files A Snap.

File sharing services are not as popular today as they were four years ago.

16 Apps That Make Sharing Large Files A Snap

It’s not that people are sharing any less. Rather, they just found easier ways to do it. Would you upload a funny video from a friend’s email to any of those services or would you search for it on Youtube and share only the link? Would you upload an MP3 file in order to share with whomever, or would you search for it online, grab the link and then share it? The Freenet Project - /index. Tor Project: Anonymity Online. Free secure email for everyone. DEF CON® Hacking Conference. How to easily delete your online accounts. A directory of direct links to delete your account from web services. Can't find what you're looking for?

A directory of direct links to delete your account from web services.

Help make justdelete.me better. easy No Info Available Login to your account, go to parameters, click Delete my account. KnowEm Username Search: Social Media, Domains and Trademarks. Deep Web Technologies. State of the Search. Deep Web Business Search : Main View : Deep Federated Search.

Main View : Deep Federated Search. WorldWideScience. One Search. Superior Science. Welcome to INFOMINE: Scholarly Internet Resource Collections. Intute - Home. DeepDyve - Instant access to the journals you need!

Intute - Home. Top 15 Open Source/Free Security/Hacking Tools. 1.

Top 15 Open Source/Free Security/Hacking Tools

Nmap Nmap (“Network Mapper”) is a free and open source (license) utility for network discovery and security auditing. Nmap uses raw IP packets in novel ways to determine what hosts are available on the network, what services (application name and version) those hosts are offering, what operating systems (and OS versions) they are running, what type of packet filters/firewalls are in use, and dozens of other characteristics. Nmap homepage. 2. Wireshark is a network protocol analyzer. 3. Metasploit Community Edition simplifies network discovery and vulnerability verification for specific exploits, increasing the effectiveness of vulnerability scanners. 4. Nikto is an Open Source (GPL) web server scanner which performs comprehensive tests against web servers for multiple items, including over 6400 potentially dangerous files/CGIs, checks for outdated versions of over 1200 servers, and version specific problems on over 270 servers. 5. 6. ettercap 7. 8. 9.

Challenges - ThisisLegal.com. How to Hack Someones IP Address 2014 - Come to Hack. Most of you may be curious to know how to find the IP address of your friend’s computer or to find the IP address of the person with whom you are chatting in Yahoo messenger or Gtalk.

How to Hack Someones IP Address 2014 - Come to Hack

Finding out someone's IP address is like finding their phone number, an IP address can be used to find the general location where that person lives. Now while most of the tutorials on the net teach you how to steal an ip address via MSN, or any other chat software, in this post I’ll show you how to find IP address of someones computer using script. Using this method for hacking someones ip adress is very easy and effectively, so just follow the steps bellow. NOTE: This tutorial is for educational purposes only, I am NOT responsible in any way for how this information is used, use it at your own risk. Google Hacks. 80+ Best Free Hacking Tutorials. Learning to become hacker is not as easy as learning to become a software developer. I realized this when I started looking for learning resources for simple hacking people do.

Even to start doing the simplest hack on own, a hacker requires to have in depth knowledge of multiple topics. Some people recommend minimum knowledge of few programming languages like C, Python, HTML with Unix operating system concepts and networking knowledge is required to start learning hacking techniques. Though knowing a lot of things is required, it is not really enough for you to be a competent and successful hacker. You must have a passion and positive attitude towards problem solving.

If you are thinking about ethical hacking as a career option, you may need to be prepared for a lot of hard/smart work. Hacking For Dummies® 3rd Edition > Building the Foundation for Ethical Hacking > Introduction to Ethical Hacking - Pg. : Safari Books Online. Learn Ethical Hacking Online - HackingLoops. There’s a seemingly endless number of free open-source tools for penetration testing, and most of them seem to gravitate around the Kali Linux distribution.

But with so many free tools, it’s easy to miss out on some of the best ones. So today we’re going to take a closer look at Armitage, define what it is, and define how it works. However, there’s a few things that you need to know before we start digging into the dirty details of how to use this tool. Naturally, I do have to give a brief warning before we get started, too. How To Become A Hacker.

Copyright © 2001 Eric S. Raymond As editor of the Jargon File and author of a few other well-known documents of similar nature, I often get email requests from enthusiastic network newbies asking (in effect) "how can I learn to be a wizardly hacker? ". Back in 1996 I noticed that there didn't seem to be any other FAQs or web documents that addressed this vital question, so I started this one. A lot of hackers now consider it definitive, and I suppose that means it is. Still, I don't claim to be the exclusive authority on this topic; if you don't like what you read here, write your own. Hacking - Beginning txt. The Best Hacking Tutorial Sites - Learn Legal Hacking. Painfully Computer Pranks ~ Computer Hacking.

Computer pranks to freak out your friends and make them crying for mummy I've been posting many articles about computer pranks on this blog (Deadly Virus Prank, The Ultimate Virus, How to Create a Fake and Harmless Virus and Facebook Virus Prank). Today , I will show you 5 great computer pranks that will frustrate your victims very much. These pranks could be very painfully, so please use them at your own risk ;) 1. Crash a Computer System With Nothing But a URL! I stumbled across this URL while surfing the internet. Hacker9 - Social media, Hacking & Security. The definitive glossary of hacking terminology. We live in an era of unprecedented cyberattacks, where malicious campaigns, both personal and governmental, are carried out across laptops and wireless networks.

Even if you are not technically minded, your day-to-day life is still probably pretty crowded with stories about hacking, whether you recognize them as such or not. Have you ever installed an antivirus tool on your computer? Welcome to Hellbound Hackers. How to Pirate Software Without Getting Caught. The Best Hacking Tutorial Sites - Learn Legal Hacking. Ethical Hacking Tutorials, Tips and Tricks - Free Tutorials, Tools, How to's. Posted by Vishnu Valentino in Tips and Trick | 13 comments Shutdown Windows 7 Remotel... I believe when read the title Shutdown Windows 7 remotely, many people will remember the infamous Windows 2000 shutdown feature.

I remember back on my bachelor when time for computer lab class we will begin the shutdown war inside the lab by typingshutdown. Top 5 Websites To Learn How To Hack Like A Pro. Hacking and Security Community - Index. Keeping Knowledge Free for Over a Decade. 101 Google Tips, Tricks & Hacks. How to use Google for Hacking.

Google serves almost 80 percent of all the search queries on the Internet, proving itself as the most popular search engine. However, Google makes it possible to reach not only the publicly available information resources, but also gives access to some of the most confidential information that should never have been revealed. How To Search On Google Like Elite Hackers. 20 Tips To Use Google Search Efficiently.

Millions of people use Google search every day for a variety of reasons. Google: Search for Public Online Cameras and Video Feeds. DuckDuckGo. Sign in. How To Hack Google Plus For SEO Value. People tend to think of Google Plus as just another social network, built as Google’s challenge to Facebook’s incredible growth over the past decade. What most people don’t realize, however, is the SEO value that makes Google+ so much more than just a social networking platform. Google Custom Search. World Book. The 101 Most Useful Websites on the Internet. Database download. Google Custom Search.