final Wifi crack

Hack WPA2 Encrypted Wi-Fi Networks using Aircrack-ng

3
Hack  WPA2 Encrypted Wi-Fi Networks using Aircrack-ng | Kali-Linux Hello friend ,In this article I will demonstrate how to crack or hack some one's WiFi Network just in simple steps...
Format string exploits

Format string exploits

0
Format string exploits became public in late 2000. It is easy to find errors in format string in comparison of buffer overflows. Once errors are spotted, they are usually...
pentestbox , pentest box

PentestBox: A Portable Penetration Testing Distribution for Windows Environments

0
Download SourceForge                                              Download Torrent PentestBox is a...
Hacking with Android Smartphone using zANTI 2

Hacking with Android Smartphone using zANTI2

2
Download zANTI 2.2(Apk) Hacking with Android Smartphone using zANTI2 zANTI2 is a Network Analysis and penetration suit developed by ZImperium family as a software developer and researcher, the name zANTI2 comes...
metasploit Unleashed

Explore into the Metasploit ( a Ultimate Hackers Tool)

0
  Metasploit is a complete and a Ultimate Security tool that provides information about Computer Security Vulnerabilities and also use in penetration testing .It was develop by HD Moore in...

Exploit Development Process:Moving towards Real world Hacking

0
Now that we have covered basics of exploit , you are ready to look at real world examples like metasploit . As you all know - vulnerabilities in real...
Exploit Shell code using Command-line

Exploit using shell code from command line

0
After reading our previous post:Exploiting buffer overflows using command line it's time to do Exploit Shell code using Command-line but I think you do want to clear your doubt...
Ten hilarious facts that only programmers can understand

Exploiting buffer overflows using command line

0
After reading our previous post: Next step moving towards exploit:Finding the return address ,it's time to do some command line exploits. So this post is regarding Exploiting buffer...
Next step towards exploit : finding the return address

Next step towards exploit : finding the return address

0
Hey friends , I think it's the time to take next step towards exploit after reading our all previous posts . In this tutorial you will learn about :...
Sound-Fix in Kali

Important things to do after installing Kali Linux

2
There are small set of important softwares that are required after installation of Kali Linux. Linux operating system is not too much user friendly but it is highly flexible...
How to Install Kali without any Problem

Complete Guidance to Install Kali linux in Dual Boot Mode without any Problem

2
Before start Complete Guidance to Install Kali linux in Dual Boot Mode without any Problem remember it's slogan:- The Quiter you become ,the more you are able to hear Do you...
malware attack on facebook

Malware Attack on Facebook effect more than 110,000 users

0
  Malware attack on Facebook On Friday malware attack on Facebook is reported. Malware attack on Facebook infected more than 110,000 users. There are some pornography links on Facebook. When user click...
Mozilla Placing High Bandwidth Tor Middle Relays

Mozilla Placing High Bandwidth Tor Middle Relays

0
 Mozilla Placing High Bandwidth Tor Middle Relays  Mozilla Placing High Bandwidth Tor Middle Relays to add more secure anonymity in Firefox. Tor and Mozilla working together to provide a more...

Google reveals three Apple OS X zero-day flaws

0
Once again Google proved that they have strong security team which can expose not only Microsoft vulnerabilities but Apple OS X can also stand in the same category. Google expose...
get into friends whatsapp

How to get into friends whatsapp and send messages

11
I don't know that how to Express this success !!! Everybody knows that hacking is just a creativity and finding the way to get deeper into the code. So...
whatsapp vs whatsapp plus

Recently Whatsapp Banned users for using Whatsapp Plus Application

0
OOOOhh cut off with friends due to using watsapp plus :( i missed my friends , my watsapp plus stop working :`( ...
Memory management in C Programming

Memory management in C Programming:Computer Memory

0
Memory management in C is one of the important topic as it's not only about memory management in c but also about Computer Memory Management. In this section you...
Vulnerability in PayPal user authentication system

Vulnerability in PayPal user authentication system

0
It's always a matter of attraction when money is in the frame of attack. So It's time to get into the users PayPal account.. Paypal provides online / ebay...
Basic Linux Exploits : Moving towards exploit

Basic Linux Exploits: Moving towards exploits

0
Note: Hacking is not a joke so please keep patience and learn it step by step. If you have read all our previous posts , you are ready to exploits the...
Crash you friends whatsapp by sending 200 kb message

Crash friends whatsapp by sending 200 kb message

4
To Download Special characters  Click Here This time again!!! Indian teenagers just do the magic ;) They again find a bug in whatsapp which is recently purchased by facebook in...
Basic Linux exploits: Function Calling Procedure

Basic Linux exploits: Function Calling Procedure

0
Note: Hacking is not a joke so please keep patience and learn it step by step. Note: Before reading this post you must read : Learn hacking...
Bacic Exploits : Stack Operations

Basic Exploits : Stack Operations

0
Note: Hacking is not a joke so please keep patience and learn it step by step. Stack Operations First and the most important topic to learn the basics of Exploits is...
facebook verification page has bug

Facebook verification page has bug found by team Buffercode

5
Note: I already send report for this bug , I  hope Team Facebook will change their algorithm for this page.  New Bug has found by team Buffercode in Facebook It's always...

Now facebook introduced new “Facebook groups app” on 18 November

0
Facebook groups app for facebook lovers: Peoples use facebook to keep contact with friends and family who may live far from them or not. To keep in contact with friends...

How to secure your account from phishing attacks on Internet

11
Note: Instead of using backtrack use Kali Linux | Rebirth of BackTrack, the Penetration Testing Creating Phishing page to know the safety cautions on Internet To know the cautions we must know...
best compiler for c / c++

Basic Linux Exploits:Make your Pc more secure

0
Basic Linux Exploits:Make your Pc more secure and learn the basics of computer world Why study Exploits? Before learning exploits ,one should know about vulnerability.What does it means in the world...