background preloader

Google Hacking Database, GHDB, Google Dorks

Google Hacking Database, GHDB, Google Dorks
We call them 'googledorks': Inept or foolish people as revealed by Google. Whatever you call these fools, you've found the center of the Google Hacking Universe! Latest Google Hacking Entries Google Hacking Database Categories Footholds (31) Examples of queries that can help a hacker gain a foothold into a web server Files containing usernames (17) These files contain usernames, but no passwords... Sensitive Directories (74) Google's collection of web sites sharing sensitive directories. Vulnerable Files (61) HUNDREDS of vulnerable files that Google can find on websites... Vulnerable Servers (80) These searches reveal servers with specific vulnerabilities. Error Messages (77) Really retarded error messages that say WAY too much! Sensitive Online Shopping Info (10) Examples of queries that can reveal online shopping info like customer data, suppliers, orders, creditcard numbers, credit card info, etc Network or vulnerability data (63) Pages containing login portals (289) Various Online Devices (244)

http://www.exploit-db.com/google-dorks/

Related:  shaundonnelly

How to Build a Hackintosh Build a Hackintosh with better performance than a Mac Pro — for half the price. A comprehensive, free, step-by-step guide. Last updated March 2013 with the latest Intel Ivy Bridge processor and motherboard recommendations (which, it’s worth noting, are not available on the out-of-date Mac Pros) and OS X Mountain Lion-native installation instructions. We’ve also refreshed the nVidia GPUs. Nmap Evade Firewall & Scripting Nmap is the most powerful scanner that is used to perform so many functions including port scanning, service detection, and even vulnerability detection. Nmap from beginner to advanced has covered many basic concepts and commands, and in this second part of this series of articles I will discuss some advanced techniques of Nmap. How to Evade a Firewall/IDS Firewalls and IDS (intrusion detection systems) normally play an important role to defend the remote target very well from a security point of view because these hardwares and softwares are capable of blocking the intrusion, but in the case of penetration testing you need to bypass these tools to get the right result otherwise you will be misled.

#3038363 SOPA Emergency IP list: So if these ass-fucks in DC decide to ruin the internet, here’s how to access your favorite sites in the event of a DNS takedown tumblr.com 174.121.194.34 wikipedia.org 208.80.152.201 101 Free Admin Tools We know administrators love tools that make life easier – especially when they’re free! So here are 101 of them! System and network analysis 1. NTFS Permissions Explorer The Best New Features of Adobe Photoshop CS6 Photoshop CS6 has some great new features that designers are sure to love. Upgrading from CS4 or CS5 is simple and straightforward, and the new tools are intuitive, practical, and extremely helpful for a wide variety of design purposes. Adobe put a lot of time and effort into their newest iteration of Photoshop. As a result, there are hundreds of improvements. Rather than trying to list every single one of them, here are a few of the most noteworthy additions in Photoshop CS6.

Hack-A-Vision: Cracking WEP/WPA/2 networks with Aircrack-ng [Linux] Now that you have hopefully installed the Aircrack-ng suite and familiarized yourself with some basic Linux commands, we can start cracking WEP and WPA1/2 networks to see the differences in security Wired Equivalent Privacy (WEP) and Wi-fi Protected Access (WPA) provide. Notice: This is purely for educational value, do not attempt this on a network you do not PERSONALLY own. If you do this on a public or private network that you do not have authorization to do so on, it is illegal and you will probably get caught.

The Ultimate Excel Cheatsheet Working with the new Excel 2007 is now more frustrating than ever when it comes to finding the right commands. Sometimes it seems like part magic and part luck. That’s why we’ve put together the cream of the crop of Excel shortcuts in easy to use cheatsheets you can print up and keep handy. Highlighting the most commonly used and commonly looked for Excel commands, this list puts it all at your fingertips. Learn how to get around Excel using only the keyboard. Usb password stealer - Steal passwords on a Remote computer As we know that windows stores most of its passwords on daily basis , Such as Msn messenger passwords,Yahoo passwords,Myspace passwords etc.Most of people have lack of time and they had just asked their Browser/windows to save their passwords,As we know that there are many tools to recover Saved passwords,so in this article i will explain you on How to made a USB passwords stealer and steal saved passwords.Things you will need? Password Fox - Password fox is a small program used to view Stored passwords in Mozilla Firefox. Now here is a step by step tutorial to create a USB password stealer to steal saved passwords:Note:Kindly disable your antivirus before performing these steps1.First of all download all 5 tools and copy the executables (.exe( files in your USB i.e. Copy the files mspass.exe, mailpv.exe, iepv.exe, pspv.exe and passwordfox.exe into your USB Drive. 2. Create a new Notepad and write the following text into it

Free Excel Downloads. Excel Functions and VBA (Visual Basic for Applications) AdvancedFilter.zip This is a zipped Excel Workbook that has six working examples using Excels Advanced Filter. It has three that use no formulas and three that do use formulas. DFunctionsWithValidation.zip This is a zipped Excel Workbook that shows how you can use Data Validation and the Dfunctions to extract data from a Table. FormulaExamples.zip

80+ Best Free Hacking Tutorials Learning to become hacker is not as easy as learning to become a software developer. I realized this when I started looking for learning resources for simple hacking people do. Even to start doing the simplest hack on own, a hacker requires to have in depth knowledge of multiple topics. Some people recommend minimum knowledge of few programming languages like C, Python, HTML with Unix operating system concepts and networking knowledge is required to start learning hacking techniques.

100 Websites You Should Know and Use Entertainment Meet David Peterson, who developed Dothraki for Game of Thrones There are seven different words in Dothraki for striking another person with a sword. How To Crack A Wi-Fi Network’s WPA Password With Reaver Your Wi-Fi network is your convenient wireless gateway to the internet, and since you’re not keen on sharing your connection with any old hooligan who happens to be walking past your home, you secure your network with a password, right? Knowing, as you might, how easy it is to crack a WEP password, you probably secure your network using the more bulletproof WPA security protocol. Here’s the bad news: A new, free, open-source tool called Reaver exploits a security hole in wireless routers and can crack most routers’ current passwords with relative ease.

Related: