Browsing category

Hackers Repository

Recovering your Deleted Files

It has happened to most of us. You deleted a file and realize you need it back. But is it really deleted? Find out how to recover those files. If you’re not sure whether you permanently deleted a file, be sure to look around for it first. In Windows, you’ll want to open the Recycle […]

How to check whether your ISP is Throttling your Internet speeds.

You, the usual and the average consumer, doesn’t know the boundaries that define the exploitation when it comes to the net neutrality rules’ violation and never realize that some particular service on his/her network is being throttled or degraded. A website named battleforthenet.com tries to make you aware by providing some checks for your service providers […]

Satellite & GPS Hacking

A satellite is a moon, planet or machine that orbits a planet or a star. Earth is a satellite because it orbits the sun. Likewise, the moon is a satellite because it orbits Earth. Usually, the word “satellite” refers to a machine that is launched into space and moves around Earth or another body in […]

How to detect SQL Injection attacks

SQL Injection (SQLi) attacks have been around for over a decade. You might wonder why they are still so prevalent. The main reason is that they still work on quite a few web application targets.  In fact, according to Veracode’s 2014 State of Security Software Report , SQL injection vulnerabilities still plague 32% of all […]

Penetration Testing Procedures

Penetration testing (otherwise known as pentesting, or the more general security testing) is the process of testing your applications for vulnerabilities, and answering a simple question: “What could a hacker do to harm my application, or organization, out in the real world?”. An effective penetration test will usually involve a skilled hacker, or team of […]

6 Ways to Secure a Wireless Wi-Fi Network

Wireless Networking (Wi-Fi) has made it so easy for anyone to use Internet on your computer, mobile phones, tablets and other wireless devices anywhere in the house without the clutter of cables.  With traditional wired networks, it is extremely difficult for someone to steal your bandwidth but the big problem with wireless signals is that […]

Install Windows in 15 minutes

We do have to spend so much time when formatting PC. We are obliged because of windows installation speed. But using simple commands we can do this very quickly. As we all know ,that during formatting a Computer, after the file copying is completed then windows Require approximately 39 Minutes Time. But, We can bypass […]

How to Delete yourself from the Internet

Have you ever wondered what information web pages have on you? Just perform a simple google search and check out the results! You will get surprised that they even know your dog’s name, some photos you took while very drunk are there as well. Even some stupid videos you took way back in college. And your […]

Live Stream Twitch in VLC to avoid buffering

Twitch has been making some very awful encoding and additional bad choices for streamers and viewers of Twitch.tv. This method has been used before for various streams but now is rather needed to avoid buffering and delay of the stream. Things you will need Livestreamer   –   Download here Vlc                     –   Download here Step 1 […]

Bypass Internet Censorship

Internet censorship is the control or suppression of what can be accessed, published, or viewed on the Internet. It may be carried out by governments or by private organizations at the behest of government, regulators, or on their own initiative. Individuals and organizations may engage in self-censorship for moral, religious, or business reasons, to conform […]

Simple Brute Force Method

Brute Forcing is simply testing a list of passwords to a list of usernames and hopefully you will have matched a username and password combination that is correct. There are many disadvantages in using this method to hack, such as time (you need to test thousands if not millions of combination) and most websites now […]

DNS Spoofing – Hacking Technique

This tutorial was meant to inform the community of a modern technique countless hackers are using to harm innocent people. This tutorial is meant to be purely educational. By reading this tutorial, you agree that you will not replicate the steps I have listed below on ANY Wi-Fi but your own; and you will not […]

Reverse Skype Resolver (How-to)

A Resolver will “lookup” a username on a VPS hosting the hacked skype, which allows the skype to pull data from the debug files. It does not need to call you, or add or even message you. It is a simple debug file on all computers/mobiles. Step 1: Install the latest version of Skype >>>Download […]

Cyborg Hawk Linux is ready to take on Kali ?

Today I will be reviewing Cyborg Hawk Linux, the distro is based on Ubuntu and designed to be a penetration testing platform The download size is 3.1GB in total and is currently only available as a 64 bit OS. The website claims some of the following features: More than 750+ penetration testing tools included. Cyborg Hawk is […]

How to create a keylogger in notepad

Here is a basic keylogger script for beginners to understand the basics of how keylogging works in notepad. This script should be used for research purposes only. ——————————————————————————————— @echo off color a title Login cls echo “Please Enter Email Adress And Password” echo. echo. cd “C:Logs” set /p user=Username: set /p pass=Password: echo Username=”%user%” Password=”%pass%” […]

How to find out if you’ve been HACKED with CMD

There are numerous methods to see if you have been hacked. Using the Command Prompt, you can run a command which will check for incoming and outgoing connections to your computer. By checking all the established connections, you can identify a malicious connection from a hacker. Click “Start,” then type “cmd” into the quick search. […]

TOP 100 Unique sites

These sites solve at least one problem really well and they all have simple web addresses(URLs) that you can easily memorize thus saving a trip to Google. 1. screenr.com – Record movies of your desktop and send them straight to YouTube. 2. ctrlq.org/screenshots – for capturing screenshots of web pages on mobile and desktops. 3. goo.gl – shorten long URLs and […]

How to Check If A Used iPhone Is Stolen

Apple attempted to address this issue with the Find My iPhone service in 2010, but that could be defeated by turning the iPhone off or erasing the contents of the phone. Apple made things much harder on thieves when it introduced Activation Lock in iOS 7. This feature made it impossible to activate an iPhone […]

Reveal Asterix Symbols with Javascript

How to do it 1) Open the Login Page of any website. E.g http://www.gmail.com 2) Type your ‘Username’ and ‘Password’. (DONT CLICK LOG IN) 3) Copy and paste the JavaScript code given below into your browser’s address bar and press ‘Enter’ on your keyboard. Quote:j alert(document.getElementById(‘Passwd’).value);   4) As soon as you press ‘Enter’, A […]