ccording to their website, WhatWeb identifies websites. Its goal is to answer the question, “What is that Website?”. WhatWeb recognises web ...
Crack cPanels using WhmKiller Shell
For educational purposes only! I will not take responsibility for you! Hello Readers!! Today i’m gonna tell you how to crack cPanel password...
How to use Joomscan | Backtrack 5 R3
Introduction Joomscan is a Joomla vulnerability scanner. It detects file inclusion, sql injection, command execution vulnerabilities of a ...
How to hack sites using symlink
For educational purposes only! I will not take responsibility for you! Today I will show you how to hack websites hosted on the server using...
Sniffing FTP Password Through Wireshark
For educational purposes only! I will not take responsibility for you! Here I will demonstrate you how to sniff packets through Wireshark. H...
Direct Shell Upload in WordPress
For educational purposes only! I will not take responsibility for you! I had kept this topic on hold since long, as it was planned to be the...
Linux Server Rooting
For educational purposes only! I will not take responsibility for you! In this post, I will be demonstrating how to root a Linux server with...
Hack Gmail Password Account using Hydra
Here is a small tutorial for those who are asking how to hack gmail account. So lets get into tutorial. Open Kali terminal and type. Also yo...
Joomla! 1.6/1.7/2.5 Privilege Escalation Vulnerability
#Haxor32 Joomla! 1.6.x/1.7.x/2.5.0-2.5.2 suffers from a privilege escalation vulnerability that allows users to be registered into any gro...
Joomla and WordPress sites Finder and Brute Forcer
#Haxor32 Joomla and WordPress Sites Finder and Brute Forcer Enjoy guys The Archive Contains 1. Joomla BruteForcer PHP Shell 2. WordPress...
WordPress Scanner v 1.0
Hi all my friends today i will present you a nice tool for WordPress wich you can scan with it a website using wordpress and check vulnerabi...
Bypass Symlink in Apache Servers
Hello everybody , today i’m going to explain how to bypass symlink in ovh server, well most of hackers find problem in ovh when trying to sy...
New Forum about Pentest, Hacking, Security
Here is new forum where you can learn about pentest/security. We will try to answer on all your questions. When you register write something...
Joomla JCE Remote File Upload exploit (Zero Day)
Joomla JCE Remote File Upload exploit Exploit name: Exploit for JCE Joomla Extension (Auto Shell Uploader) V0.1 - PHP Version DORK: inurl:...
Kali Linux 1.0.4 Released
In keeping with our tradition of publishing new releases during the annual Black Hat and DEF CON conferences, we are pleased to announce the...
SIM Cards can be Hacked; Give me any phone number i will clone that researcher says
In this Modern Era everyone knows that his/her latest mobile can be hacked by hackers but now The simcard hacking flaw was discovered by Ger...
HOW CAN YOU MAKE YOUR PASSWORD UNBREAKABLE ?
Space search Calculator: yes it is https://www.grc.com/haystack.htm So what it does ? This calculator is designed to help users understand ...
DroidSQLi : First automated MySQL Injection tool for Android
DroidSQLi is the first automated MySQL Injection tool for Android. It allows you to test your MySQL-based web application against SQL inject...
How to make a backdoor using Weevely
Today Ill tell you how to use Weevely to make a backdoor from a server. So now lets begin:- I’m not goin to tell you about the commands of L...