Kali Linux Fanpage

Like us on Facebook!

Learn Kali Linux

All (video) tutorials to learn Kali FAST!

adfly

Like us on facebook!

Subscribe Now!

četvrtak, 20. lipnja 2013.

Best Collection Of Shells

c0derz shell confkiller databasedhanush shelldomainslolprivateSafe_Modeshell2SimShell 1.0Symlink_sa 3.0WSO   DOWNLOAD...

srijeda, 19. lipnja 2013.

How to crack cpanel 2013

Download: bt.py : http://adf.ly/QnJ0z bt.php : http://adf.ly/Qn...

Hacking web server in armitage

...

PhpMyAdmin version 3.5.7 vulnerable to Cross Site Scripting

phpMyAdmin is a free software tool written in PHP, intended to handle the administration of MySQL over the World Wide Web. phpMyAdmin supports a wide range of operations with MySQL. phpMyAdmin 3.5.0 to 3.5.7 versions are vulnerable to Reflected XSS in "tbl_gis_visualization.php", as mentioned in advisory. The reason for XSS is stated as insufficient sanitization...

utorak, 18. lipnja 2013.

New sms spoofer across 100 countries

SMS spoofing is a relatively new technology which uses the short message service (SMS), available on most mobile phones and personal digital assistants, to set who the message appears to come from by replacing the originating mobile number (Sender ID) with alphanumeric text. Spoofing has both legitimate uses (setting the company name from which...

HOW TO CRACK WPA/WPA WITHOUT WORDLIST

Reaver implements a brute force attack against Wifi Protected Setup (WPS) registrar PINs in order to recover WPA/WPA2 passphrases, as described in http://adf.ly/Q210f Reaver has been designed to be a robust and practical attack against WPS, and has been tested against a wide variety of access points and WPS implementations. On average Reaver will recover the target AP's...

Hack remote computer via ip and open port

Literally, hacking is accessing something or somebody in internet without their permission or interest. While, speaking in summary, hacking is very easy job, it is like instead of using front door, finding the hidden door of a house and hijacking the precious things. Among all the hacking, hacking via IP address is one of the most common yet powerful beginning. You...