28 Jan 2016

Posted by 254 cYbeR hACK3r On 08:14
Step 1. You need to have python installed on your machine to run this code. if not installed , install using below link http://www.python.org/getit Step 2. Download the ibilisadmintrace.py from the link http://www.mediafire.com/view/jcimu9vyb1vcwwg/ibilisiAdminTrace.py and Save the file to default path of Python installation i.e default is : - C:\pythonXX\ So copy ibilisiAdminTrace.py to the folder (C:\pythonXX\) Step 3. Follow the screen...
Posted by 254 cYbeR hACK3r On 02:27
Download the windows Exe here How to use it : Extract Zip Open mole.exe Write (url tragetedwebsite.com:.php?id=) Then write needle (any keyword on website) Then write schemas Wait for few seconds All database of website will come Then write tables dbname Then write columns dbname tablename Then write query dbname tablename col1,col2,col3 Enjoy!!...

26 Jan 2016

Posted by 254 cYbeR hACK3r On 05:08
 How to install? Download and extract the file Copy and paste it anywhere you like Run Console.exe Enjoy :)  How to enable transparent window?  Go to Edit>Settings You will see a new popup window, click on Appearance>More. Under Windows Transparency setting, click on Alpha and adjust the transparency rate , click OK, and you good to go. Downloads Backtrack Terminal (1.6MB) / Mirror          ...
Posted by 254 cYbeR hACK3r On 02:22
HOW TO DO PHISHING ? STEP 1: Firstly U Must Signup For A Free Web Hosting Service Like:www.freehostia.comwww.ripway.comwww.my3gb.comwww.000webhost.comAnd Register A Domain Or Subdomain.After Getting Your Signup Done, You Have Your Own Subdomain Like For Instance You Registered With Freehostia, Then Your Domain Is Like "www.Yourname.my3gb.Com" STEP 2: Now Login To Your Freehostia Account And Go To "File Manager" In The my3gb Control Panel.STEP 3:Now what you have to do is, go to your domain folder like "yourname.my3gb.com" and create...
Posted by 254 cYbeR hACK3r On 02:10
You might be very happy right now because of the availability of high speed Internet, but when you get to encounter hackers, everything seems to become frustrating. Your personal information gets stolen and social media accounts like Facebook get invaded. Hackers are definitely a huge disturbance. They’re not merely robbers, but killers to the connection as well. They can spread viruses that consume a huge part of your bandwidth. They are among the reasons why even a high speed internet becomes sluggish. If you are curious about...

5 Jan 2016

Posted by 254 cYbeR hACK3r On 00:58
Well, If you are a regular reader of this blog the chances are very less that you might not know about keyloggers as I have not written about it. However in this post I will guide you on simple ways to use a keylogger inside Metasploit once you have opened up a meterpreter session with victims computer. For those of you who don't know what metasploit is kindly refer the book hd.powersat.org/Trainings/MetasploitGuide.pdf" What is a Meterpreter? Basically...

27 Dec 2015

Posted by 254 cYbeR hACK3r On 01:52
Android is the great Mobile OS ever built for the smartphone. You can do lots of experiments and amazing things with your phone. Android is not just a machine, It is fully featured computer machine.When you rooted your android phone , you gain complete access your android phone. You can run some ethical hacking android apps in the phone that make your android phone into a fully-featured hacking machine Here we provide you a full collection of hacking...