Jun 27, 2011

Crazy Call Spoofing

CrazyCall is the ultimate tool for making prank calls and fooling your friends. You can change your CallerID, so when you call someone he sees on his Caller ID display the number you selected. You can also change the pitch of your voice for deep and creepy or high and funny. How is it done: 1st step Select the country you are calling from, choose the CallerID you want to display and enter the number you want to call. 2nd step Press "Get me a code"...

Jun 21, 2011

Make Your First Android Application

The Android Market is taking off. In March, over 9,000 applications hit the Android market, doubling the amount added the previous month, impressing Android users everywhere. Given the huge amount of new Android phones coming out this year, it doesn’t seem like things are going to level off anytime soon.Recently, Google announced that they are sending free Nexus One or Droid devices to developers with 3.5+ stars and 5,000+ downloads on their applications...

Jun 20, 2011

Basic Introduction to Metasploit | Hackersbay.in

The Basic ---- Introduction    What is Metasploit ? The Metasploit Project is an open-source computer security project which provides information about security vulnerabilities and aids in penetration testing and IDS signature development. Its most well-known sub-project is the Metasploit Framework, a tool for developing and executing exploit code against a remote target machine. Other important sub-projects include the Opcode ...

BeEF - Browser Exploitation Framework

BeEF is pioneering techniques that provide the experienced penetration tester with practical client side attack vectors. BeEF focuses on leveraging browser vulnerabilities to assess the security posture of a target, BeEF hooks one or more web browsers as beachheads for the launching of directed command modules. The framework allows the penetration tester to select specific modules (in real-time) to target each browser.   Me Myself Enjoy Playing with it all the time..I love Playing with it ♥ You Can Download It From Here You Don't Know How to install it ?? Don't worry the developers are gud guys they have a flash presentation...

Best Online Virus Scanners

Here are the list of some more common anti-virus software vendors online scanner web link. If your anti-virus do not work properly or if you have any doubt that your computer has been infected by a virus so scan your computer online. BitDefender Bitdefender is going to be a popular anti-virus solution, BitDefender Online Scanner is an on-demand antivirus and antispyware tool that lets you see just how safe your PC is for yourself. It detects and remove any virus and spyware on your computer online.  Click here to scan. Kaspersky  Kaspersky is one of our favorite online virus scanner tool, it detect the virus and spyware...

Jun 13, 2011

Turkey police arrests 32 Anonymous hackers for DDOS attack

Turkey have detained 32 more suspects that the authorities believe are linked to Anonymous. The Turkish state-run news agency reports that the suspect were taken into custody by police after raids in dozens of cities it’s not clear how the police linked the 32 people to the hacker group.The arrests in Turkey came after the hacker group targeted the Turkish websites of the prime minister’s office and parliament in what the group called a protest against...

Jun 10, 2011

Motorola (Croatia) Website hacked..now its motorola's turn after sony???

Motorola's Croatia domain here it is is vulnerable to hackers. Croatia officially the Republic of Croatia is a country in Central Europe.The Website is hacked and defaced by various hackers 2-3 times yesterday. First it was defaced by Cocain Underground hacking team and currently a hacker from Turkey named "TeRoRisTe_Mc" have his deface page on the site.by- hemal...

Jun 8, 2011

Epic Games Database Hacked by Contra

Epic Games epic Database Hacked by Contra (Hacker) , He hack whole database and Leak all database structure online athere . The Site of Epic Games is currently showing Database connection error.EPIC--Established in 1991, Epic Games develops cutting-edge games and cross-platform game engine technology.The company has created multiple million-selling, award-winning titles in its Unreal series, including Unreal Tournament 3 for PC, PLAYSTATION®3 and...

Google Vs Apple ..

Android is a software stack for mobile devices that includes an operating system, middleware and key applications. Google Inc. purchased the initial developer of the software, Android Inc., in 2005. Android’s mobile operating system is based on the Linux kernel. iOS (known as iPhone OS before June 2010) is Apple’s mobile operating system. Originally developed for the iPhone, it has since been extended to support other Apple devices such as...

Anonymous Started War Against India's corruption #OpIndia

Hacker group Anonymous has come out in support of a civil movement against corruption in India by hacking one of the websites of a government IT organization.Until now a large number of the hacks of websites in India were part of an ongoing cyber war between Indian and Pakistani hacker groups.Anonymous put up its logo and a message for the country's Prime Minister Manmohan Singh on the website of the National Informatics Center according to The Hacker...

Jun 7, 2011

Find Serial Key or Cracks for Any Software

This summary is not available. Please click here to view the po...

Jun 6, 2011

Lulzsec Leaks Source Code of Sony Computer Entertainment Developer Network !

Just Now ! BOOM ... By Lulzsec . They again hit SONY by releasing the complete source code of Sony Computer Entertainment Developer Network "scedev.net" Via there Twitter account. They provide a Mediafire file sharing link for download a 55.28 MB file :download...

Total Exposure - The Hacker News [THN] Magazine - June 2011 | Issue 03

The Hacker News ,June Month Magazine is Released Now ! GET YOUR COPY TODAY. Its our Issue 03 with theme "Total Exposure" . We hope this monthly magazine will keep you update in Cyber World. Content : - Total Exposure - Wikileaks : Exposure in true way - Guide about selecting your Computer Security Consultant - In the Realm of Cyber Breach - Exploit Writers : Challenging Cyber Security - Interview with Team Inj3ct0r - IT Security Incident Management -...

Facebook Password Extractor - Get passwords stored in Web browsers

Facebook Password Extractor is a free tool to recover passwords to Facebook accounts that are stored or cached in popular Web browsers. Supporting the latest versions of Microsoft Internet Explorer, Mozilla Firefox, Apple Safari, Opera and Google Chrome, Facebook Password Extractor can reveal login information for multiple Facebook accounts in just a click. Features: Shows Facebook passwords cached or stored in a variety of browsers Reveals...

Massive Gmail phishing attack hits top U.S. officials

NEW YORK (CNNMoney) -- Hundreds of personal Gmail accounts, including those of some senior U.S. government officials, were hacked as a result of a massive phishing scheme originating from China, Google said Wednesday. The account hijackings were a result of stolen passwords, likely by malware installed on victims' computers or through victims' responses to e-mails from malicious hackers posing as trusted sources. That type of hack is known...

Jun 5, 2011

The state government’s websites are under threat of being hacked

An ‘ethical’ hacker demonstrates how one can break into the civic corporation’s e-governance site and I P Gautam’s official domain to access confidential info. The state government’s websites are under threat of being hacked. A BCA student, who calls himself an ‘Ethical’ hacker, demonstrated how it was possible to hack into the e-governance site of the Ahmedabad Municipal Corporation and civic chief I P Gautam’s official domain. Falgun Rathod showed on his home PC how these websites are vulnerable to misuse, poking the bubble of the state government that prides itself in winning three National e-Governance Awards recently. Rathod also demonstrated...

Great white sharks attracted by AC/DC hits

A shark cage tour operator has found that great white sharks are attracted to music by Aussie band AC/DC.SHARKS ENTHUSIASTS HAVE USED fish guts to attract great white sharks for years, but it seems the fearsome creatures may be attracted to something more pleasing to their ears: music from Australian rock band AC/DC. Matt Waller, a tour operator in South Australia's Neptune Bay, has observed that when sharks hear the band's hits, especially Shook...

Jun 3, 2011

Google +1

Google +1 Clickjacking Script ! A click jacking script for google's new +1 feature is released by one who named "yda". Its looking nice and in future, i think this one will become one of the most wanted script.it is similar to yahoo answer ..and giving some one reputation/like..for helping us... You can see demo here:demo link you can download source code from here.. http://www.filesonic.in/file/1117934581 NOTE: To make the button completely...

Reveal the Passwords Hidden Behind Asterisk (****)

Want to Reveal the Passwords Hidden Behind Asterisk (****) ?Follow the steps given below-1) Open the Login Page of any website. (eg. http://mail.yahoo.com)you can try with any other site...//2) Type your 'Username' and 'Password'.Want to Reveal the Passwords Hidden Behind Asterisk (****) ?Follow the steps given below-1) Open the Login Page of any website. (eg. http://mail.yahoo.com)2) Type your 'Username' and 'Password'.3) Copy and paste the JavaScript code given below into your browser's address bar and press 'Enter'.javascript: alert(document.getElementById('Passwd').value);4) As soon as you press 'Enter', A window pops up showing Password...

Faceniff Evil Android Application ... it is dangerous ;)

What is Faceniff? FaceNiff is an Android application that lets users sniff and intercept web session profiles over Wi-Fi networks, stealing other users’ credentials from Facebook, Twitter and other services. The app requires root access on the user’s Android smartphone, but other than that it’s fairly simple to use, which makes it perhaps even more dangerous than Firesheep, a Firefox extension that lets users hijack Facebook and Twitter sessions over Wi-Fi networks. FaceNiff also works on WPA-encrypted Wi-Fi networks, which Firesheep doesn’t support. Right now it works with Facebook, Twitter, YouTube, and Nasza-Klasa (a Polish Facebook clone),...

Jun 2, 2011

ComPuter

"!sgub evah t'nseod CP sihT ?sgub naem ayaddahW" "#define QUESTION ((bb) || !(bb)) - Shakespeare." "Daddy, what does FORMATTING DRIVE C mean?" "E=Mc^5...nahhh...E=Mc^4...nahh...E=Mc^3...ah, the hell with it." "Mr. Worf, scan that ship." "Aye, Captain... 300 DPI? "Today's subliminal thought is:" "Virtual" means never knowing where your next byte is coming from. 'Calm down -- it's only ones and zeros.' 'Profanity: the universal programming language' ........

Page 1 of 3512345Next

Share

Twitter Delicious Facebook Digg Stumbleupon Favorites More