Archive for the ‘hacks’ Category

Backtrack-Linux.org, home of the highest rated and acclaimed Linux security distribution to date. BackTrack is a Linux-based penetration testing arsenal that aids security professionals in the ability to perform assessments in a purely native environment dedicated to hacking. Regardless if you’re making BackTrack you Install BackTrack, boot it from a Live DVD or thumbdrive, the penetration distribution has been customized down to every package, kernel configuration, script and patch solely for the purpose of the penetration tester.

BackTrack is intended for all audiences from the most savvy security professionals to early newcomers to the information security field. BackTrack promotes a quick and easy way to find and update the largest database of security tools collection to-date. Our community of users range from skilled penetration testers in the information security field, government entities, information technology, security enthusiasts, and individuals new to the security community.

Feedback from all industries and skill levels allows us to truly develop a solution that is tailored towards everyone and far exceeds anything ever developed both commercially and freely available. The project is funded by Offensive Security. Whether you’re hacking wireless, exploiting servers, performing a web application assessment, learning, or social-engineering a client, BackTrack is the one-stop-shop for all of your security needs.

DIRECT DOWNLOAD LINK

This content is password protected. To view it please enter your password below:

20 Best Hacking and Security Software Tools for Linux

Previously i’ve posted a tutorial Learn More About Linux Security. Here i’m going to show you some of the best hacking tools for Linux. Linux is a hacker’s dream computer operating system. It supports tons of tools and utilities for cracking passwords, scanning network vulnerabilities, and detecting possible intrusions. I have here a collection of 20 of the best hacking and security software tools for Linux. I’ll show you how to install theses tools in Ubuntu, Fedora, Debain, and Open Suse.

(more…)

Android in the one of the widely accepted OS in devices(phones,Tabs etc) these days because of its largely managed apps and control it give to its users.Where is honey so bears are there……

(more…)

Leet, the language of the Geeks and Hackers.

To speak leet, you more or less need to un-learn proper english. The history of leet goes back to the early days of online message boards, or forums, where users can post messages to carry on a threaded conversation. In an attempt to “Clean-Up” the language that users would sometimes post, admins added a filtering system to the message board which would replace restricted words with some type of alternative.

(more…)

Looking for ways to dual boot your MAC Os with Windows. Luckily Apple has released Boot Camp utility that  lets you install Windows OS along with Mactnitosh on your Macbook Pro.This will provide you the flexibilty to run Windows and Mac Softwares on single machine. Boot Camp works with EFI (Extensible Firmware Interface). EFI is software interface between the operating system and the firmware which is best for replacement of older BIOS. After Dual boot whenever you will start your Macbook you will have the option to either start Mac or Windows.

(more…)

Everybody likes video games, and the best ones have a fair share of creative geniuses who want to develop their games or just want to mod their favorite one for a richer gaming experience. This time, I will be specifying some great tools that you can use for modifying and hacking your favorite video games.

(more…)

This is step-by-step instructions on how to perform untethered jailbreak of your iPhone 4S on iOS 5.0 or iOS 5.0.1 firmware using Absinthe for Windows.

READ THE FULL STORY ( INCLUDED STEP BY STEP TUTORIAL TO ROOT IPHONE 4S )

Your phone houses some of the most sensitive data in your life. Phone numbers, private notes, emails, internet history, financial information, personal photos—virtually everything you do can be captured and catalogued on your phone. That’s why it’s of utmost importance that you secure your phone against any potential threat, be it damaging malware, unsecure web pages, or the physical theft of your phone. Your smartphone is a part of your identity, so securing it should be a no-brainer.

If you don’t have any extra security on your smartphone, now is the time to try out some of the options available. Here are some of the best security apps and services out there for Android and iOS:

WANNA LEARN HOW TO MAKE YOUR OWN KEYLOGGER ?

Here is step by step tuorial that will help you to make a keylogger in C++ using dev-c++, it can also be done in codegear c++ builder, Visual studio and similar.
Keylogger is simple stealth software that sits between keyboard hardware and the operatingsystem, so that it can record every key stroke. check out-

(more…)