Tuesday 28 July 2015

Download candy crush soda saga hack tool free

Download Software Here
candy crush soda saga hack
candy crush soda saga hack tool
candy crush soda saga hack cydia
candy crush soda saga hack android
candy crush soda saga hack ifunbox
candy crush soda saga hack iphone
candy crush soda saga hack facebook
candy crush soda saga hack download
candy crush soda saga hack no survey
candy crush soda saga hack tool free download no survey
candy crush soda saga hack apk
candy crush soda saga hack tool
candy crush soda saga hack cydia
candy crush soda saga hack android
candy crush soda saga hack ifunbox
candy crush soda saga hack iphone
candy crush soda saga hack facebook
candy crush soda saga hack download
candy crush soda saga hack no survey
candy crush soda saga hack tool free download no survey
candy crush soda saga hack apk
candy crush soda saga hack android
candy crush soda saga hack apk download
candy crush soda saga hack apk free download
candy crush soda saga hack app
candy crush soda saga hack cydia
candy crush soda saga hack cheat tool
candy crush soda saga hack cheat tool activation key
candy crush soda saga hack cheat tool key
candy crush soda saga hack cheat
candy crush soda saga hack cheats tool v4.0.2
candy crush soda saga hack cheat engine
candy crush soda saga hack download
candy crush soda saga hack download android
candy crush soda saga hack extension
candy crush soda saga hack facebook
candy crush soda saga hack for android
candy crush soda saga hack for iphone
candy crush soda saga hack file
candy crush soda saga hack for pc
candy crush soda saga hack for ipad
candy crush soda saga hack free download
candy crush soda saga hack free
candy crush soda saga hack for ios
candy crush soda saga hack firefox extension
candy crush soda saga hack gold bars
candy crush soda saga hack gold
candy crush soda saga hack ifunbox
candy crush soda saga hack iphone
candy crush soda saga hack ifile
candy crush soda saga hack ios no jailbreak
candy crush soda saga hack iphone cydia
candy crush soda saga hack jailbreak
candy crush soda saga hack mozilla firefox
candy crush soda saga hack mod apk
candy crush soda saga hack no survey
candy crush soda saga hack no survey no password
candy crush soda saga hack no jailbreak
candy crush soda saga hack online
candy crush soda saga hack pc
candy crush soda saga hack sinful
candy crush soda saga hack sinfuliphone
candy crush soda saga hack tool
candy crush soda saga hack tool free download no survey
candy crush soda saga hack tool download
candy crush soda saga hack tool apk
candy crush soda saga hack tool android
candy crush soda saga hack tool no survey
candy crush soda saga hack tool activation key
candy crush soda saga hack tool password
candy crush soda saga hack tool without survey
candy crush soda saga hack tool for iphone
candy crush soda saga hack unlimited moves
candy crush soda saga hack version
candy crush soda saga hack v2.1
candy crush soda saga hack 1.32.11
candy crush soda saga hack firefox Add one
candy crush soda saga firefox Add one
candy crush soda saga firefox Add one Hack
candy crush soda saga PC Facebook Hack
candy crush soda saga PC Hack
candy crush soda saga Facebook Hack
Download candy crush soda saga Facebook Hack tool
Like my Page For More Updates https://www.facebook.com/blackhack12345

70 Best New Hacking Ebook Collection Free Download 2015

Download 70 Best New Hacking Ebook Collection Free Download 2015 Description as::

    Hacking The Windows Registry
    Hugo Cornwall – The Hacker’s Handbook
    Hacking into computer systems -a beginners guide
    Hacking_IIS_Servers
    Addison-Wesley Professional.Honeypots- Tracking Hackers
    Wiley.The Database Hacker’s Handbook- Defending Database Servers
    John Wiley &_ Sons.Hacking GMail (ExtremeTech)
    Hacking.Guide.V3.1
    A-List Publishing.Hacker Linux Uncovered
    Hacker’S.Delight
    Hacker.Bibel
    HackerHighSchool
    Hacker’s Desk Reference
    A Beginners Guide To Hacking Computer Systems
    Addison Wesley — Hackers Delight 2002
    addison wesley — web hacking — attacks and defense
    Addison Wesley, The Outlook Answer Book Useful Tips Tricks And Hacks (2005) Bbl Lotb
    amazon-hacks
    Anti-Hacker ToolKit — McGraw Hill 2E 2004
    Attacking the DNS Protocol
    Auerbach.Practical.Hacking.Techniques.and.Countermeasures.Nov.2006
    Auerbach.Pub.The.Hackers.Handbook.The.Strategy.Behind.Breaking.into.and.Defending.Networks
    bsd-hacks
    ceh-official-certified-ethical-hacker-review-guide-exam
    Certified Ethical Hacker (CEH) v3.0 Official Course
    Computer — Hackers Secrets — e-book
    cracking-sql-passwords
    Crc Press — The Hacker’S Handbook
    Credit.Card.Visa.Hack.Ucam.Cl.Tr.560
    DangerousGoogle-SearchingForSecrets
    database hacker handbook
    Dummies — Hack How To Create Keygens (1)
    ebay-hacks-100-industrial-strength-tips-and-tools
    ebook.oreilly.-.windows.xp.hacks.sharereactor
    eBooks.OReilly.-.Wireless.Hacks.100.Industrial.-.Strength.Tips.and.Tools
    ethical hacking, student guide
    excel-hacks
    For.Dummies.Hacking.for.Dummies.Apr.2004.eBook-DDU
    For.Dummies.Hacking.Wireless.Networks.For.Dummies.Sep.2005.eBook-DDU
    google-hacks
    Hack IT Security Through Penetration Testing
    Hack Proofing — Your Network — Internet Tradecraft
    Hack Proofing Linux A Guide to Open Source Security
    Hack Proofing Sun Solaris 8
    Hack Proofing Your E-Commerce Site
    Hack Proofing Your Identity In The Information Age
    Hack Proofing Your Network Second Edition
    Hack Proofing Your Network_First Edition
    Hack Proofing Your Web Applications
    Hacker Disassembling Uncovered
    hacker ethic
    Hacker Linux Uncovered
    Hacker Web Exploitation Uncovered
    Hacker’S.Delight
    hacker-disassembling
    Hackers Beware
    Hackers Secrets Revealed
    Hackers Secrets
    Hackers, Heroes Of The Computer Revolution
    Hackers_Secrets
    Hacker_s_Guide
    Hacking — Firewalls And Networks How To Hack Into Remote Computers
    Hacking — The Art of Exploitation
    Hacking Cisco Routers
    Hacking Exposed — Network Security Secrets & Solutions, 2nd Edition
    Hacking Exposed Network Security Secrets & Solutions, Third Edition ch1
    Hacking For Dummies 1
    Hacking For Dummies 2
    Hacking For Dummies 3
    Hacking.Guide. V4
Download Part 1:
Download Part 2:
Download Part 3:
Download Part 4:
Download Part 5:
Download Part 6:

Wednesday 15 July 2015

Windows 7 serial keys (32bit) or (64bit).

Windows 7 Ultimate keys
===================
22TKD-F8XX6-YG69F-9M66D-PMJBM
342DG-6YJR8-X92GV-V7DCV-P4K27
FJGCP-4DFJD-GJY49-VJBQ7-HYRR2
9JBBV-7Q7P7-CTDB7-KYBKG-X8HHC
P72QK-2Y3B8-YDHDV-29DQB-QKWWM
BCGX7-P3XWP-PPPCV-Q2H7C-FCGFR
DLMKZ-2ILHP-7IUG9-A2QVK-A2BYX
BPVVG-7KVMM-HGRZ1-SQZ4L-USRHM
7YWX9-W3C2V-D46GW-P722P-9CP4D
MM7DF-G8XWM-J2VRG-4M3C4-GR27X
KGMPT-GQ6XF-DM3VM-HW6PR-DX9G8
MVBCQ-B3VPW-CT369-VM9TB-YFGBP
KBHBX-GP9P3-KH4H4-HKJP4-9VYKQ
BCGX7-P3XWP-PPPCV-Q2H7C-FCGFR
RGQ3V-MCMTC-6HP8R-98CDK-VP3FM
Q3VMJ-TMJ3M-99RF9-CVPJ3-Q7VF3
6JQ32-Y9CGY-3Y986-HDQKT-BPFPG
P72QK-2Y3B8-YDHDV-29DQB-QKWWM
6F4BB-YCB3T-WK763-3P6YJ-BVH24
9JBBV-7Q7P7-CTDB7-KYBKG-X8HHC
C43GM-DWWV8-V6MGY-G834Y-Y8QH3
GPRG6-H3WBB-WJK6G-XX2C7-QGWQ9
MT39G-9HYXX-J3V3Q-RPXJB-RQ6D7
MVYTY-QP8R7-6G6WG-87MGT-CRH2P
GRY6B-TJ49J-X73JG-38H9K-VWJHY
C8XXQ-PQDD6-6KGP6-J8XT6-XGB2X
8XRH7-RTC6B-BJ42C-C2Q8Y-BRXMG
PTTCH-H7J6M-4XXWH-86RT3-66P6M
DLMKZ-2ILHP-7IUG9-A2QVK-A2BYX
BPVVG-7KVMM-HGRZ1-SQZ4L-USRHM
FJGCP-4DFJD-GJY49-VJBQ7-HYRR2

======================
Windows 7 Professional keys
======================
32KD2-K9CTF-M3DJT-4J3WC-733WD
YKHFT-KW986-GK4PY-FDWYH-7TP9F
74T2M-DKDBC-788W3-H689G-6P6GT
GMJQF-JC7VC-76HMH-M4RKY-V4HX6
MVBCQ-B3VPW-CT369-VM9TB-YFGBP
C43GM-DWWV8-V6MGY-G834Y-Y8QH3
GPRG6-H3WBB-WJK6G-XX2C7-QGWQ9
MM7DF-G8XWM-J2VRG-4M3C4-GR27X
KGMPT-GQ6XF-DM3VM-HW6PR-DX9G8
MT39G-9HYXX-J3V3Q-RPXJB-RQ6D7
MVYTY-QP8R7-6G6WG-87MGT-CRH2P
RGQ3V-MCMTC-6HP8R-98CDK-VP3FM
Q3VMJ-TMJ3M-99RF9-CVPJ3-Q7VF3
6JQ32-Y9CGY-3Y986-HDQKT-BPFPG
KBHBX-GP9P3-KH4H4-HKJP4-9VYKQ
BCGX7-P3XWP-PPPCV-Q2H7C-FCGFR
P72QK-2Y3B8-YDHDV-29DQB-QKWWM
6F4BB-YCB3T-WK763-3P6YJ-BVH24
9JBBV-7Q7P7-CTDB7-KYBKG-X8HHC

======================
Windows 7 Home Basic keys
======================
7XRCQ-RPY28-YY9P8-R6HD8-84GH3
JYDV8-H8VXG-74RPT-6BJPB-X42V4
482XP-6J9WR-4JXT3-VBPP6-FQF4M
JYDV8-H8VXG-74RPT-6BJPB-X42V4
D9RHV-JG8XC-C77H2-3YF6D-RYRJ9

========================
Windows 7 Home Premium keys
========================
CQBVJ-9J697-PWB9R-4K7W4-2BT4J
VQB3X-Q3KP8-WJ2H8-R6B6D-7QJB7
6RBBT-F8VPQ-QCPVQ-KHRB8-RMV82
7JQWQ-K6KWQ-BJD6C-K3YVH-DVQJG
6JKV2-QPB8H-RQ893-FW7TM-PBJ73
TQ32R-WFBDM-GFHD2-QGVMH-3P9GC
GG4MQ-MGK72-HVXFW-KHCRF-KW6KY
QXV7B-K78W2-QGPR6-9FWH9-KGMM

Why Hackers and Programmers choose Linux instead of Windows and Mac?

-Linux is advanced High Level OS.
-Comfortable for Hackers and others.
-24/7 always virus free.
-Greatest OS for Programmers to develop Soft.
-Always free.
-All OS born from Linux only.
-Linux contain all types of Programming
-Lan and Hacking tools.
-Linux is the No. 1 for Server and Client
-Scripting.
-Windows is Base and Linux is Race.
-Linux have high developed  Programmed.
-Linux is the open source OS.
-Google Web Server (GWS) — Custom Linux-based Web server that Google uses for its online services.
-Novell in 2006 migrate from Windows to Linux.
-IBM Supports Linux 100%.
-Amazon.com is said to "use Linux in nearly every corner of its business.
-Cisco Systems, the computer networking and routing giant, switched to Linux.

--By Black Hack

What happens on the web in 30 seconds

-20,400 GB of global IP data transferred.
-70+ BotNet Infections.
-12 New victims of identity theft.
-3+ New Wikipedia Articles published.
-102 Million Emails sent.
-700 new Mobile Users.
-25.000 App downloads.
-$45,000 sales on Amazon.
-31,141 hours of music played on Pandora.
-55+ New linked in Accounts.
-Over 10 Millions photo.
-Views, 3500+ Photo uploads on Flickr.
-165 + New Twitter accounts, 50,000+ New Tweets.
-150,000 Facebook Log ins. 3M+ Facebook Views , 350,000 Status update, 40,000+ Wall posts,

--By Black Hack

Website Hacking Video Series :

 1. SQL Injection (Using Havij ) : https://www.youtube.com/watch?v=q2sOE6c57T8 
 2. Scanning Websites for Vuln : https://www.youtube.com/watch?v=__L3OYkjKpg
 3. Finding XSS With Metasploit : https://www.youtube.com/watch?v=A4mxLXVJtFk
 4. Defacing a Website : https://www.youtube.com/watch?v=1zD_iswTWHE
 5. Symlinking : https://www.youtube.com/watch?v=L42bs7-nALY

 We Hope You Enjoy this Series : ) More tutorials to come soon Stay Tuned !

Top 9 Facts about Wikipedia :

Wkipedia is started in January 2001. Jimmy Donal is the co- founder and promoter of Wikipedia.

1. Wikipedia is non-profit organization.
2. In wikipedia anyone can sign up and become a wikipedia editor.
3. In wikipedia articles are available in over 285 languages.
4. The English language wikipedia has more than 3+ million articles.
5. In wikipedia there are only 35 Employees.
6. Wikipedia headquarters located in San Francisco.
7. The Wikipedia servers are hosted in Florida.
8. Wikipedia site has more than 684 million page views each year.
9. Wikipedia contributers have written more than 22 million articles.

very Important & Useful full forms

After reading share it please

ADIDAS- All Day I Dream AboutSports
AUDI-Auto Union Deutschland Ingolstadt
BMW- Baverian Motor Works
AMW- Asian Motor Works
GOOGLE- Global Organization Of Oriented Group Language of Earth
CNN-IBN- Cable News Network-Indian Broadcasting Network
VVS Laxman- Vengipurapu Venkata Sai Laxman
APJ Abdul Kalam- Avul Pakir Jainulabdeen Abdul Kalam
MDH(Massala)- Mahashian Di Hatti
ISCON- International Society for Krishna Consciousness
LASER- Light Amplification by Stimulated Emission of Radiation
i.e- id est (that is)
INTEL- Integrated Electronics
CMYK- Cyan Magenta Yellow Kinda(Black)
JPEG- Joint Photography Expert Group
EMI- Equated Monthly Instalments
WIPRO- Western Indian Products
DNA- Deoxy-ribo Nucleic Acid
CBI- Central Bureau of Investigation
CAT- Common Admissiom Test
ATM- Automated Teller Machine
ISI- Indian Standard Institute
IPI- International Press Institute
AT&T- American telegraphic and Telephone Co. Ltd.
ICICI- Industrial Credit and Investment Corporation of India
IDBI- Industrial Development Bank of India
FBI- Federal Bureau of Investigation
HDFC- Housing Development Finance Corporation
VIRUS- Vital Information Resources Under Siege
OBC- Other Backward Classes
MPEG- Motion Picture Experts Groups
NAAC- National Assesment and Accreditation
PSLV- Polar Satelite Launch Vehicle
RADAR- Radio Detecting and Ranging
RDX- Research Department Explosive
MRF- Madras Rubber Factory
LML- Lohia Machines Limited
STD- Subscriber Trunk Dialling
TOEFL- Test of English as a Foreign Language
SENSEX- Sensitivity Index(of share price)
URL- Uniform Resource Locator
TVS- T.V Sundaram(Co-Founder)
BBC-British Broadcasting Corporation

--Black Hack

A Collection some Computer related full forms.

* VIRUS - Vital Information Resource UnderSeized.
* 3G -3rd Generation.
* GSM - Global System for Mobile Communication.
* CDMA - Code Divison Multiple Access.
* UMTS - Universal Mobile Telecommunication System.
* SIM - Subscriber Identity Module .
* AVI = Audio Video Interleave
* RTS = Real Time Streaming
* SIS = Symbian OS Installer File
* AMR = Adaptive Multi-Rate Codec
* JAD = Java Application Descriptor
* JAR = Java Archive
* JAD = Java Application Descriptor
* 3GPP = 3rd Generation Partnership Project
* 3GP = 3rd Generation Project
* MP3 = MPEG player lll
* MP4 = MPEG-4 video file
* AAC = Advanced Audio Coding
* GIF= Graphic Interchangeable Format
* JPEG = Joint Photographic Expert Group
* BMP = Bitmap
* SWF = Shock Wave Flash
* WMV = Windows Media Video
* WMA = Windows Media Audio
* WAV = Waveform Audio
* PNG = Portable NetworkGraphics
* DOC = Document (MicrosoftCorporation)
* PDF = Portable Document Format
* M3G = Mobile 3D Graphics
* M4A = MPEG-4 Audio File
* NTH = Nokia Theme (series 40)
* THM = Themes (Sony Ericsson)
* MMF = Synthetic Music Mobile Application File
* NRT = Nokia Ringtone
* XMF = Extensible Music File
* WBMP = Wireless Bitmap Image
* DVX = DivX Video
* HTML = Hyper Text Markup Language
* WML = Wireless Markup Language
* CD -Compact Disk.
* DVD - Digital Versatile Disk.
* CRT - Cathode Ray Tube.
* DAT - Digital Audio Tape.
* DOS - Disk Operating System.
* GUI -Graphical User Interface.
* HTTP - Hyper Text Transfer Protocol.
* IP - Internet Protocol.
* ISP - Internet Service Provider.
* TCP - Transmission Control Protocol.
* UPS - UninterruptiblePowerSupply.
* HSDPA - High Speed Downlink PacketAccess.
* EDGE - Enhanced Data Rate for GSM[GlobalSystem for Mobile Communication] Evolution.
* VHF - Very High Frequency.
* UHF - Ultra High Frequency.
* GPRS - General PacketRadio Service.
* WAP - Wireless ApplicationProtocol.
* TCP - Transmission ControlProtocol.
* ARPANET - Advanced ResearchProjectAgency Network.
* IBM - International Business Machines.
* HP - Hewlett Packard.
* AM/FM - Amplitude/ Frequency Modulation.
* WLAN - Wireless Local Area Network

List of Web developing programming languages of Top Websites.

Languages Used....
1. Google – Java (Web), –C (indexing).
2. Facebook – PHP.
3. YouTube- Flash, Python, Java.
4. Yahoo– PHP and Java.
5. MicrosoftLive.com–.NET
6. Baidu – PHP
7. Wikipedia – PHP
8. Blogger – Java
9. MSN – .NET
10.Twitter – Ruby on Rails, Scala,Java.

Online PC Virus Scanners:

Some Reliable Sites To Do A Quick Free ONLINE Anti-Virus Scan:

BitDefender QuickScan:
http://quickscan.bitdefender.com/

Panda ActiveScan:
http://www.pandasecurity.com/activescan/index/

TrendMicro Housecall:
http://housecall.trendmicro.com/

F-Secure Online Scanner:
http://www.f-secure.com/en_EMEA/security/tools/online-scanner/

INDIVIDUAL FILE SCANNERS:

VirScan:
http://virscan.org/

VirusTotal:
http://www.virustotal.com/

Jotti:
http://virusscan.jotti.org/en

Common Internet ERROR Codes

Error 400 - Bad request.
Error 401 -unauthorized request.
Error 403 - forbidden.
Error 404 - Not found.
Error 500 -Internal error.
Error 501 - Not Implemented
Error 502 - Bad Gateway
Error 503 -Service unavailable.
Error 504 - Gateway Time-Out
Error 505 - HTTP Version not supported/DNS Lookup Fail/ unknw host
Error 500-599 - Server Errors........!

how to become a profesional hacker?

How To Became A Great hacker ?

1. Learn TCP/IP, Basic Information gathering, Proxies, Socks, SSL, VPN, VPS, RDP, FTP, POP3, SMTP, Telnet, SSH.

2. Learn Linux, Unix, Windows - You can do this using vmware or any virtual desktop utility.

3. Learn a programming language that's compatible with all OS - Perl, Python, C, ASM

4. Learn HTML, PHP, Javascript, ASP, XML, SQL, XSS, SQLI, RFI, LFI

5. Learn Reverse engineering and crack some programs for serials easy ones like mirc, winzip, winrar or old games.

6. Code a fuzzer for common protocols - ftp, pop3, 80, 8080 - Pick some free software like ftp server, mail server, apache or iis webserver or a webserver all-in-one pack, or teamspeak, ventrilo, mumble.

7. Code a tool that uses grep to sort out unique code in source codes.

8. Make a custom IPtable, IPsec firewall that blocks all incoming traffic and out going traffic and add filters to accept certain ports that your software or scripts use.

9. Pick a kernel in linux or unix, also pick a Microsoft OS version lets say Winxp pro sp2 put them on the virtual desktops (vmware) and find and code a new local exploit in those versions, then install a Apache webserver on the Linux/Unix and a IIS webserver on the winxp pro and attempt to find and code a new local reverse_tcp_shell exploit.

10. Learn Cisco Router and Switch configuration and setup.

11. Learn Checkpoint Setup and Config

12. Learn Wifi scanning, cracking, sniffing.

13. Pick a person in you phonebook for the area code you live in or city then ring the person on a anonymous line like skype or a payphone or a carded sim and attempt to social engineer the person for his name, address, data of birth, city born, country born, ISP connected with, Phone company
connected with, What bank he/she uses and anything else you can get. Then
Attempt to ring using a spoof caller ID software with the person's phone number - call the ISP and try reset the password to his/her internet connection/web-mail, get access to bank account or ask them to send out a new *** to a new address (drop) with a new pin, reset of phone company passwords.

14. Use your information gathering skills to get all the information off a website like a shop then use the spoof caller-id software or hack your phone to show a new number of the Webserver's Tech Support number then ring the shop owner and try get the shop site password.

15. Do the same thing but attempt to use a web attack against a site or shop to gain admin access.

16. Once got access upload a shell and attempt to exploit the server to gain root using a exploit you coded not someone else s exploit.

17. Make your own Linux Distro

18. Use your own Linux Distro or use a vanilla Linux gnome (not kde) keep it with not much graphics so you can learn how to depend on the terminal and start from scratch install applications that you will only need for a blackbox (Security test box), make folders for fuzzers, exploits, scanners..etc Then load them up with your own scripts and other tools ( By this stage you shouldn't need to depend on other peoples scripts).

19. Learn macosx and attempt to gain access to a Macosx box whether it be your own or someone's else.

20. Create a secure home network and secure your own systems with your own Security policies and firewall settings.

--Black Hack:

Tuesday 14 July 2015

Windows 7 hidden "GOD MODE" folder:

Windows offers a centralized Control Panel for all of the OS settings, which makes it easy for users to tweak everything from desktop background to setting up a VPN.

To enter this mode, create a new folder with this exact name

(copy and paste it)
God Mode.{ED7BA470-8E54-465E-825C-99712043E01C}.

The folder icon will change to a Control Panel-style icon, and you will be able to jump in and change all kinds of settings.

Note: don't try this on Windows Vista 64-bit as it's known to cause a reboot loop.

What is hacking - by famous hackers/programs

Hacking just means building something quickly or testing the boundaries of what can be done
- Mark Zuckerberg

Hacking is fun if you're a Hacker
- Anonymous

Behind every successful Coder there an even more successful De-coder to understand that code
- Anonymous

As a young boy, I was taught in high school that Hacking was cool.
- Kevin Mitnick

Hackers are not crackers
- Anonymous

Its kind of Interesting because Hacking is a skill that could be used for criminal purposes or legitimate purposes, and so even through in the past I was hacking for free curiosity, and the thrill , to get a bite of the forbidden fruit of knowledge, I'm now working in the security field as a public speaker.
 - Kevin Mitnick

A lot of Hacking is playing with other people, you know, getting them to do strange things
 - Steve Wozniak

I was addicted to Hacking, more for the intellectual challenge, the curiosity, the seduction of adventure; not for stealing, or causing a damage or writing computer viruses.
- Kevin Mitnick

It's true, I had hacked into a lot of companies, and took of this source code to analyze it for security bugs. If I could locate security bugs, I could become better at Hacking into their systems. It was all towards becoming a better Hacker.
- Kevin Mitnick 

Hacker VS Programmer

1. A hacker beats the system.
    A programmer maintains the system.

2. A hacker is trying to get in.
    A programmer is trying to stop things getting in.

3. A hacker does things because he believes in them.
    A programmer does what he is supposed to.

4. A hacker changes the way things are.
    A programmer tries to keep the status quo.

5. A hacker is agile.
    A programmer is a small cog in a big slow machine.

6. A hacker has many points of attack.
    A programmer has one job.

7. A hacker has to be fast.
    A programmer doesn’t.

8. A hacker is self-reliant.
    A programmer relies on others.

9. A hacker finds paths that don’t exist.
    A programmer guards the old ones that already do.

10. A hacker is about being interesting.
     A programmer is about being perfect.

HACKERS WINS !!!

7,000 Dorks for hacking into various sites

        about.php?cartID=
        accinfo.php?cartId=
        acclogin.php?cartID=
        add.php?bookid=
        add_cart.php?num=
        addcart.php?
        addItem.php
        add-to-cart.php?ID=
        addToCart.php?idProduct=
        addtomylist.php?ProdId=
        adminEditProductFields.php?intProdID=
        advSearch_h.php?idCategory=
        affiliate.php?ID=
        affiliate-agreement.cfm?storeid=
        affiliates.php?id=
        ancillary.php?ID=
        archive.php?id=
        article.php?id=
        phpx?PageID
        basket.php?id=
        Book.php?bookID=
        .
        .
        .
        .
        And so on download .txt file (391.98 KB) from here

Monday 13 July 2015

Full Form of Hacker

H - Hide IP
A - Aim Victim
C - Crack Encrypt
K - Kill Firewall
E - Enter into Database
R - Return Anonymous

FIRST 1O PEOPLE WHO SIGN UP FOR FACEBOOK

1. Mark Zuckerberg -
CEO of Facebook.

2. Chris Hughes - 
Hughes cofounded Facebook and
was college roommates with Zuckerberg.

3. Dustin Moskovitz - 
Moskovitz cofounded
Facebook and was college roommates with
Zuckerberg.

4. Arie Hasit -
Hasit was the first non-founder to
sign up for Facebook. He was friends with early
members David Hammer and Colin Jackson.
Hammer knew Facebook cofounder Chris Hughes
directly so its likely all three were friends.

5. Marcel Georgés Laverdet II* -
While Laverdet has one of the earliest IDs, it's not
certain that he was one of the first 20 to sign up
for the site. Some engineers who worked at
Facebook saw some early IDs were open and
snagged them for themselves.

6. Soleio Cuervo - 
Cuervo was friends with early
Facebook member Marcel George Laverdet.

7. Chris Putnam - 
Putnam was, however, friends
with early Facebooker Marcel George Laverdet.
Putnam and Marcel both got jobs at Facebook by
creating hacks and pranks on the social site. These
hacks caught the attention of cofounder Dustin
Moskovitz, who contacted Putnam. The two kept in
touch and when Putnam moved to Silicon Valley,
Moskovitz offered him an interview at Facebook.

8. Andrew McCollum -
McCollum was a Harvard
student who was in Mark Zuckerberg's CS161:
Operating Systems class.

9. Colin Kelly -
Kelly was a Harvard student who
was friends with David Hammer and Colin Jackson.
Both knew many early Facebookers and it's likely
all of them were acquaintances.

10. Mark Kaganovich - 
Kaganovich was a Harvard
student who was also friends with early Facebooker
David Hammer(20 earliest member) Although
Hammer joined Facebook after Kaganovich,
Hammer knew at least 7 of the earliest

Download youtube video using VLC

1. Open your youtube on your browser then open your video and copy the URL.
2. Run your VLC
3. Click on Media
4. Goto Open Network Stream
5. Paste URL in 'Please enter network URL
6. Then click ' Play ' button in the player.
7. Then Now, click Tools – Codec Information and at the bottom of the window you will see a Location box. Copy the long URL in the box and paste it on your browser’s address bar. The browser will now start playing the video file. You can download the video file to your desktop by doing a Save As, Or you can choose to record the video.

Download Youtube Videos with out installing any software:

Youtube is the paradise for watching videos online. Downloading videos from Youtube is pretty simple. You don't need to install any software on your computer or pay money for an online service. You just need to go to one of the sites KissYouTube or KeepVid or Vixy and enter the URL of the youtube video which you want to download. Once you enter URL of the youtube video you will be given a link from where you can download the video.  Here are the steps to download videos from the Vixy.net and KissYoutube.com

Vixy.net

Vixy allows downloading youtube videos in many formats. It allows you to download  YouTube's video to AVI/MOV/MP4/MP3/3GP file format online. It has very handy options to download videos in various formats required for Personal Computers, MP3 Players, iPODs and mobile phones. To download the video go to Vixy.net, enter the URL of your favorite youtube video and select the download format. Click on start to download.



KissYouTube


This is one the easiest and my favorite site to download Youtube videos as flv files. When you are watching a video, just add the word "kiss" to the browser URL and press enter. For example if you are watching a video at youtube.com/watch?v=dXC3BFDq7U4, you need to add the word kiss in the begging of the URL[kissyoutube.com/watch?v=dXC3BFDq7U4] in your browser address bar and press enter. A link to download the video as FLV movie file. The FLV movie can be played back by many free FLV Players available on the net[Click here to download free FLV Player]

Download Youtube Videos without the use of any Third Party Software :

1. Go to YouTube, Open the video that you want to download

2. Now you have to make a small change in video url link [Replace "www." to "ss"]

3. For example : If the link is [ http://www.youtube.com/watch?v=Bgn7n3OPAqE ] , change the link to [http://ssyoutube.com/watch?v=Bgn7n3OPAqE ]

4. Now Paste the Changed url in your browser address bar

5. After it will redirect to a new site http:// en.savefrom.net/

6. In that site, you have options to choose the format of the video like mp4, 3gp, flv.

7. Finally Choose your format and download your video directly......

Note- It works in mobile too 

Download Collection of Hacking E-Books and tools (all in one)

Topics
=======
Hackers Hierarchy and Becoming a Hacker

Basic Computer Hardware

Wireless Hacking (Wi-Fi Hacking)

Linux

Password Cracking

Facebook Hacking

DDoS

Network

Windows Tricks and Tweaks

Tips and Tricks

Basic Tools for Hacking

Cryptology

L337 Alphabet


We will provide two packages for you. One includes only the E-book and the other includes the E-book and some useful tools.
=====================
Download Package ONE
=====================
Package one will include Ebook + Tools.Tools Included
=========================================
Wireshark
PC Info
Bat To Exe Converter
Notepad++
Havij Crack Full
Winrar Full
Other E-books (Kevin Mitnick)
Windows 8 Activator
Wat Remover (Windows 7 Activator)
Cain and Abel
Facebook Phishing Site

Download

====================
Download Package TWO
====================
Package two will include only E-book

Download


Keyboard Disco light trick:

This trick just makes your keyboard lights go crazy and do disco. LoL.

The script I’m sharing with you, when executed makes your Caps, Num and Scroll Lock’s light flash in a cool rhythmic way!

1.This piece of code makes ur keyboard a live disco..

Set wshShell =wscript.CreateObject(“WScript.Shell”)
do
wscript.sleep 100
wshshell.sendkeys “{CAPSLOCK}”
wshshell.sendkeys “{NUMLOCK}”
wshshell.sendkeys “{SCROLLLOCK}”
loop

2.This one makes it looks like a chain of light….

Set wshShell =wscript.CreateObject(“WScript.Shell”)
do
wscript.sleep 200
wshshell.sendkeys “{CAPSLOCK}”
wscript.sleep 100
wshshell.sendkeys “{NUMLOCK}”
wscript.sleep 50
wshshell.sendkeys “{SCROLLLOCK}”
loop

Instructions:
*paste any of the two above codes in notepad
*Save as “AnyFileName”.vbs
*Run the file
*To stop, launch task manager and then under “Processes” end “wscript.exe”

I hope u would like it..

Disable-Enable Lock Workstation Functionality (Windows + L)

As everybody knows, using the Windows+L keys together will lock your workstation running Windows 7, XP or Vista. Did you realize that you can also disable this function by using a registry hack?

I suspect that this article will be much more useful to those of you who can’t lock your workstation, but either way we’ll show how to configure this setting.

Manual Registry Hack

Open up regedit.exe through the start menu search box, and then browse down to the following key, creating it if it doesn’t exist:

HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\System


On the right-hand side, create a new DWORD 32-bit value named DisableLockWorkstation and give it one of these values:

•1 – Disable Lock Workstation
•0 – Enable Lock Workstation
The changes should be immediate, no need to restart anything.

Disable/Enable USB port:

1. Goto run
2. Type 'regedit' without quotes
3. Click on HKEY_LOCAL_MACHINE
4. goto SYSTEM
5. Click on CurrentControlSet
6. Click on services
7. Goto USBSTOR
8. Double click on 'Start' where value is 3
9. Now change the value data with 4
10. Now press ok and refresh your desktop your USB port is disabled, to enable the usb port replace the value
4 with 3.

\\\\\\\\\\\\\\\\\\\>By Black Hack

Different Technologies & Their Founders

1. Google: Larry Page & Sergey Brin
2. Facebook: Mark Zuckerberg
3. Yahoo: David Filo & Jerry Yang
4. Twitter: Jack Dorsey & Dick Costolo
5. Internet: Tim Berners Lee
6. Linkdin: Reid Hoffman, Allen Blue & Koonstantin Guericke
7. Email: Shiva Ayyadurai
8. Gtalk: Richard Wah kan
9. Whats up: Laurel Kirtz
10. Hotmail: Sabeer Bhatia
11. Orkut: Buyukkokten
12. Wikipedia: Jimmy Wales
13. You tube: Steve Chen, Chad Hurley & Jawed Karim
14. Rediffmail: Ajit Balakrishnan
15. Nimbuzz: Martin Smink & Evert Jaap Lugt
16. Myspace: Chris Dewolfe & Tom Anderson
17. Ibibo: Ashish Kashyap
18. OLX: Alec Oxenford & Fabrice Grinda
19. Skype: Niklas Zennstrom,JanusFriis & Reid Hoffman
20. Opera: Jon Stephenson von Tetzchner & Geir lvarsoy
21. Mozilla Firefox: Dave Hyatt & Blake Ross
22. Blogger: Evan Willams

Difference between http and httpsin URLs

Difference between http and httpsin URLs

The addresses that begin with"HTTP," stands for "Hyper Text Transfer Protocol."
Whereas "HTTPS" stands for"Hyper Text Transfer Protocol Secure" which means that information exchanged between user and a web site is encrypted and cannot be hacked by someone who might want to electronically cheat when you typea credit card number, a password,a social security number, or any other confidential information.

common passwords list (Download .txt)

A common passwords list download here. (81.06 Kb)

Example:-

password
123456
12345678
1234
qwerty
12345
dragon
pussy
baseball
football
letmein
monkey
696969
abc123
mustang
michael
shadow
master
jennifer
111111
2000
jordan
.
.
.
.
.
.
.
.
and so on.

Codes to hide folders and made like a system tools.

First make a folder then rename it like this <<Foldername + dot(.)+ below code>>

My Briefcase:{85BBD920-42AO-1069-A2E4-08002B30309D}

Desktop: {00021400-0000-0000-C000-0000000000046}

Control Panel:{21EC2020-3AEA-1069-A2DD-08002B30309D}

Dial-Up-Networking:{992CFFA0-F557-101A-88EC-00DD01CCC48}

Fonts: {BD84B380-8CA2-1069-AB1D-08000948534}

Inbox :{00020D76-0000-0000-C000-000000000046}

My Computer :{20D04FE0-3AEA-1069-A2D8-08002B30309D}

Network Neighborhood:{208D2C60-3AEA-1069-A2D7-O8002B30309D}

Printers :{2227A280-3AEA-1069-A2DE-O8002B30309D}

Recycle Bin :{645FF040-5081-101B-9F08-00AA002F954E}

The Microsoft Network:{00028B00-0000-0000-C000-000000000046}

History: {FF393560-C2A7-11CF-BFF4-444553540000}

Winzip :{E0D79300-84BE-11CE-9641-444553540000}

CMD HACKING COMMANDS

I am Sure u guys Know All these commands.... I want to Help The Beginers.. So i am Posting This....

Useful Things to do on CMD!

First, open your Network Connection and right click and select Properties. Then Select TCP/IP and click on Properties again. Now Click on Advanced and WINS tab. Select Default for NeBIOS.

Now back to the main Local Area Connection window, select File and Print Sharing for Mic*ft Networks and hit enter.

This is just to make sure you have NetBIOS enabled. We will have some fun with NetBIOS on CMD.

First thing you need to know is some very helpfull commands to use on CMD(Command Prompt).

In case you don't know how to get CMD open in your box, then click on Start, then Run, then type "cmd" (no quotes, off course... you know the drill).

Back to commands:

nslookup
net view
net use
net user
ping
tracert
arp
route
nbtstat
netstat
ipconfig

In case you don't know some of them, then just type the command on CMD and hit enter. A little help will show up in your screen. Read it and understand what the command does.

Lets start easy...

1) ping : This command will allow you to know if the host you pinging is alive, which means if it is up at the time of executing the "ping" command.

ping x.x.x.x (x is the IP address)

or

ping www.whatever.com (www.whatever.com is the website you want to ping, but you don't know the IP)

OBS: Keep in mind that if the host you pinging is blocking ICMP packets, then the result will be host down.

2) nslookup : This command has many functionalities.
One is for resolving DNS into IP.
Lets say you know the website URL but you don't know its IP(and you want to find out).

nslookup www.whatever.com (www.whatever.com is the website you want to find out the IP)

Now, another really nice function of nslookup is to find out IP of specific Mail Severs

nslookup (enter)
set type=mx (enter)
yahoo.com

This command will give you the mail server IP of yahoo.com. You can use whatever server you want and if it is listed on DNS, then you get the IP. Simple, isn't it?

OK, now why would you want to have an IP of a mail server?
To send spoofed mail to your friends or even for SE.
In case you looking for "How to spoof email", then look for my "How to spoof email tutorial" http://www.infowar.com/forums/showthread.php?s=&threadid=2360

3) tracert : This command will give you the hops that a packet will travel to reach its final destination.

OBS: This command is good to know the route a packet takes before it goes to the target box.

tracert x.x.x.x (x is the IP address)

or

tracert www.whatever.com (www.whatever.com is the website you don't know the IP)

4) arp : This command will show you the arp table. This is good to know if someone is doing arp poisoning in your LAN.

arp -a

5) route : This command will show you the routing table, gateway, interface and metric.

Code:
route print


6) ipconfig : This command will show tons of very helpful things.
Your IP, gateway, dns in use.

Code:
ipconfig
or

Code:
ipconfig /all

this command will give all that info but for all networks you might have it.

Also, in case you have a dynamic IP and want to change it, then type...

Code:
ipconfig /release (this will release your IP)

ipconfig /renew (this will renew your iP)

OBS: Keep in mind that those commands will change your IP, but the new IP will still be tighed up to you. So don't do anything stupid.

7) netstat : This command will show you connection to your box.

Code:
netstat

or

Code:
netstat -a (this will show you all the listening ports and connection with DNS names)
netstat -n (this will show you all the open connection with IP addresses)
netstat -an (this will combined both of the above)

net view x.x.x.x or computername (will list the available sharing folders on the target box)


Now some hints:

Code:
net use \ipaddressipc$ "" /user:administrator

(this command will allow you to connect to the target box as administrator)

Now if you want to connect to the target box and browse the entire C drive, then use this command:

Code:
net use K: \computernameC$
(this will create a virtual drive on your "my computer" folder)

OBS: Keep in mind that this will only works if the target box doesn't have an administrator password set.

And least but not last, the "help" command.

Quote:
whatevercommand /help

or

Quote:
whatevercommand /?


This command will help you to understand what it does and all the switchs available for each command.
Very useful if you know the command, but forgot the right switch.

Check your presence of mind.

Check your presence of mind.
Take the test.
Proceed systematically.
Relax, clear your mind and begin..

1. What do you put in a toaster?

Answer:
"bread." If you said "toast," give up now and do something else.. Try not to hurt yourself. If you said bread, go to Question 2..

2. Say "silk" five times. Now spell "silk." What do cows drink?

Answer:
Cows drink water. If you said "milk," don't attempt the next question. Your brain is over-stressed and may even overheat. However, if you said "water", proceed to question 3...

3. If a red house is made from red bricks and a blue house is made from blue bricks and a pink house is made from pink bricks and a black house is made from black bricks, what is a green house made from?

Answer:
Greenhouses are made from glass. If you said "green bricks," why are you still reading this?? If you said "glass," go on to Question 4.

4. It's twenty years ago, and a plane crashes from 20,000 feet over Germany (If you will recall, Germany at the time was politically divided into East and West Germany) Where would you bury the survivors? East Germany, West Germany, or "no man's land"?

Answer: You don't bury survivors. If you said ANYTHING else, you must stop. If you said, "You don't bury survivors", proceed to the next question.

5. Without using a calculator - You are driving a bus from Mumbai to Pune. In Mumbai , 17 people get on, in Pune , 16 get off. Name the driver.

Answer: Oh, Don't you remember your own name? It was YOU!!

Android Secrete codes

Android Secrete codes
------------------------------------
1. Phone Information, Usage and Battery –   *#*#4636#*#*
2. IMEI Number – *#06#
3. Enter Service Menu On Newer Phones – *#0*#
4. Detailed Camera Information – *#*#34971539#*#*
5. Backup All Media Files – *#*#273282*255*663282*#*#*
6. Wireless LAN Test – *#*#232339#*#*
7. Enable Test Mode for Service – *#*#197328640#*#*
8. Back-light Test – *#*#0842#*#*
9. Test the Touchscreen – *#*#2664#*#*
10. Vibration Test – *#*#0842#*#*
11. FTA Software Version – *#*#1111#*#*
12. Complete Software and Hardware Info – *#12580*369#
13. Diagnostic Configuration – *#9090#
14. USB Logging Control – *#872564#
15. System Dump Mode – *#9900#
16. HSDPA/HSUPA Control Menu – *#301279#
17. View Phone Lock Status – *#7465625#
18. Reset the Data Partition to Factory State – *#*#7780#*#*
19. Format Your Device To Factory State(will delete everything on your phone) – *2767*3855#
20. Hidden Service Menu For Motorola Droid – ##7764726

An A-Z Index of the Windows CMD command line

An A-Z Index of the Windows CMD command line

A
   ADDUSERS Add or list users to/from a CSV file
   ADmodcmd Active Directory Bulk Modify
   ARP      Address Resolution Protocol
   ASSOC    Change file extension associations•
   ASSOCIAT One step file association
   ATTRIB   Change file attributes
B
   BCDBOOT  Create or repair a system partition
   BCDEDIT  Manage Boot Configuration Data
   BITSADMIN Background Intelligent Transfer Service
   BOOTCFG  Edit Windows boot settings
   BROWSTAT Get domain, browser and PDC info
C
   CACLS    Change file permissions
   CALL     Call one batch program from another•
   CERTREQ  Request certificate from a certification authority
   CD       Change Directory - move to a specific Folder•
   CHANGE   Change Terminal Server Session properties
   CHKDSK   Check Disk - check and repair disk problems
   CHKNTFS  Check the NTFS file system
   CHOICE   Accept keyboard input to a batch file
   CIPHER   Encrypt or Decrypt files/folders
   CleanMgr Automated cleanup of Temp files, recycle bin
   CLEARMEM Clear memory leaks
   CLIP     Copy STDIN to the Windows clipboard
   CLS      Clear the screen•
   CLUSTER  Windows Clustering
   CMD      Start a new CMD shell
   CMDKEY   Manage stored usernames/passwords
   COLOR    Change colors of the CMD window•
   COMP     Compare the contents of two files or sets of files
   COMPACT  Compress files or folders on an NTFS partition
   COMPRESS Compress individual files on an NTFS partition
   CON2PRT  Connect or disconnect a Printer
   CONVERT  Convert a FAT drive to NTFS
   COPY     Copy one or more files to another location•
   CSCcmd   Client-side caching (Offline Files)
   CSVDE    Import or Export Active Directory data
D
   DATE     Display or set the date•
   DEFRAG   Defragment hard drive
   DEL      Delete one or more files•
   DELPROF  Delete user profiles
   DELTREE  Delete a folder and all subfolders
   DevCon   Device Manager Command Line Utility
   DIR      Display a list of files and folders•
   DIRUSE   Display disk usage
   DISKPART Disk Administration
   DISKSHADOW Volume Shadow Copy Service
   DNSSTAT  DNS Statistics
   DOSKEY   Edit command line, recall commands, and create macros
   DriverQuery Display installed device drivers
   DSACLs   Active Directory ACLs
   DSAdd    Add items to active directory (user group computer)
   DSGet    View items in active directory (user group computer)
   DSQuery  Search for items in active directory (user group computer)
   DSMod    Modify items in active directory (user group computer)
   DSMove   Move an Active directory Object
   DSRM     Remove items from Active Directory
E
   ECHO     Display message on screen•
   ENDLOCAL End localisation of environment changes in a batch file•
   ERASE    Delete one or more files•
   EVENTCREATE Add a message to the Windows event log
   EXIT     Quit the current script/routine and set an errorlevel•
   EXPAND   Uncompress files
   EXTRACT  Uncompress CAB files
F
   FC       Compare two files
   FIND     Search for a text string in a file
   FINDSTR  Search for strings in files
   FOR /F   Loop command: against a set of files•
   FOR /F   Loop command: against the results of another command•
   FOR      Loop command: all options Files, Directory, List•
   FORFILES Batch process multiple files
   FORMAT   Format a disk
   FREEDISK Check free disk space (in bytes)
   FSUTIL   File and Volume utilities
   FTP      File Transfer Protocol
   FTYPE    File extension file type associations•
G
   GETMAC   Display the Media Access Control (MAC) address
   GLOBAL   Display membership of global groups
   GOTO     Direct a batch program to jump to a labelled line•
   GPRESULT Display Resultant Set of Policy information
   GPUPDATE Update Group Policy settings
H
   HELP     Online Help
I
   iCACLS   Change file and folder permissions
   IF       Conditionally perform a command•
   IFMEMBER Is the current user a member of a Workgroup
   IPCONFIG Configure IP
K
   KILL     Remove a program from memory
L
   LABEL    Edit a disk label
   LOCAL    Display membership of local groups
   LOGEVENT Write text to the event viewer
   LOGMAN   Manage Performance Monitor
   LOGOFF   Log a user off
   LOGTIME  Log the date and time in a file

An A-Z Index of the Windows CMD command line

   ADDUSERS Add or list users to/from a CSV file
   ADmodcmd Active Directory Bulk Modify
   ARP      Address Resolution Protocol
   ASSOC    Change file extension associations•
   ASSOCIAT One step file association
   ATTRIB   Change file attributes
B
   BCDBOOT  Create or repair a system partition
   BCDEDIT  Manage Boot Configuration Data
   BITSADMIN Background Intelligent Transfer Service
   BOOTCFG  Edit Windows boot settings
   BROWSTAT Get domain, browser and PDC info
C
   CACLS    Change file permissions
   CALL     Call one batch program from another•
   CERTREQ  Request certificate from a certification authority
   CD       Change Directory - move to a specific Folder•
   CHANGE   Change Terminal Server Session properties
   CHKDSK   Check Disk - check and repair disk problems
   CHKNTFS  Check the NTFS file system
   CHOICE   Accept keyboard input to a batch file
   CIPHER   Encrypt or Decrypt files/folders
   CleanMgr Automated cleanup of Temp files, recycle bin
   CLEARMEM Clear memory leaks
   CLIP     Copy STDIN to the Windows clipboard
   CLS      Clear the screen•
   CLUSTER  Windows Clustering
   CMD      Start a new CMD shell
   CMDKEY   Manage stored usernames/passwords
   COLOR    Change colors of the CMD window•
   COMP     Compare the contents of two files or sets of files
   COMPACT  Compress files or folders on an NTFS partition
   COMPRESS Compress individual files on an NTFS partition
   CON2PRT  Connect or disconnect a Printer
   CONVERT  Convert a FAT drive to NTFS
   COPY     Copy one or more files to another location•
   CSCcmd   Client-side caching (Offline Files)
   CSVDE    Import or Export Active Directory data
D
   DATE     Display or set the date•
   DEFRAG   Defragment hard drive
   DEL      Delete one or more files•
   DELPROF  Delete user profiles
   DELTREE  Delete a folder and all subfolders
   DevCon   Device Manager Command Line Utility
   DIR      Display a list of files and folders•
   DIRUSE   Display disk usage
   DISKPART Disk Administration
   DISKSHADOW Volume Shadow Copy Service
   DNSSTAT  DNS Statistics
   DOSKEY   Edit command line, recall commands, and create macros
   DriverQuery Display installed device drivers
   DSACLs   Active Directory ACLs
   DSAdd    Add items to active directory (user group computer)
   DSGet    View items in active directory (user group computer)
   DSQuery  Search for items in active directory (user group computer)
   DSMod    Modify items in active directory (user group computer)
   DSMove   Move an Active directory Object
   DSRM     Remove items from Active Directory
E
   ECHO     Display message on screen•
   ENDLOCAL End localisation of environment changes in a batch file•
   ERASE    Delete one or more files•
   EVENTCREATE Add a message to the Windows event log
   EXIT     Quit the current script/routine and set an errorlevel•
   EXPAND   Uncompress files
   EXTRACT  Uncompress CAB files
F
   FC       Compare two files
   FIND     Search for a text string in a file
   FINDSTR  Search for strings in files
   FOR /F   Loop command: against a set of files•
   FOR /F   Loop command: against the results of another command•
   FOR      Loop command: all options Files, Directory, List•
   FORFILES Batch process multiple files
   FORMAT   Format a disk
   FREEDISK Check free disk space (in bytes)
   FSUTIL   File and Volume utilities
   FTP      File Transfer Protocol
   FTYPE    File extension file type associations•
G
   GETMAC   Display the Media Access Control (MAC) address
   GLOBAL   Display membership of global groups
   GOTO     Direct a batch program to jump to a labelled line•
   GPRESULT Display Resultant Set of Policy information
   GPUPDATE Update Group Policy settings
H
   HELP     Online Help
I
   iCACLS   Change file and folder permissions
   IF       Conditionally perform a command•
   IFMEMBER Is the current user a member of a Workgroup
   IPCONFIG Configure IP
K
   KILL     Remove a program from memory
L
   LABEL    Edit a disk label
   LOCAL    Display membership of local groups
   LOGEVENT Write text to the event viewer
   LOGMAN   Manage Performance Monitor
   LOGOFF   Log a user off
   LOGTIME  Log the date and time in a file
M
   MAPISEND Send email from the command line
   MBSAcli  Baseline Security Analyzer
   MEM      Display memory usage
   MD       Create new folders•
   MKLINK   Create a symbolic link (linkd)
   MODE     Configure a system device
   MORE     Display output, one screen at a time
   MOUNTVOL Manage a volume mount point
   MOVE     Move files from one folder to another•
   MOVEUSER Move a user from one domain to another
   MSG      Send a message
   MSIEXEC  Microsoft Windows Installer
   MSINFO32 System Information
   MSTSC    Terminal Server Connection (Remote Desktop Protocol)
   MV       Copy in-use files
N
   NET      Manage network resources
   NETDOM   Domain Manager
   NETSH    Configure Network Interfaces, Windows Firewall & Remote access
   NETSVC   Command-line Service Controller
   NBTSTAT  Display networking statistics (NetBIOS over TCP/IP)
   NETSTAT  Display networking statistics (TCP/IP)
   NOW      Display the current Date and Time
   NSLOOKUP Name server lookup
   NTBACKUP Backup folders to tape
   NTRIGHTS Edit user account rights
O
   OPENFILES Query or display open files
P
   PATH     Display or set a search path for executable files•
   PATHPING Trace route plus network latency and packet loss
   PAUSE    Suspend processing of a batch file and display a message•
   PERMS    Show permissions for a user
   PERFMON  Performance Monitor
   PING     Test a network connection
   POPD     Return to a previous directory saved by PUSHD•
   PORTQRY  Display the status of ports and services
   POWERCFG Configure power settings
   PRINT    Print a text file
   PRINTBRM Print queue Backup/Recovery
   PRNCNFG  Display, configure or rename a printer
   PRNMNGR  Add, delete, list printers set the default printer
   PROMPT   Change the command prompt•
   PsExec     Execute process remotely
   PsFile     Show files opened remotely
   PsGetSid   Display the SID of a computer or a user
   PsInfo     List information about a system
   PsKill     Kill processes by name or process ID
   PsList     List detailed information about processes
   PsLoggedOn Who's logged on (locally or via resource sharing)
   PsLogList  Event log records
   PsPasswd   Change account password
   PsPing     Measure network performance
   PsService  View and control services
   PsShutdown Shutdown or reboot a computer
   PsSuspend  Suspend processes
   PUSHD    Save and then change the current directory•
Q
   QGREP    Search file(s) for lines that match a given pattern
   Query Process    Display processes (TS/Remote Desktop)
   Query Session    Display all sessions (TS/Remote Desktop)
   Query TermServer List all servers (TS/Remote Desktop)
   Query User       Display user sessions (TS/Remote Desktop)
R
   RASDIAL  Manage RAS connections
   RASPHONE Manage RAS connections
   RECOVER  Recover a damaged file from a defective disk
   REG      Registry: Read, Set, Export, Delete keys and values
   REGEDIT  Import or export registry settings
   REGSVR32 Register or unregister a DLL
   REGINI   Change Registry Permissions
   REM      Record comments (remarks) in a batch file•
   REN      Rename a file or files•
   REPLACE  Replace or update one file with another
   Reset Session  Delete a Remote Desktop Session
   RD       Delete folder(s)•
   RMTSHARE Share a folder or a printer
   ROBOCOPY Robust File and Folder Copy
   ROUTE    Manipulate network routing tables
   RUN      Start | RUN commands
   RUNAS    Execute a program under a different user account
   RUNDLL32 Run a DLL command (add/remove print connections)

S
   SC       Service Control
   SCHTASKS Schedule a command to run at a specific time
   SCLIST   Display Services
   SET      Display, set, or remove session environment variables•
   SETLOCAL Control the visibility of environment variables•
   SETX     Set environment variables
   SFC      System File Checker
   SHARE    List or edit a file share or print share
   ShellRunAs Run a command under a different user account
   SHIFT    Shift the position of batch file parameters•
   SHORTCUT Create a windows shortcut (.LNK file)
   SHOWGRPS List the Workgroups a user has joined
   SHOWMBRS List the Users who are members of a Workgroup
   SHUTDOWN Shutdown the computer
   SLEEP    Wait for x seconds
   SLMGR    Software Licensing Management (Vista/2008)
   SOON     Schedule a command to run in the near future
   SORT     Sort input
   START    Start a program, command or batch file•
   SU       Switch User
   SUBINACL Edit file and folder Permissions, Ownership and Domain
   SUBST    Associate a path with a drive letter
   SYSTEMINFO List system configuration
T
   TAKEOWN  Take ownership of a file
   TASKLIST List running applications and services
   TASKKILL Remove a running process from memory
   TIME     Display or set the system time•
   TIMEOUT  Delay processing of a batch file
   TITLE    Set the window title for a CMD.EXE session•
   TLIST    Task list with full path
   TOUCH    Change file timestamps  
   TRACERT  Trace route to a remote host
   TREE     Graphical display of folder structure
   TSSHUTDN Remotely shut down or reboot a terminal server
   TYPE     Display the contents of a text file•
   TypePerf Write performance data to a log file
U
   USRSTAT  List domain usernames and last login
V
   VER      Display version information•
   VERIFY   Verify that files have been saved•
   VOL      Display a disk label•
W
   WAITFOR  Wait for or send a signal
   WHERE    Locate and display files in a directory tree
   WHOAMI   Output the current UserName and domain
   WINDIFF  Compare the contents of two files or sets of files
   WINMSDP  Windows system report
   WINRM    Windows Remote Management
   WINRS    Windows Remote Shell
   WMIC     WMI Commands
   WUAUCLT  Windows Update
X
   XCACLS   Change file and folder permissions
   XCOPY    Copy files and folders
   ::       Comment / Remark•

Commands marked • are Internal commands only available within the CMD shell.
All other commands (not marked with •) are external commands.
External commands may be used under the CMD shell, PowerShell, or directly from START-RUN.

   MAPISEND Send email from the command line
   MBSAcli  Baseline Security Analyzer
   MEM      Display memory usage
   MD       Create new folders•
   MKLINK   Create a symbolic link (linkd)
   MODE     Configure a system device
   MORE     Display output, one screen at a time
   MOUNTVOL Manage a volume mount point
   MOVE     Move files from one folder to another•
   MOVEUSER Move a user from one domain to another
   MSG      Send a message
   MSIEXEC  Microsoft Windows Installer
   MSINFO32 System Information
   MSTSC    Terminal Server Connection (Remote Desktop Protocol)
   MV       Copy in-use files
N
   NET      Manage network resources
   NETDOM   Domain Manager
   NETSH    Configure Network Interfaces, Windows Firewall & Remote access
   NETSVC   Command-line Service Controller
   NBTSTAT  Display networking statistics (NetBIOS over TCP/IP)
   NETSTAT  Display networking statistics (TCP/IP)
   NOW      Display the current Date and Time
   NSLOOKUP Name server lookup
   NTBACKUP Backup folders to tape
   NTRIGHTS Edit user account rights
O
   OPENFILES Query or display open files
P
   PATH     Display or set a search path for executable files•
   PATHPING Trace route plus network latency and packet loss
   PAUSE    Suspend processing of a batch file and display a message•
   PERMS    Show permissions for a user
   PERFMON  Performance Monitor
   PING     Test a network connection
   POPD     Return to a previous directory saved by PUSHD•
   PORTQRY  Display the status of ports and services
   POWERCFG Configure power settings
   PRINT    Print a text file
   PRINTBRM Print queue Backup/Recovery
   PRNCNFG  Display, configure or rename a printer
   PRNMNGR  Add, delete, list printers set the default printer
   PROMPT   Change the command prompt•
   PsExec     Execute process remotely
   PsFile     Show files opened remotely
   PsGetSid   Display the SID of a computer or a user
   PsInfo     List information about a system
   PsKill     Kill processes by name or process ID
   PsList     List detailed information about processes
   PsLoggedOn Who's logged on (locally or via resource sharing)
   PsLogList  Event log records
   PsPasswd   Change account password
   PsPing     Measure network performance
   PsService  View and control services
   PsShutdown Shutdown or reboot a computer
   PsSuspend  Suspend processes
   PUSHD    Save and then change the current directory•
Q
   QGREP    Search file(s) for lines that match a given pattern
   Query Process    Display processes (TS/Remote Desktop)
   Query Session    Display all sessions (TS/Remote Desktop)
   Query TermServer List all servers (TS/Remote Desktop)
   Query User       Display user sessions (TS/Remote Desktop)
R
   RASDIAL  Manage RAS connections
   RASPHONE Manage RAS connections
   RECOVER  Recover a damaged file from a defective disk
   REG      Registry: Read, Set, Export, Delete keys and values
   REGEDIT  Import or export registry settings
   REGSVR32 Register or unregister a DLL
   REGINI   Change Registry Permissions
   REM      Record comments (remarks) in a batch file•
   REN      Rename a file or files•
   REPLACE  Replace or update one file with another
   Reset Session  Delete a Remote Desktop Session
   RD       Delete folder(s)•
   RMTSHARE Share a folder or a printer
   ROBOCOPY Robust File and Folder Copy
   ROUTE    Manipulate network routing tables
   RUN      Start | RUN commands
   RUNAS    Execute a program under a different user account
   RUNDLL32 Run a DLL command (add/remove print connections)

S
   SC       Service Control
   SCHTASKS Schedule a command to run at a specific time
   SCLIST   Display Services
   SET      Display, set, or remove session environment variables•
   SETLOCAL Control the visibility of environment variables•
   SETX     Set environment variables
   SFC      System File Checker
   SHARE    List or edit a file share or print share
   ShellRunAs Run a command under a different user account
   SHIFT    Shift the position of batch file parameters•
   SHORTCUT Create a windows shortcut (.LNK file)
   SHOWGRPS List the Workgroups a user has joined
   SHOWMBRS List the Users who are members of a Workgroup
   SHUTDOWN Shutdown the computer
   SLEEP    Wait for x seconds
   SLMGR    Software Licensing Management (Vista/2008)
   SOON     Schedule a command to run in the near future
   SORT     Sort input
   START    Start a program, command or batch file•
   SU       Switch User
   SUBINACL Edit file and folder Permissions, Ownership and Domain
   SUBST    Associate a path with a drive letter
   SYSTEMINFO List system configuration
T
   TAKEOWN  Take ownership of a file
   TASKLIST List running applications and services
   TASKKILL Remove a running process from memory
   TIME     Display or set the system time•
   TIMEOUT  Delay processing of a batch file
   TITLE    Set the window title for a CMD.EXE session•
   TLIST    Task list with full path
   TOUCH    Change file timestamps  
   TRACERT  Trace route to a remote host
   TREE     Graphical display of folder structure
   TSSHUTDN Remotely shut down or reboot a terminal server
   TYPE     Display the contents of a text file•
   TypePerf Write performance data to a log file
U
   USRSTAT  List domain usernames and last login
V
   VER      Display version information•
   VERIFY   Verify that files have been saved•
   VOL      Display a disk label•
W
   WAITFOR  Wait for or send a signal
   WHERE    Locate and display files in a directory tree
   WHOAMI   Output the current UserName and domain
   WINDIFF  Compare the contents of two files or sets of files
   WINMSDP  Windows system report
   WINRM    Windows Remote Management
   WINRS    Windows Remote Shell
   WMIC     WMI Commands
   WUAUCLT  Windows Update
X
   XCACLS   Change file and folder permissions
   XCOPY    Copy files and folders
   ::       Comment / Remark•

Commands marked • are Internal commands only available within the CMD shell.
All other commands (not marked with •) are external commands.
External commands may be used under the CMD shell, PowerShell, or directly from START-RUN.

40+ operation written in c language

Do you know 40+ Operating
systems written in C programming..

DG/UX
DDC-l
OpenVMS
Ultrix
HP-UX
Enea OSE
Google Chrome OS
Android
HP-UX 11i
z/OS
AIX (Advanced Interactive
Exective)
OpenSolaris
OS/2
IBM Academic Operating System
ICL VME (Virtual Machine
Entertainment)
MicroC/OS-III
WindowsNT
Windows CE
Singularity Operating System
RTXC Quadros
OS-9
Solaris
UNIX
Minix
BSD Unix
Darwin
Linux
OpenIndiana
ReactOS
Inferno
MorphOS
EmuTOS
iOS
Maemo
Windows Phone
iPoadLinux
Rockbox
eCos
ThreadX
Unix
AmigaOS
Mint (Mint is now Tos)

10 Free Online Tools a Hacker Must Know

I like the KISS rule, here are some online tools a Hacker must know:

1. Emkei’s Mailer : Email Spoofer

2. GuerillaMail : Email Spoofer - better than emkei's mailer

3. Cloud9 : Your online IDE for editing code from any PC

4. Ideone.com : Test your code, almost all languages.

5. TextMechanic : Format your text, all at one site

6. Crypo  : Compilation of all encryption/decryption tools on one place.

7. WebSniffer : Check what are the headers/ HTTP return of a request

8. Ping.eu : pinging / speed test / dns lookup

9. Plus.im : All IM, online

10. Mail2Web : Accessing POP3 emails online

7 Miscellaneous Hacking Attacks Ever Happened

1.) GIFAR:

Graphics Interchange Format Java Archives (GIFAR) was a malware that lets attacker piggy back victim’s HTTP cookies. This attack had been done by four persons namely John Heasman, Rob Carter, Nathan McFeters, and Billy Rios. We are placing it at top because it was very widespread due to use of GIF (image file) and JAR (Java Archive). In this attack, GIF or JAR file executes a malicious code on the users’ side. This attack was not able to execute automatically, but users need to be logged in on the website hosting the image.

2.) Google Gears Cross-Origin Model Exploit:

This hacking attack was done by Yair Yamit and it was related to abusing the Google Gears loader’s tendency in order to disregard a Gears workers file header as it loads it. Google Gear is a browser extension that lets developers create richer and responsive web application. In this attack, attacker create a text file that has malicious gear commands.

4.) Clickjacking:

This attack was discovered by Robert Hansen and Jeremiah Grossman. They Demonstrated that stealing the “clicks” away from users via link redirects or streaming videos is possible care of an arbitrary JavaScript code. This attack was mostly used against Facebook and Twitter to gain likes and followers.

4.) The Safari Bomber:

This attack had been discovered by Nitesh Dhanjani. He revealed that a rogue website has the capability to “carpet bomb” a user’s Windows desktop or Mac OS X’s downloads directory with malicious codes using the Safari browser.

5.) Opera Exploitation:

This attack had been done by Stefano Di Paola. He demonstrated that exploitation of opera mostly revolves around stealing history, creating a botnet, or redirecting users to a hacker-controlled rogue website.

6.) HTML 5 Abuse:

This attack was discovered by Alberto Trivero. He demonstrated that structured client-side storage technology of HTML 5 is very, very vulnerable to an assortment of creative and not-so-creative hacker techniques all aimed at stealing stored data from a target’s computer.

7.) Flash Parameter Injection:

This attack was discovered by Adi Sharabani, Ayal Yogev, and Yuval Baror. They produced that a presentation showcasing just how a cyber attack could use the Flash parameter to load malicious movies and attack a Flash-based system even after the vulnerability is patched. You can read more about this attack here.