1ND14N H4X0R5 T34M (IHT) JAI HIND JAI BHARAT

We are :- DeadManINDIA,Null_Port_Govind,Haxor Rahul,EagleShadow,Karate-Katrina,Spy-Hunter,Grey-Noob,Mr.R@66!T.

Saturday, 15 June 2013

How 2 decrypt passwords a complete tut!!

How 2 decrypt passwords a complete tut!! i hope you all like and find useful How to decrypt passwords Tutorial Probably if you're looking at this tutorial is because you don't know how to decrypt passwords to download keylogger, rats, etc. Okay my intentions of doing this tutorial are for noobs that doesn’t know how to decrypt passwords and they keep posting how I can decrypt the password. First...

SPEED UPTO 20% OF YOUR INTERNET BANDWIDTH [TRICK]

SPEED UPTO 20% OF YOUR INTERNET BANDWIDTH [TRICK]   How to Free Up the 20% Reserved Bandwidth: To free up the bandwidth just follow the below simple steps: 1. Login to your system as Administrator. 2. Click on Start button and then select RUN. 3. Step 2 will bring a small window in the LHS bottom corner. On that window type GPEDIT.MSC and press enter 4. Step 3 will bring a new window. On that window under the Local User Policy (on the LHS coloumn) select Administrative Templates from the Computer Configuration section. 5....

How To Upload Your PHP Shell Via Tamper Data (Firefox Add-On)

How To Upload Your PHP Shell Via Tamper Data (Firefox Add-On) This is tutorial dedicated to those who get login details but somehow they are unable to upload the PHP shell to the victim website. First of all, you should download this little add-on for Firefox: DL here NOTE: You need to rename your shell from .php to .jpg to bypass the website's security. As an example i'll take - http://freead1.net/post-free-ad-to-USA-42 It is a free classified...

Friday, 14 June 2013

How to Setup your own Proxy Server for Free

How to Setup your own Proxy Server for Free How to Setup your own Proxy Server for FreeDo a simple Google search like “proxy servers” and you’ll find dozens of PHP proxy scripts on the Internet that will help you create proxy servers in minutes for free. The only limitation with PHP based proxies is that you require a web server to host the proxy scripts and second, you also need a domain name to act as an address...

Google hack tricks you'v never seen before 1

Google hack tricks you'v never seen before 1 Hi brothers today i will show something cool. Ok today i will show google hack demostration you'v never seen before. You will never find these fucking google hack codes on internet. just watch and learn what i have discovered!!! Ok it's time to show the secrets. and this is the best google hack codes. I can make and combine any text and make google dorks from javascript, from fucking html,css jquery,mootools and so on really fast and find anything on this fucking lol g**gle !!! I can bet what...

Java Applet Method Handle Remote Code Execution

Java Applet Method Handle Remote Code Execution Code: ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit # web site for more information on licensing and terms of use. #   http://metasploit.com/ ## require 'msf/core' require 'rex' class Metasploit3 < Msf::Exploit::Remote   Rank = ExcellentRanking   include Msf::Exploit::Remote::HttpServer::HTML   include Msf::Exploit::EXE   include Msf::Exploit::Remote::BrowserAutopwn   autopwn_info({...

WordPress SolveMedia 1.1.0 CSRF Vulnerability

WordPress SolveMedia 1.1.0 CSRF Vulnerability Code: Google Dork: inurl:wp-content/plugins/solvemedia   SolveMedia is a capatcha service that allows webmasters to monetize from correct captcha type-ins, solvemedia.admin.inc is vulnerable to CSRF, there is no anti-CSRF tokens implemented nor is the wp-nonce function used, therefore an attacker can change the webmasters SolveMedia API Keys (public key, private key, hash key) to the...

WEP Cracking with Windows

 WEP Cracking with Windows TOOLS REQUIREDYou have to download 2 tools 1. CommView for WiFi: http://tamos.com/download/main/ca.php2. Aircarck-NG GUI for Windows: http://aircrack-ng.org/Steps1. Install CommView. While installation you maybe asked whether you want to install the application in VoIP mode or Standard mode. Both mode will work fine for our case. But I usually used the VoIP mode. It will automatically seraches...

An Interesting Trick to Hide the Data in Notepad.

 An Interesting Trick to Hide the Data in Notepad.  An Interesting Trick to Hide the Data in Notepad. Hello Friends, There is “An Interesting Trick to Hide the Data in Notepad.”Here is a small trick to hide text inside your windows default text editor i.e. Notepad using command prompt, but this trick works only on NTFS file system.Steps to hide text in a Notepad1. Open your command...

how to kick out people who use our wifi

how to kick out people who use our wifi sometimes sharing wifi make internet slower especially when downloading file.ok,i'll show you how to kick out people who use our wifi.let's start! 1) first of all we need net cut.link has been provided below http://www.arcai.com/arcai-netcut-faq/fr...etcut.html 2)install it.Select IP address that need to cut it down,then click ‘ Cut Off (Ready) ‘ icon to get it done,that all .pretty simple isn't? 3)if...

Metasploit Tutorial - With an example |

 Metasploit Tutorial - With an example | This is an advance topic.Read Carefully. Feel free to ask any kind of queries . We are always here to help you.If you are really interested in network security, chances are you must have heard of the Metasploit over the last few years.Now, have you ever wondered what someone can do to your PC, by just knowing your IP. Here's the answer. He could 0wN you, or in other words , he could have full access...

Thursday, 13 June 2013

How to Root Your Android Phone or Tablet

How to Root Your Android Phone or Tablet We love Android, but rooting your phone can give you the opportunity to do so much more than your phone can do out of the box—whether its wireless tethering, speeding it up with overclocking, or customizing the look of your phone with themes. A rooted Android device unlocks its potential, allowing users to deceive the limitations placed upon it by carriers and hardware manufacturers. Why...