Step 1.
You need to have python installed on your machine to run this code. if not installed , install using below link
http://www.python.org/getit
Step 2.
Download the ibilisadmintrace.py from the link http://www.mediafire.com/view/jcimu9vyb1vcwwg/ibilisiAdminTrace.py and Save the file to default path of Python installation i.e default is : - C:\pythonXX\
So copy ibilisiAdminTrace.py to the folder (C:\pythonXX\)
Step 3.
Follow the screen...
28 Jan 2016
Posted by
254 cYbeR hACK3r
On
02:27

Download the windows Exe here
How to use it :
Extract Zip
Open mole.exe
Write (url tragetedwebsite.com:.php?id=)
Then write needle (any keyword on website)
Then write schemas
Wait for few seconds
All database of website will come
Then write tables dbname
Then write columns dbname tablename
Then write query dbname tablename col1,col2,col3
Enjoy!!...
Categories:
26 Jan 2016
Posted by
254 cYbeR hACK3r
On
05:08

How to install?
Download and extract the file
Copy and paste it anywhere you like
Run Console.exe Enjoy :)
How to enable transparent window?
Go to Edit>Settings
You will see a new popup window, click on Appearance>More. Under Windows Transparency setting, click on Alpha and adjust the transparency rate , click OK, and you good to go.
Downloads
Backtrack Terminal (1.6MB) / Mirror
...
Categories:
Posted by
254 cYbeR hACK3r
On
02:22
HOW TO DO PHISHING ?
STEP 1:
Firstly U Must Signup For A Free Web Hosting Service Like:www.freehostia.comwww.ripway.comwww.my3gb.comwww.000webhost.comAnd Register A Domain Or Subdomain.After Getting Your Signup Done, You Have Your Own Subdomain Like For Instance You Registered With Freehostia,
Then Your Domain Is Like "www.Yourname.my3gb.Com"
STEP 2:
Now Login To Your Freehostia Account And Go To "File Manager" In The my3gb Control Panel.STEP
3:Now what you have to do is, go to your domain folder like
"yourname.my3gb.com" and create...
Categories:
Posted by
254 cYbeR hACK3r
On
02:10
You
might be very happy right now because of the availability of high speed
Internet, but when you get to encounter hackers, everything seems to
become frustrating. Your personal information gets stolen and social
media accounts like Facebook get invaded. Hackers are definitely a huge
disturbance. They’re not merely robbers, but killers to the connection
as well. They can spread viruses that consume a huge part of your
bandwidth. They are among the reasons why even a high speed internet
becomes sluggish.
If you are curious about...
Categories:
5 Jan 2016
Posted by
254 cYbeR hACK3r
On
00:58

Well, If you are a regular reader of this blog the chances are very less that you might not know about keyloggers as I have not written about it. However in this post I will guide you on simple ways to use a keylogger inside Metasploit once you have opened up a meterpreter session with victims computer. For those of you who don't know what metasploit is kindly refer the book hd.powersat.org/Trainings/MetasploitGuide.pdf"
What is a Meterpreter?
Basically...
Categories:
27 Dec 2015
Posted by
254 cYbeR hACK3r
On
01:52

Android is the great Mobile OS ever built for the smartphone. You can do lots of experiments and amazing things with your phone. Android is not just a machine, It is fully featured computer machine.When you rooted your android phone , you gain complete access your android phone. You can run some ethical hacking android apps in the phone that make your android phone into a fully-featured hacking machine
Here we provide you a full collection of hacking...
Categories:
Subscribe to:
Posts
(
Atom
)