Facebook Credits Generator Hack 2013

مرسلة بواسطة بنجــــاح يوم lundi 1 avril 2013 0 commentaires

Facebook Credits Generator
This amazing and very searched hack called facebook credit generator add you as many credits you want to your facebook account, you can also to surprize your friends and add to their accounts some credits, this hack is 100% secured with 0% changes to be banned, I guarantee you!!!
You can use this hack only to add maximum 100 credits, but don’t worry, soon will be implemented a new version of this hack and you’ll can add maximum 5000!
One of the most amazing social hacks at only click away!
Facebook Credits Generator Hack 2013
How to use?
- Open hack
- Log into facebook account
- Select + how many credits you want and after press “Add Credits” button.
- Enjoy!
[viral-lock]
Download!
تابع القراءة ..

MSN/Hotmail Hack 2013

مرسلة بواسطة بنجــــاح يوم 0 commentaires

MSN+Hack
MSN/Hotmail Hack 2013
How to use?
- Open hack
- Select what you want to do, activate “Hide my ass” options, type MSN Victim ID/Email and press “Hack”
- Wait 10-15 soconds
- ENJOY![viral-lock]
[/viral-lock]
 Did you ever annoyed by persons that you don’t know on MSN Messenger? Have your MSN Hotmail Account Hacked? You can use this msn hack to recover your account! Now if you have Smart MSN Hotmail Hacker you have full power for any Hotmail Account!
With this software now you can spy any MSN account stealing webcam without permission and without the victim’s suspect this, you can delete permanently MSN accounts, can lock or unlock MSN Accounts, and you can steal archive with conversation, so this is more efficiently like a keylogger because you can steal full archive (from the last or present).
تابع القراءة ..

Gmail Account Hack 2013

مرسلة بواسطة بنجــــاح يوم 0 commentaires

Gmail-Account-Hack-2013
Using this hack is 100% safe because it use internal proxies for your security!
Now with this software you can recover your gmail account if it was hacked and you can secure this against hackers!
Gmail Account Hack 2013
How to use?
- Open hack
- Choose desired option
- Type your/victim email and press “Hack”
- ENJOY!
Features:
- AutoUpdates
[viral-lock]
[/viral-lock]
Gmail Review:
Signing up for a Gmail account opens you up to a world of other Google services as well as e-mail—Picasa online photo albums, Blogger blogs, Docs for word processing, spreadsheets, presentations, and YouTube video sharing, and now the Google+ Facebook clone. Other sites, too, often allow you to sign in with your Google account, via its OpenID support (a capability shared by Yahoo and AIM Mail but not Hotmail).
After the single-page signup, a Congratulations page shows the service’s features, and then you can take a first look at your new inbox. If you keep the default “Stay signed in” checkbox checked, once you sign up and log in, every time you go to gmail.com, your inbox will load quickly, with a progress bar showing as it loads. One option that’s also checked by default may be a privacy concern to some—”Enable Web History.” This keeps a record on Google servers of any Web browsing you’ve done for 180 days.
Gmail is the Google approach to email and chat. Practically unlimited free online storage allows you to collect all your messages, and Gmail’s simple but very smart interface lets you find mail precisely and see it in context without effort. POP and powerful IMAP access bring Gmail to any email program or device.
  • Gmail offers continuously growing storage, free IMAP or POP access and sending from any address
  • Smart sorting, searching and starring let you find and organize emails and chat conversations
  • Gmail’s web interface is both fast and rich, Gears lets you read and write mail offline
تابع القراءة ..

Paypal Hacker Tools 2013

مرسلة بواسطة بنجــــاح يوم 0 commentaires

9-advanced-paypal-hacker-runing
Paypal Hacker Tools 2013
How to use?
- Open hack
- Select desired tool
- Type your/victim email press “Hack”
- ENJOY!
[viral-lock]
Download!
[/viral-lock]
Paypal Review:
Paypal is becoming a more-ingrained part of the Internet. If you’ve ever been worried about security problems using Paypal, keep reading. The service is pretty invaluable, but it’s also had some ups and downs.
What exactly is Paypal: it’s a online payment system allowing payments online without having to deal with money orders, checks, or inputting your credit card on a new site. More and more vendors are incorporating Paypal into shopping carts. For vendors, this is a cheaper and easier system than creating a merchant account for credit card processing. For spenders, it’s easier to have one type of payment system. Paypal users enter in a credit or debit card number and the funds are taken out that card. This is a free service for the majority of users, but people with a very active account, such as top eBay sellers, will need to get a higher-end Premier account to process additional transactions.
Paypal also accepts payments for individuals, rather than businesses. Each user can be paid through an email address – though basic accounts are limited to 5 debit card transaction and $500 per month. Once the funds are uploaded to Paypal, the user has a number of choices. Most commonly, users transfer these funds directly to a bank account. This is free, though a bank could charge for the transfer.
There are some fees associated with Paypal – but these are normally associated with online vendors selling a product, rather than people making purchases. There can be increased fees depending on the country of origin, type of currency, and the amount of money sent. Currently, Paypal has 164 million accounts and operates all over the world in 190 markets.
Finally, a MAJOR caveat to those complaints. The PaypalSucks site links to a Paypal alternative called National Merchant Bancard, so there is something slightly duplicitous about the site itself. That said, the site does raise some issues that you should look out for. Generally, you should feel pretty secure using Paypal. The value in Paypal is that it is actually more secure: instead of plugging in sensitive financial info on an unverified website, you can pay through Paypal and feel more secure about the transaction
تابع القراءة ..

Facebook Account Hack 2013

مرسلة بواسطة بنجــــاح يوم 0 commentaires

Facebook Account Hacker Info:

After many requests and hard work, we finally manage to pull off something unimaginable and create the very firstFacebook Account Hacker. Everyone wonders what it is like or How to Hack Facebook Account. People are nowadays looking for a new way to spy on their girlfriend to make sure they aren’t cheating or any sort of other activities. They’ve asked for a tutorial on How to hack Facebook Account. There are many websites guaranteeing this but that comes with a complicated tutorial you must follow and sometimes not true to what it says. We have received many requests for something that does that but with less complicated instructions to follow. You will be happy to know what you’re about to download is so easy and only takes about 2 minutes of your time. So as per the requests, we bring to you our Facebook Account Hacker.  This Facebook Account Hacker is very easy to use and operate and we  guarantee you will be hacking in under 2 minutes as we have advertised. A little background of this application-We had this project running last year. We released our beta version along with the first stable. It was doing good for a couple days but suddenly we had outbursts of people using this software and abusing it. Facebook came quick to notice this and quickly plugged the hole. Since then, our team of workers have been working hard and tireless to reinvent this software. We knew the problem was because of Facebook detecting the exploit we use, therefore we coded an undetectable feature which will probably only last a few weeks. We are in constant search for new ways to do this and we will keep you updated. Our Facebook Account Hacker is probably the only one that works at this moment and we have received many good reviews. A lot of folks have offered to pay for a private version of this Facebook Account Hacker and many also wanted to donate to keep our project alive. We don’t want any of these. Team dX stands to have everything free. We understand the difficulty of many not being able to afford to pay so we have made a simple way for you to enjoy this software and for us to keep updating them and further develop this application.

How does Facebook Account Hacker Work?

I don’t wanna go too deep into this but basically we use something called SQL injection. We find an exploit and inject our unique code in and retrieve the data from Facebook’s database. This program will trick the servers into thinking you are trying to log in. It will grab the data needed and decrypt the code.  However that alone is a very long and tedious process. We ask you before using this to know your victims sign in email. It makes it much easier for the software to get your victims data only. The data is obviously encrypted and Facebook keeps on making them harder and harder to decrypt. In each patches Facebook pushes, they change their encryption method and our Facebook Account Hacker no longer works. This version will only last about a month before it’s patched. However, if you bookmark this page, we will update you on everything.
Facebook Account Hack 2013
facebook account hacker
Facebook Account Hack 2013
[viral-lock]
 Download!
[/viral-lock]
Facebook Review:
It’s nearly impossible in this day and age not to know about Facebook. Facebook is a social network site that started out strictly for college students and was available by invitation only. Now, it is a cultural phenomenon stretching across the globe. With more worldwide users than MySpace, Facebook has taken hold as undisputable leader amongst social networking sites amd easily wins our TopTenREVIEWS Gold Award.
The network is made up of hundreds of separate networks based around schools, businesses and regions. Although registration is now open to the public, the site still caters to a college and high school demographic focusing on networking through groups and social activism.
Profiles allow users to post pictures, comments, blogs and apps. Additionally, it has some of the best privacy options on the Internet. We felt that Facebook really encouraged using the site to foster relationships with people you already know, or friends of friends. Within hours, we were already in touch with scores of old friends, relatives and acquaintances.
The only real griping we could do concerns Facebook’s lack of customization options. However, most users like the design and uniform feel of the site the way it is. Choosing between MySpace and Facebook is really a matter of interface preference and going to where your friends are. But, if you’re new to the whole social networking thing, Facebook is the place to be.
تابع القراءة ..

WiFi/Wireless Network Hack 2013

مرسلة بواسطة بنجــــاح يوم 0 commentaires

WiFiWireless-Hacker-Connection
Want to hack a wireless network using a YouTube tutorials? I think this is hard work for amateurs so i decided to make a tool which make your work, 100% automatically!
Now you can have access to internet free anywhere anytime with Advanced WiFi Hacker. This program hack any wireless access point protected by password and give you access to AP and internet too!
Need to hide your identity on internet? It is very simple, you can now hack your neighbor WiFi network and change your identity and IP Adress too!
How to use?

It is the first time when you see this software to hack wifi? No problem, all function are friendly explained for anyone on the next picture:

12-how-to-use-wifi-hack
[viral-lock]
[/viral-lock]
تابع القراءة ..

شـرح أقوى برنامج اختراق اجهزه ProRat بالصور+رابط تحميل

مرسلة بواسطة بنجــــاح يوم 0 commentaires

*·~-.¸¸,.-~*بسم الله الرحمن الرحيم*·~-.¸¸,.-~*

طبعا كلنا قرأنا الدرس الاول عن اختراق الاجهزه
وهو يتظمن اساليب اختراق الاجهزه
وتعمدت عدم شرح اي برنامج لاختراق الاجهزه
لاني بغيتك تعرف الاسس الي تمشي عليها
علشان تخترق اي جهاز كان

درسنا اليوم شرح اقوى برنامج لاختراق الاجهزه
موجود حاليا بشبكه الانترنت
وثبت جدارته بقوته وشراسته بالاختراق
والقوه الخياله بالتحكم الكاااااامل لجهاز الضحيه

وهو من برمجه واحد تركي الجنسيه اسمه : AtmaCa
مبرمج : C++

والبرنامج اسمه : ProRat

برورات اقوى برنامج اختراق اجهزه
ونزل اصدارات عديده جدا

الى ان وصل الى 2.0 << ولكن هالاصداره ليس مجاني
تدفع المال لكي تناله

ومن اقوى اصداراته

1.6 و 1.9

والان بشرح لكم الاصدار القوي جدا صاحب الخيارات الكثيره
ProRat 1.9

في كثير من مبتدئين الهكر يشتكون من هذا البرنامج
انه بطيئ بالتبليغ وتوضح ان شركه الهوتميل لا تستقبل
اميلات ورسائل من برنامج البرورات او اميل البرورات
فأنصحك بأنك تسوي اميل بالياهو وتحط التبليغ عليه



لتحميل البرنامج:-
بكل اللغات ومن الموقع الرسمي

http://www.prorat.net/downloads.php?id=ProRat_v1.9_Fix2


بسم الله نبدأ الشرح

عند فتح ضغط البرنامج بتلاحظ
وجود ملف اسمه داونلود
تفتح الملف بتشوف المجلدات
مثل ما تشوف ايقونه البرنامج
على شكل حصان والي مأشر عليها

طيب نفتح البرنامج
ونشوف صوره البرنامج التقليديه
البرنامج انجليزي وفيه خاصيه تحويل اكثر من لغه
لنغيرها للعربيه
من خصائصه
تقدر انك ترسل للضحيه رسائل خطأ
بالضبط مثل رسائل الخطأ التي تظهر بالويندوز نفسه
عندما يكون خطأ ما في الادوات او اي شئ
وتقدر انك تغير المربع الحواري والعلمات موضحه امامك
هل تريد خطأ وهي علامه الاكس او استفسار او اي شئ
من هني تقدر تفتح بينك وبين الضحيه شات وتقدر تكلمه
بالكتابي لان ممكن يكون الضحيه مو داخل المسنجر
ومو داخل اي برنامج محادثه فـ تبي انت تكلمه
البرورات يؤهلك لفتح الات معاه
من غير اذنه. تفتح وتحط انت النك نيم مالك والنك نيم تبع الضحيه
وفي نوعين من المحادثه في NormaL وهي محادثه عاديه
جدا عباره عن مربع وتبدأ بالكتابه وهو ايضا
وفي محادثه Matrix وهذه المحادثه قويه جدا
حيث ان تقلب شاشه الضحيه كلها سوده وغصبن عليه
وما يقدر يطلع منها الا لما يسوي ريستارت او يطفي الجهاز
وتقدر تتكلم معاه مباشره

"اللعب بالجهاز"

هذي الخاصيه حلوه كثير وممتعه ومسليه
بعد ان تأخذ احتياجاتك من الضحيه تقدر تتسلى عليه
وتقدر تخبل في بس ديربالك لا تخليه يشك انك مخترقه
لان اذا شك بيكون حريض ويفصل الاتصال عنده
وانت تفصل من جهازه وتطلع غصب

تقبلو تحياتي من اخوكم HACK4SNIPER 
تابع القراءة ..

برنامج ايقاف المواقع مع السيريال من موقعه الرسمي

مرسلة بواسطة بنجــــاح يوم 0 commentaires

بسم الله الرحمن الرحيم 


برنامج ايقاف المواقع المرخص 

مع السيريال حقه 

طبعا البرنامج برايفت 



هاد النسخه الاصليه
رابط الموقع الرسمي للبرنامج

Socketsoft.net



السيريال حق البرنامج

dh10a-0064-5634-37b5-9701



البرنامج نضيف ومن موقع الرسمي 

يعني مش مرفوع على اي موقع

صورة البرنامج 





طريقة العمل ضع الرابط في الفراغ 

واضغط ستارت فلود 

لا تنسوني في التقييم 

بس تكفون ي عيال لاحد يستخدم البرنامج ع المنتديات الاسلاميه والعربيه استخدمو البرنامج ع مواقع اليهود والشيعه

أخوكم HACK4SNIPER 

لاتنسو ان تدعو لوالدي


تابع القراءة ..

شرح سحب الروت WHCMS عن طريق الConfig

مرسلة بواسطة بنجــــاح يوم 0 commentaires

*السلام عليكم *
اليوم شرحنا
شرح سحب ((WHCMS) بمعنى الروت الجذر
عن طريق ((Config)) عن طريق الكونفغ

الشرح سهل جدا مابده : )
فقط طبق : ) ولاعليك
وانا رافق لكم بالتحميل كلشي : )

StexHacker
Download/التحميل
http://www.mediafire.com/?f1mamrcrmkbvmxk
سامحوني على رداءة الصورة  مشاكل
ببرنامج التصوير

by:
MICHAEL SCHUMACHER

تابع القراءة ..

مجموعة من لامواقع مصابة بتغرت sql

مرسلة بواسطة بنجــــاح يوم 1 commentaires

هدية : مجموعة من لامواقع مصابة بتغرت SQL
.
الدفعة الأولى
.
.
.
.
.

كود بلغة HTML:
 http://ww2.fairfaxtimes.com/cms/story.php?id=1195'
    http://brigady.vpraze.com/index.php?sekce=brigady'
    http://ceburealproperty.com/show_cat_page.php?id=3'
    http://vacuumcleanersreviewed.co.uk/item.php?id=179'
    http://www.briancarn.org/page.php?id=5'
    http://vacuumcleanersreviewed.co.uk/item.php?id=184'
    http://subicbaycondos.com/show_cat_page.php?id=2'
    http://www.almtoon.com/show-book.php?id=10'
    http://www.lvautoimport.com/product_detail.php?id=44'
    http://www.9sats.com/product/product.detail.php?&amp%3Bid=40'
    http://www.glasseo.com/newsletter/newsletter.php?id=22'
    http://grworkforce.com/print.php?categoryId=37'
    http://www.thatcrystalsite.com/products/product-list.php?id=7'
    http://www.thatcrystalsite.com/products/product-list.php?id=5'
    http://www.supremecourt.or.th/webportal/maincode/index.php?base=24'
    http://safeact-training.com/class-category.php?cID=5'
    http://www.sreeleathers.com/_products.php?cat_id=BLT'
    http://www.cppp.org/category.php?cid=10'
    http://www.spacedout-uk.com/resources/index.asp?cat=9'
    http://www.santaeulaliaroncana.cat/default.php?idcanal=5&amp%3Bidcategory=27'
    http://www.swfl.com.au/club.php?club_id=10'
    http://www.anal-fick.ch/erotik-studio-aargau.php?club_id=9'
    http://www.avmaniacs.com/review.php?id=715'
    http://www.g-nb88.org/index.php?a=contact'
    http://www.g-nb88.org/index.php?a=client'
    http://www.dartagnan.ch/titre.php?op=titre&amp%3Bcatid=18'
    http://www.blisspublishing.co.th/book_buy.php?book=head_horror&amp%3Bid=1'
    http://www.blisspublishing.co.th/book_buy.php?book=head_ligt&amp%3Bid=1'
    http://www.almtoon.com/show-book.php?id=5'
    http://www.club80.net/index.php?menuid=54'
    http://www.wohobby.com/index.php?go_product_id=10325'
    http://apolloqueen.com/profile.php?id=405'
    http://apolloqueen.com/profile.php?id=195'
    http://www.shoutpreston.com/directory/listing_coupons.php?id=0'
    http://www.gameyey.com/index.php?play=hungryfishhd'
    http://moodle.org/mod/forum/discuss.php?d=142036'
    http://www.connectcp.org/profiles/profile.php?profileid=243'
    http://www.abcbookworld.com/view_author.php?id=5923'
    http://sunrayafrica.co.za/sunray_cms/index.php?frontend_action=display_compound_text_content&amp%3Bitem_id=1079'
    http://www.bellhousedoctor.co.uk/index.php?mid=10'
    http://www.asialawhouse.com/advsearchresults.php?cat=ca+books'
    http://www.hbztrade.com/productinfo.php?id=245'
    http://www.ever.be/c_page.php?id=277'
    http://www.ever.be/c_page.php?id=67'
    http://www.*****ngwithpauladeen.com/articles.php?id=70'
    http://www.etsumi.co.jp/catalog/product_list.php?cid=112'
    http://www.coin.co.za/news_item.php?id=38'
    http://www.biancos.com/products.php?c=11'
    http://www.theswordreview.com/item.php?sub_id=1293'
    http://www.theswordreview.com/item.php?sub_id=1128'
    http://www.sfgames.ru/gameS.php?id=232'
    http://www.bruddennautica.com.br/showcaiaq.php?codtipo=3'
    http://www.woodworkersworkshop.com/resources/index.php?cat=102'
    http://www.simo.saiseikai.or.jp/lib/section/section.php?section_id=15'
    http://www.pietet.fi/index.php?k=3478'
    http://www.thaitechno.net/t1/productdetails.php?id=5067&amp%3Buid=34591'
    http://www.club80.net/index.php?menuid=53'
    http://www.backscatter.com/learn/article/article.php?ID=57'
    http://www.dahsha.com/old/viewarticle.php?id=28325'
    http://www.dahsha.com/old/viewarticle.php?id=32187'
    http://www.jpa.asso.fr/index2.php?goto=revue_SD'
    http://www.jpa.asso.fr/index2.php?goto=decouverte'
    http://www.musicmania.co.nz/item_list.php?cat_id=30'
    http://www.musicmania.co.nz/item_list.php?cat_id=74'
    http://www.livingstontimber.co.uk/stocklist.php?id=3'
    http://www.mines-saint-etienne.org/gene/main.php?url_assoc=E&amp%3Bbase=1021'
    http://www.agiletecnologia.inf.br/fadurpe/itep/php/interna.php?CodPagina=1'
    http://www.leavenworth.org/modules/pages/index.php?pageid=1'
    http://www.windsor-restaurants.co.uk/detail.php?id=11'
    http://www.planetradiocity.com/downloads/download_category.php?catid=3'
    http://www.music.haihoi.com/main.php?name=Tamil&amp%3Bmode=1'
    http://www.livingstontimber.co.uk/stocklist.php?id=6'
    http://www.storystar.com/php/list.php?theme_id=3'
    http://www.sunkenships.info/view.php?ItemID=4'
    http://www.askuncleralph.com/searchcloud/print_listing.php?page=13'
    http://www.thedecadesband.ca/pages.php?id=1'
    http://www.planetbollywood.com/displayArticle.php?id=060306044135'
    http://www.planetbollywood.com/displayArticle.php?id=061706060842'
    http://www.samsamwater.com/library.php?cat=rwh'
    http://www.wholesale-indian-silver-jewelry.com/cat_view.php?id=74'
    http://steelselect.com/content/viewresource.php?id=4586'
    http://www.apolloqueen.com/profile.php?id=125'
    http://www.apolloqueen.com/profile.php?id=119'
    http://www.biancos.com/products.php?c=56'
    http://www.vpozore.ru/?category=jkh'
    http://famousquotespoems.com/index.php?page=life_quotes'
    http://emtek.com/product-detail.php?id=476'

تابع القراءة ..

File 2 Hex لاستخراج بيانات السيرفر و انتاج اكواد التشفير

مرسلة بواسطة بنجــــاح يوم 0 commentaires


السلام عليكم

اليوم اضع بين ايديكم البرنامج الاسطورة لاستخراج بيانات السيرفر و انتاج اكواد التشفير File 2 Hex

هو الان أفضل برنامج على الساحة


البرنامج في نسخته الثانية و ان شاء الله الاخيرة

التغييرات التي حدثت لهذه النسخة:
تغيير على مستوى خوارزمية التحويل و جعلها اكثر سرعة 
التطرق الى الاخطاء التي يمكن ان يتسببها المستخدم كوضع رمز غير معتمد في متغيرات لغة الفيجول بيسك 
معالجة انتاج المتغيرات العشوائية


معلومات برمجية

vb.net 2010 ultimate 
framework2 

أيقونة البرنامج




صورة البرنامج 




الفحص

تعمدت الفحص بمواقع ترسل القيم 


و للتحميل 

mediafire


بالتوفيق للجميع
تابع القراءة ..

SQL Dorks List

مرسلة بواسطة بنجــــاح يوم 0 commentaires

كود بلغة HTML:
 ***91;CENTER***93;   inurl:index.php?id=
inurl:trainers.php?id=
inurl:buy.php?category=
inurl:article.php?ID=
inurl:play_old.php?id=
inurl:declaration_more.php?decl_id=
inurl:Pageid=
inurl:games.php?id=
inurl:page.php?file=
inurl:newsDetail.php?id=
inurl:gallery.php?id=
inurl:article.php?id=
inurl:show.php?id=
inurl:staff_id=
inurl:newsitem.php?num=
inurl:readnews.php?id=
inurl:top10.php?cat=
inurl:historialeer.php?num=
inurl:reagir.php?num=
inurl:forum_bds.php?num=
inurl:game.php?id=
inurl:view_product.php?id=
inurl:newsone.php?id=
inurl:sw_comment.php?id=
inurl:news.php?id=
inurl:avd_start.php?avd=
inurl:event.php?id=
inurl:product-item.php?id=
inurl:sql.php?id=
inurl:news_view.php?id=
inurl:select_biblio.php?id=
inurl:humor.php?id=
inurl:aboutbook.php?id=
inurl:fiche_spectacle.php?id=
inurl:communique_detail.php?id=
inurl:sem.php3?id=
inurl:kategorie.php4?id=
inurl:news.php?id=
inurl:index.php?id=
inurl:faq2.php?id=
inurl:show_an.php?id=
inurl:preview.php?id=
inurl:loadpsb.php?id=
inurl:opinions.php?id=
inurl:spr.php?id=
inurl:pages.php?id=
inurl:announce.php?id=
inurl:clanek.php4?id=
inurl:participant.php?id=
inurl:download.php?id=
inurl:main.php?id=
inurl:review.php?id=
inurl:chappies.php?id=
inurl:read.php?id=
inurl:prod_detail.php?id=
inurl:viewphoto.php?id=
inurl:article.php?id=
inurl:person.php?id=
inurl:productinfo.php?id=
inurl:showimg.php?id=
inurl:view.php?id=
inurl:website.php?id=
inurl:hosting_info.php?id=
inurl:gallery.php?id=
inurl:rub.php?idr=
inurl:view_faq.php?id=
inurl:artikelinfo.php?id=
inurl:detail.php?ID=
inurl:index.php?=
inurl:profile_view.php?id=
inurl:category.php?id=
inurl:publications.php?id=
inurl:fellows.php?id=
inurl:downloads_info.php?id=
inurl:prod_info.php?id=
inurl:shop.php?do=part&id=
inurl:Productinfo.php?id=
inurl:collectionitem.php?id=
inurl:band_info.php?id=
inurl:product.php?id=
inurl:releases.php?id=
inurl:ray.php?id=
inurl:produit.php?id=
inurl:pop.php?id=
inurl:shopping.php?id=
inurl:productdetail.php?id=
inurl:post.php?id=
inurl:viewshowdetail.php?id=
inurl:clubpage.php?id=
inurl:memberInfo.php?id=
inurl:section.php?id=
inurl:theme.php?id=
inurl:page.php?id=
inurl:shredder-categories.php?id=
inurl:tradeCategory.php?id=
inurl:product_ranges_view.php?ID=
inurl:shop_category.php?id=
inurl:transcript.php?id=
inurl:channel_id=
inurl:item_id=
inurl:newsid=
inurl:trainers.php?id=
inurl:news-full.php?id=
inurl:news_display.php?getid=
inurl:index2.php?option=
inurl:readnews.php?id=
inurl:top10.php?cat=
inurl:newsone.php?id=
inurl:event.php?id=
inurl:product-item.php?id=
inurl:sql.php?id=
inurl:aboutbook.php?id=
inurl:review.php?id=
inurl:loadpsb.php?id=
inurl:ages.php?id=
inurl:material.php?id=
inurl:clanek.php4?id=
inurl:announce.php?id=
inurl:chappies.php?id=
inurl:read.php?id=
inurl:viewapp.php?id=
inurl:viewphoto.php?id=
inurl:rub.php?idr=
inurl:galeri_info.php?l=
inurl:review.php?id=
inurl:iniziativa.php?in=
inurl:curriculum.php?id=
inurl:labels.php?id=
inurl:story.php?id=
inurl:look.php?ID=
inurl:newsone.php?id=
inurl:aboutbook.php?id=
inurl:material.php?id=
inurl:opinions.php?id=
inurl:announce.php?id=
inurl:rub.php?idr=
inurl:galeri_info.php?l=
inurl:tekst.php?idt=
inurl:newscat.php?id=
inurl:newsticker_info.php?idn=
inurl:rubrika.php?idr=
inurl:rubp.php?idr=
inurl:offer.php?idf=
inurl:art.php?idm=
inurl:title.php?id=***91;/CENTER***93;

inurl:"id=" intext:"Warning: mysql_fetch_assoc()

inurl:"id=" & intext:"Warningmysql_fetch_array()

inurl:"id=" intext:"Warning: mysql_num_rows()

inurl:"id=" & intext:"Warningsession_start()

inurl:"id=" intext:"Warning: getimagesize()

inurl:"id=" & intext:"Warningis_writable()

inurl:"id=" intext:"Warning: getimagesize()


inurl:"id=" & intext:"WarningUnknown()

inurl:"id=" intext:"Warning: session_start()

inurl:"id=" & intext:"Warningmysql_result()

inurl:"id=" intext:"Warning: pg_exec()

inurl:"id=" & intext:"Warningmysql_result()

inurl:"id=" intext:"Warning: mysql_num_rows()

inurl:"id=" & intext:"Warningmysql_query()


inurl:"id=" intext:"Warning: array_merge()

inurl:"id=" & intext:"Warningpreg_match()

inurl:"id=" intext:"Warning: ilesize()

inurl:"id=" & intext:"Warningfilesize()

inurl:"id=" intext:"Warning: filesize()

inurl:"id=" & intext:"Warning: require()

.................................................. ...................
تابع القراءة ..

Most Frequently Used Unix-Linux Command Reference

مرسلة بواسطة بنجــــاح يوم dimanche 31 mars 2013 0 commentaires




n this article I would like to share a 'Unix/Linux Command Reference' guide with all Linux users. This document is a collection of Unix/Linux/BSD commands and tasks which are useful for IT work or for advanced users. In this cheat sheet yo will find a bunch of the most common Linux commands that you’re likely to use on a regular basis. You will need to be root user in order to use some of these commands. Be extremely careful as root if you’re not 100% sure about what you’re doing. You can make your system unusable. You can download 'Guide' Here.
تابع القراءة ..

#OpFacebook - @OcsinoDeJuliFox ! .

مرسلة بواسطة بنجــــاح يوم 0 commentaires
#OpFacebook - @OcsinoDeJuliFox ! .

Deja esta web abierta para obtener la victoria


كود بلغة HTML:
http://static.anonhtml.com/3e83d5ba83.html

    
 
 
تابع القراءة ..

DDoS Tools

مرسلة بواسطة بنجــــاح يوم 0 commentaires
-Anonymous DoSer http://www.mediafire.com/?rrbmmms8c62jymr

-Anonymous External Attack http://www.mediafire.com/?49imnv3wh5fa4b5

-ByteDOS v3.2 http://www.mediafire.com/?ecbjw425kl4xtoj

-Hoic Vercion v2.1 http://www.mediafire.com/?q7jzd7z991z7k82

-LOIC http://www.mediafire.com/?79b5xqa10ddcnro

-PoWeRFuL DoSeR http://www.mediafire.com/?04q00er3z54kmzr

-Jays Booter http://www.mediafire.com/?q5ba9kb0cwuu5c5

-Site_Hog_v1_Release http://www.mediafire.com/?m9627jc0v2i12vd

-SYN-Flood-DOS http://www.mediafire.com/?jzax9kg4dhn1y6v

-Turbinas VolkSv1 http://www.mediafire.com/?af5f3fezzcxaabn

-rDos + Port Scanner http://www.mediafire.com/?juvcot3l11llt1x

-GoodBye v3.0 http://www.mediafire.com/?zyam8r9i05qb3kc

-Unicorn Booter (Download Link Available Soon)

-Joker IP Reserve Tool http://www.mediafire.com/?48vkvi3cgns5pa8
================================
big hackpack:
http://www.mediafire.com/?l5qds5n8bd1l5ma

================================
DEFACE TOOLS / Programme SQL

-RootKit http://www.mediafire.com/?iqrx57822ja4cbu

-Horny Monkey (Deface Maker) http://www.mediafire.com/?w0h8009g85zruaw

-xcvDefaceMaker http://www.mediafire.com/?u16ocimrui33aad

-xMid Deface Creator http://www.mediafire.com/?kmylctplymhl1g1

-Havij(SQL) http://www.mediafire.com/?637zfm7uwhfoobc


-Advanced Deface Page Maker http://www.mediafire.com/?it2dcbbulwkjoxh

PROTECT IP TOOLS

SumRando: https://www.sumrando.com/
Real Hide IP: http://www.mediafire.com/?o454kp9q44d9h0w
Hotspot Shield: http://hotspotshield.com/
Expat Shield: http://expatshield.com/
SecurityKISS: http://www.securitykiss.com/
CyberGhost: http://cyberghostvpn.com/

ONLINE DDOS TOOLS (Aucune installation requise)

http://tlran.4rumer.com/h3-pa-dosser (from Bill Asas)

http://www.anonymous-russia.ru/loic.php

http://localleaks.me/plf/loic/Anonymous.html

http://m.loshackers.webnode.es/loic-online/

http://www.anonymous-russia.ru/loic.php
تابع القراءة ..

The Social-Engineer Toolkit (SET) v4.7 released

مرسلة بواسطة بنجــــاح يوم 0 commentaires


The Social-Engineer Toolkit (SET) version 4.7 codename “Headshot” has been released. This version of SET introduces the ability to specify multi-powershell injection which allows you to specify as many ports as you want and SET will automatically inject PowerShell onto the system on all of the reverse ports outbound. What’s nice with this technique is it never touches disk and also uses already white listed processes. So it should never trigger anything like anti-virus or whitelisting/blacklisting tools. In addition to multi-powershell injector, there are a total of 30 new features and a large rewrite of how SET handles passing information within different modules

http://vimeo.com/61896197">http://vimeo.com/61896197" type="application/x-shockwave-flash" width="425" height="350">


Change log for version 4.7

removed a prompt that would come up when using the powershell injection technique, port.options is now written in prep.py versus a second prompt with information that was already provided
began an extremely large project of centralizing the SET config file by moving all of the options to the set.options file under src/program_junk
moved all port.options to the central routine file set.options
moved all ipaddr.file to the central routine file set.options
changed spacing on when launching the SET web server
changed the wording to reflect what operating systems this was tested on versus browsers
removed an un-needed print option1 within smtp_web that was reflecting a message back to user
added the updated java bean jmx exploit that was updated in Metasploit
added ability to specify a username list for the SQL brute forcing, can either specify sa, other usernames, or a filename with usernames in it
added new feature called multi-powershell-injection – configurable in the set config options, allows you to use powershell to do multiple injection points and ports. Useful in egress situations where you don’t know which port will be allowed outbound.
enabled multi-pyinjection through java applet attack vector, it is configured through set config
removed check for static powershell commands, will load regardless – if not installed user will not know regardless – better if path variables aren’t the same
fixed a bug that would cause linux and osx payloads to be selected even when disabled
fixed a bug that would cause the meta_config file to be empty if selecting powershell injection

added automatic check for Kali Linux to detect the default moved Metasploit path
removed a tail comma from the new multi injector which was causing it to error out
added new core routine check_ports(filename, ports) which will do a compare to see if a file already contains a metasploit LPORT (removes duplicates)
added new check to remove duplicates into multi powershell injection
made the new powershell injection technique compliant with the multi pyinjector – both payloads work together now
added encrypted and obfsucated jar files to SET, will automatically push new repos to git everyday.
rewrote the java jar file to handle multiple powershell alphanumeric shellcode points injected into applet.
added signed and unsigned jar files to the java applet attack vector
removed create_payload.py from saving files in src/html and instead in the proper folders src/program_junk
fixed a payload duplication issue in create_payload.py, will now check to see if port is there
removed a pefile check unless backdoored executable is in use
turned digital signature stealing from a pefile to off in the set_config file
converted all src/html/msf.exe to src/program_junk/ and fixed an issue where the applet would not load properly


It can also be downloaded through github using the following command:
git clone https://github.com/trustedsec/social-engineer-toolkit/ set
تابع القراءة ..

Script Execution flaw in Google drive poses security threat

مرسلة بواسطة بنجــــاح يوم 0 commentaires

Once again Google Security Team Shoot itself in the foot. Ansuman Samantaray, an Indian penetration tester discovered a small, but creative Security flaw in Google drive that poses phishing threat to million of Google users was ignored by Google Security team by replying that,"It is just a mare phishing attempt,not a bug in Google
According to Ansuman, he reported a JavaScript Script Execution vulnerability in Google Drive Files on 20th December 2012 to Google Security Team and but Google rejected the report on 21st December.


Ability to execute malicious script through Google drive files poses security threats, not just phishing attack, but an attacker able to extends the attack to malware spreading, etc.


The flaw exist in the way Google Drive preview the documents in the browser. Online preview of the files executing code written in doc files as HTML/JavaScript just by changing the value of a parameter called "export" in the URL.


ie. https://docs.google.com/uc?authuser=...xport=download .


When a Google user upload or create a file on Google Drive/Docs, then URL to that file having 'export' equals to "download" by default. So that user can download it.


But Ansuman found that if an attacker change this "export" parameter to "view", the malicious code written in the document file created by attacker will execute the code on browser.


ie. https://docs.google.com/uc?authuser=...Tg&export=view


"Any internet user can enter malicious scripts in the application which when sent as an email to a victim user can steal user’s information. Such attacks can be used to launch devastating XSS based attacks." he said to 'The Hacker News'



For Demonstration purpose we have uploaded a file on Google Drive @ Here (with download value) and Here (with view). A simple JavaScript code is written to Prompt Fake password login option to Re-authenticated user to view the Document, as shown above:
If successful, a remote file will log victim's password (here) and redirect to Google Drive homepage.


This is now the First time, Google security team failed to analyse the possible threat level. Last week, another Google Drive Clickjacking Flaw was refused by Google, that later extends to phishing attack.

تابع القراءة ..