Wednesday, 28 September 2011

How to create a facebook Fake Login Page-Fake login sacript

I am providing you both tool html page and php script,Just download both from download link below Before starting the tutorial. Download From Here Note: This Tutorial Is For Educational Purposes Only. I Will Not Be Held Responsibility For, If Any Person Use This For Any Wrong Reason .Use At Your Own Risk. I Do Not Recommend Hacking. Let’s Start:- How To Create A Facebook Fake Login Page-Fake Login Script 1.After download extract both...

Facebook Hacking – New Phishing Method

First of all you need to download phishing page for hacking facebook accounts.Given below is the download link for FB phishing page. Upload the files on any free hosts,If you are facing any problem in uploading files, upload a PHP shell on your server,then upload the zipped file you downloaded and give this command in command execution form : Unzip Fb.zip and hit Enter.You are done!! Now the next part is giving the Link to give the victim,Here...

How to hack any facebook account easily by Reverting/Reseting pass of your victim NO keyloging pishing required

Here is one more interesting tip on how to hack a Facebook account by the method of reverting the password.This method does not involve any skill or anything just a brain would be enough to get you through this trick ! Well,you might think that it is impossible but it is actually true that you can hack any facebook account ! So before we start i would like to tell you what "Reverting" actually means... What is Reverting ? Reverting...

Top 4 Free Vocal Removers: Eliminate Vocals From Your Favorite Songs

Have you ever listened to a song and wished that you could remove the vocals? The art of eliminating the human voice from music tracks is notoriously difficult to do - but it can be done. It isn’t always possible to totally remove voice from a song because of varying factors, such as compression, stereo image separation, frequency spectrum, etc. However, with some experimentation, good quality audio, and a little bit of luck, you can achieve satisfactory results. 1. Winamp Plugin: AnalogX Vocal Remover If you use the Winamp software...

How to Secure your Gmail Account from Hackers

All of us have our Email Accounts on Gmail, Yahoo, Hotmail etc.Phising and hacking are on the rise and many of us have already faced the situtaions when our email Id has been compromised.It is very difficult to estimate the loss which one undergoes once his email ID has been hacked. Now you can add an extra layer of security in your Gmail Account.After enabling this feature you have to enter an addtional verification code (sent to...

Download torrent files directly using IDM/DAP OR ANY DOWNLOAD MANAGER

go to http://torrific.comregistercopy the torrent urland enjoy downloading with higher speed using a download manager :...

How to hack facebook, twitter, Gmail password using Winspy Keylogger

Keylogger is also onr of the best ways to hack password of facebook, gmail or any other website account. In this post i am going to show how to hack passwords using winspy keylogger. Read the steps givn below: 1. First of all get your Winspy keylogger. Download it from the link given below Download Here 2. After downloading, run the program and create the user id and pasword. Remember this password as it is required each time you start...

Tuesday, 27 September 2011

A Large List of Free PHP Hosting for Phishing

* 110mb - http://110mb.com/ * Ripway - http://ripway.com/ * SuperFreeHost - http://superfreehost.info/ * Freehostia - http://freehostia.com/ * Funpic - http://funpic.de/ * Freeweb7 - http://freeweb7.com/ * t35 - http://t35.com/ * Awardspace - http://awardspace.com/ * PHPNet - http://phpnet.us/ * Free Web Hosting Pro - http://freewebhostingpro.com/ * ProHosts - http://prohosts.org/ * AtSpace - http://prohosts.org/ * ByetHost - http://byethost.com/ * 000webhost - http://000webhost.com/ * My3GB - http://www.my3gb.com/ * Oxyhost - http://www.oxyhost.com/ *...

LFI dork LIST

inurl:/modules/mod_mainmenu.php?mosConfig_absolute_path= inurl:/include/new-visitor.inc.php?lvc_include_dir= inurl:/_functions.php?prefix= inurl:/cpcommerce/_functions.php?prefix= inurl:/modules/coppermine/themes/default/theme.php?THEME_DIR= inurl:/modules/agendax/addevent.inc.php?agendax_path= inurl:/ashnews.php?pathtoashnews= inurl:/eblog/blog.inc.php?xoopsConfig[xoops_url]= inurl:/pm/lib.inc.php?pm_path= inurl:/b2-tools/gm-2-b2.php?b2inc= inurl:/modules/mod_mainmenu.php?mosConfig_absolute_path= inurl:/modules/agendax/...

Making Twitter Phishing Site Tutorial

Hack Twitter Tutorial. Yah! Today is turn of Twitter. I am going to show you how to make the Twitter Phishing site, with which you can Hack any Twitter account ;) Step 1: The First Step in Making the site is to register an account at http://www.t35.com/(if you have account than you can skip first 2 steps) Step 2: Now Goto your email account that you gave and confirm your account with confirmation link. Step 3: Now Goto www.t35.com/login/...

How to Hack Websites using SQL Injection? A DETAILED TUTORIAL.

SQL Injection is a code injection technique that exploits a security vulnerability occurring in the database layer of an application. The vulnerability is present when user input is either incorrectly filtered for string literal escape characters embedded in SQL statements or user input is not strongly typed and thereby unexpectedly executed. It is an instance of a more general class of vulnerabilities that can occur whenever one programming...

Google Dorks For SQL Injetion

The following is a list of Google Dorks for SQLi Injection: inurl:index.php?id= inurl:trainers.php?id= inurl:buy.php?category= inurl:article.php?ID= inurl:lay_old.php?id= inurl:declaration_more.php?decl_id= inurl:ageid= inurl:games.php?id= inurl:age.php?file= inurl:newsDetail.php?id= inurl:gallery.php?id= inurl:article.php?id= inurl:show.php?id= inurl:staff_id= inurl:newsitem.php?num= inurl:readnews.php?id= inurl:top10.php?cat= inurl:historial...

A Huge List of VPN Downloads & Proxy Servers

What is a VPN? VPN stands for virtual private network. A VPN keeps your wireless communications safe by creating a secure "tunnel," though which your encrypted data travels. These tunnels cannot be entered by data that is not properly encrypted. Not only is data encrypted when you use a VPN, but the originating and receiving network addresses are also encrypted. This adds an extra layer of security. What is a proxy? Proxy sites enable...

Hack Mobile Phone using Bluetooth

Yes guys it is the mobile bluetooth hacker. It is a software which can be used to hack any mobile phone through bluetooth network. Once connected to a another phone via bluetooth you can do the following: 1) Call from his phone. It includes all call functions like hold etc. 2) Read his messages 3) Read his contacts 4) Change profile 5) Play his ring tone even if phone is on silent 6) Play his songs(in his phone) 7) Restart the phone  Switch off the phone 9) Restore factory settings 10) Change ringing volume Notes: 1.)...

 
Tricks and Tips