CLICK ON IMAGE AND JOIN


LIKE FB PAGE

Sunday, 21 September 2014

TAGGED UNDER:

HACKING BOOK PART -1,2,3 BY ANOOP KAUSHAL




Any proceedings and or activities related to the material Contained within this volume are exclusively your liabilities. The misuse and mistreat of the information in this book can consequence in unlawful charges brought against the persons in question. The authors and review analyzers will not be held responsible in the event any unlawful charges brought against any individuals by misusing the information in this book to break the law. This book contains material and resources that can be potentially destructive or dangerous. If you do not fully comprehend something on this book, don‘t study this book.
Please refer to the laws and acts of your state/region/ province/zone/territory or country before accessing, using, or in any other way utilizing these resources. These materials and resources are for educational and research purposes only. Do not attempt to violate the law with anything enclosed here within. If this is your intention, then leave now. Neither writer of this book, review analyzers, the publisher, nor anyone else affiliated in any way, is going to admit any responsibility for your proceedings, actions or trials.

DOWNLOAD ALL THREE PART :-

PART-1

DOWNLOAD HERE     

PART-2

DOWNLOAD HERE

PART-3

DOWNLOAD HERE

Tuesday, 24 June 2014

TAGGED UNDER:

700+ Hacking Tutorials (The Best of 2016) By Anoop Kaushal



Any proceedings and or activities related to the material contained within this volume are exclusively your liability.  The misuse and mistreat of the information in this Ebook can consequence in unlawful charges brought against the persons in question. 
The authors and review analyzers will not be held responsible in the event any unlawful charges brought against any individuals by misusing the information in this book to break the law. 

This Ebook contains material and resources that can be potentially destructive or dangerous.  If you do not fully comprehend something on this book, don‘t study this EBook. Please refer to the laws and acts of your state/region/ Province/zone/territory or  country  before  accessing, using,  or  in  any other way utilizing these resources. These materials and resources are for educational and research purposes only. Do not attempt to violate the law with anything enclosed here within.

If this is your intention, then leave now. Neither writer of this Ebook, review analyzers, the publisher,nor anyone else affiliated in any way, is going to admit any responsibility for Your proceedings, actions or trials.


700+ Hacking Tutorials (The Best of 2016) 



Contact Us  :-FACEBOOK


Wednesday, 9 April 2014

TAGGED UNDER:

COOL CMD TRICKS BY USING NOTEPAD



Hello  guys here is the cool and awesome Notepad TricksAs name suggest you don't require any program other then Notepad.You can make a look like as disco ladder and cool matrix.So lets get started.

NO. 1

1. Open Notepad and copy and paste below code.


@echo off
color 0A
:A
ping -b .9 >nul                                                    
echo L      
ping -b .9 >nul                                                    
echo L      
ping -b .9 >nul                                                    
echo L      
ping -b .9 >nul
echo L     
ping -b .9 >nul
echo LLLLLL 
ping -b .9 >nul                                                    
echo       L      
ping -b .9 >nul                                                    
echo       L      
ping -b .9 >nul                                                    
echo       L      
ping -b .9 >nul
echo       L     
ping -b .9 >nul
echo       LLLLLL 
ping -b .9 >nul                                                  
echo            L      
ping -b .9 >nul                                                    
echo            L      
ping -b .9 >nul                                                    
echo            L      
ping -b .9 >nul
echo            L     
ping -b .9 >nul
echo            LLLLLL 
ping -b .9 >nul
echo                 L      
ping -b .9 >nul                                                    
echo                 L      
ping -b .9 >nul                                                    
echo                 L      
ping -b .9 >nul
echo                 L     
ping -b .9 >nul
echo                 LLLLLL
ping -b .9 >nul 
echo                      L      
ping -b .9 >nul                                                    
echo                      L      
ping -b .9 >nul                                                    
echo                      L      
ping -b .9 >nul
echo                      L     
ping -b .9 >nul
echo                      LLLLLL 
ping -b .9 >nul
echo                           L      
ping -b .9 >nul                                                    
echo                           L      
ping -b .9 >nul                                                    
echo                           L      
ping -b .9 >nul
echo                           L     
ping -b .9 >nul
echo                           LLLLLL 
ping -b .9 >nul
echo                                L      
ping -b .9 >nul                                                    
echo                                L      
ping -b .9 >nul                                                    
echo                                L      
ping -b .9 >nul
echo                                L     
ping -b .9 >nul
echo                                LLLLLL 
ping -b .9 >nul
echo                                     L      
ping -b .9 >nul                                                    
echo                                     L      
ping -b .9 >nul                                                    
echo                                     L      
ping -b .9 >nul
echo                                     L     
ping -b .9 >nul
echo                                     LLLLLL 
ping -b .9 >nul
echo                                          L      
ping -b .9 >nul                                                    
echo                                          L      
ping -b .9 >nul                                                    
echo                                          L      
ping -b .9 >nul
echo                                          L     
ping -b .9 >nul
echo                                          LLLLLL 
ping -b .9 >nul
echo                                               L      
ping -b .9 >nul                                                    
echo                                               L      
ping -b .9 >nul                                                    
echo                                               L      
ping -b .9 >nul  
echo                                               L     
ping -b .9 >nul
echo                                               LLLLLL 
ping -b .9 >nul
echo                                                     L      
ping -b .9 >nul                                                    
echo                                                     L      
ping -b .9 >nul                                                    
echo                                                     L      
ping -b .9 >nul  
echo                                                     L     
ping -b .9 >nul
echo                                                     LLLLLL 
ping -b .9 >nul
echo                                                          L      
ping -b .9 >nul                                                    
echo                                                          L      
ping -b .9 >nul                                                    
echo                                                          L      
ping -b .9 >nul  
echo                                                          L     
ping -b .9 >nul
echo                                                          LLLLLL 
ping -b .9 >nul
echo                                                               L      
ping -b .9 >nul                                                    
echo                                                               L      
ping -b .9 >nul                                                        
echo                                                               L      
ping -b .9 >nul  
echo                                                               L     
ping -b .9 >nul
echo                                                               LLLLLL 
ping -b .9 >nul
echo                                                                    L      
ping -b .9 >nul                                                    
echo                                                                    L      
ping -b .9 >nul                                                        
echo                                                                    L      
ping -b .9 >nul  
echo                                                                    L     
ping -b .9 >nul
echo                                                                    LLLLLL 
ping -b .9 >nul
echo                                                                         L      
ping -b .9 >nul                                                    
echo                                                                         L      
ping -b .9 >nul                                                        
echo                                                                         L      
ping -b .9 >nul    
echo                                                                         L     
ping -b .9 >nul 
echo                                                                         LLLLLL 
ping -b .9 >nul
goto A


  2. Save the file as discoladder.bat  (.bat is must)
  3. Open your save file and see discoladder ON CMD 
  4. Done enjoy !!!!

IF U WANT TO CHANGE FONT COLOUR AND BACKGROUND THEN REPLACE COLOR 0A  TO FROM BELOW COLOUR




NO-2

MAKE AWESOME MATRIX BY USING NOTEPAD




1. Open Notepad and copy and paste below code.

@echo off
:loop
COlor 0A
Title J J f f g g g g
echo 0 A 0 1 1 1 A 0 1 0 1 0 7 7 8 9 9 1 0 1 0 1 A 1 0 a d d f f 1 0 8 s 5 7 r 6 d 6
echo 0 0 0 0 0 0 0 0 1 A 0 A 1 0 A 1 1 1 1 0 A 1 0 A 5 5 6 7 a n k k k 4 g f 5 g D 5
echo 0 1 0 1 0 A B J 0 3 4 0 1 0 1 0 1 B A A O i d d 3 3 4 4 6 7 7 g u 6 d 4 f 4 f 4 
echo 0 2 3 1 1 1 5 5 6 5 6 8 9 5 4 5 4 5 5 4 5 5 6 4 f f f g j d g d f g d 7 g a 4 f 6 8
echo 2 4 5 6 5 5 6 5 9 4 5 7 7 7 7 8 9 9 0 66 6 1 5 5 6 4 5 5 8 6 4 4 6 4 5 d 2 1 e
goto :loop 


  2. Save the file as MATRIX.bat  (.bat is must)
  3. Open your save file and see MATRIX ON CMD 
  4. Done enjoy !!!!

SEE ALSO:-

@ WRITE "I LOVE YOU" ON CMD BY USING NOTEPAD


DON'T FORGET TO LIKE ,SHARE AND COMMENT





Tuesday, 8 April 2014

TAGGED UNDER:

WRITE "I LOVE YOU" ON CMD BY USING NOTEPAD


I had previously posted about Matrix effect using Notepad as well as cool batch file programs. In this post i will share with you guys the cool and awesome Notepad TricksAs name suggest you don't require any program other then Notepad. So lets get started.

1. Open Notepad and copy below code.


@echo off
color 0A
:A
echo IIIIIII     L      OOOOOO V           V  EEEEEE     Y       Y  OOOOOO  U     U 
ping -a .9 >nul
echo    I        L      O    O  V         V   E           Y     Y   O    O  U     U 
ping -b .9 >nul 
echo    I        L      O    O   V       V    E            Y   Y    O    O  U     U 
ping -a .9 >nul  
echo    I        L      O    O    V     V     EEEEEE        Y Y     O    O  U     U 
ping -b .9 >nul                                                    
echo    I        L      O    O     V   V      E              Y      O    O  U     U 
ping -a .9 >nul
echo    I        L      O    O      V V       E              Y      O    O  U     U 
ping -b .9 >nul
echo IIIIIII     LLLLLL OOOOOO       V        EEEEEE         Y      OOOOOO  UUUUUUU   
ping -a .9 >nul
goto A


  2. Save the file as I LOVE U.bat  (.bat is must)
  3. Open your save file and see I LOVE U ON CMD 
  4. Done enjoy !!!!

FOR HIGH SPEED REPLACE ping -a   to ping -b

DON'T FORGET TO LIKE ,SHARE AND COMMENT



Saturday, 22 March 2014

Top 12 Android Apps to Turn Your Smartphone into a Hacking Device



Mobile devices is now very common now a days and mobile devices has changed the way of bi-directional communication. There are many operating system for mobile devices available but the most common and the best operating system for mobile is Android, it is an OS means you can install other applications (software's) on it. In Android application usually called apps or android apps.

The risk of hacking by using mobile devices is very common and people are developing and using different apps (application) for their hacking attack. Android has faced different challenges from hacking application and below is the list of application for android hacking.

1. Spoof App

Here is an app that spies at heart could use – SpoofApp. It allows you to use a fake Caller ID – a number that you are free to specify yourself, in order to protect your privacy or to pull a prank on someone. Sounds like fun, doesn’t it? Well, Apple didn’t think so, which is why it never allowed the app to enter its App Store. Google, however, didn’t mind, which is why SpoofApp was available on the Android Market for about two and a half years. However, it was banned from there last year as it allegedly was in conflict with The Truth in Caller ID Act of 2009.This can be useful in social engineering. 

                                        Download it from here

2. FaceNiff

Requirements: Android 2.1+ (rooted)

Overview: FaceNiff is an Android app that allows you to sniff and intercept web session profiles over the WiFi that your mobile is connected to.
It is possible to hijack sessions only when WiFi is not using EAP, but it should work over any private networks (Open/WEP/WPA-PSK/WPA2-PSK). It’s kind of like Firesheep for android. Maybe a bit easier to use (and it works on WPA2!). Please note that if webuser uses SSL this application won’t work.
Legal notice: This application is for educational purposes only. Do not try to use it if it’s not legal in your country. I do not take any responsibility for anything you do using this application. Use at your own risk

Learn More : ANDROID TRICKS

3. Penetrate Pro

Requirements: Android 2.1+ (rooted)
Overview: The most of the times you scan the Wi-Fi networks available around, they’re protected with key. Penetrate is an app that help you out with that. If the routers of that Wi-Fi networks are encrypted with WEP/WPA it will bring you the keys to access them. This seems a sort of cracking, but the developers says it isn’t, because it’s supposed to get the keys for penetration testing and you should use it only with permission from network owners. Well, apart from those regardings, it does what it says. Check the developer description to know which routers are supported.
Take in account that if you have an antivirus installed in your device, it will warn you about this app. The developer says it’s normal because it’s a security-related tool. Penetrate isn’t a danger for your phone.
This is the paid version (€1.99) that contains no ads, some more features and sponsors further development. What’s more, it allows you to use 3G to get the password instead of using dictionaries that you will have to download in the free version.
Penetrate works properly with the range of routers supported. We’re missing more though. Despite the apparent use for which it was developed this application, we all know the “regular” use. And if you’re looking for it, give it a chance. It’s a great app.

                            Download it from here

4. Anti-Android Network Toolkit

Requirements: Android 2.1+ (rooted)

Anti-Android Network Toolkit is an app that uses WiFi scanning tools to scan networks. You can scan a network you have the phone connected to or you can scan any other nearby open networks. Security admins can use Anti to test network host vulnerabilities to DoS attacks and other threats.

                                             Download it from here

5. Andosid

AnDOSid is the application which is used for DOS attacks from Android mobile phones.

                                            Download it from here

6. Nmap For Android

Nmap is a network scanner tool which gives the entire information of the ip address and website. There is a version of Nmap for Android users too, with the help of this app hackers can scan the IP'S through mobiles.
 
                                              Download it from here

7. The Android Network Toolkit

The Android Network Toolkit is an complete tool kit for the pen testers , where hackers can find expo lots using the mobile and penetrate or attacks the ip's according to their vulnerabilities.

                                               Download it from here
  

8. SSHDroid- Android Secure Shell

Secure shell or SSH is the best protocol that provides an extra layer of security while you are connecting with your remote machine.SSHDroid is a SSH server implementation for Android.
This application will let you to connect to your device from a PC and execute commands (like "terminal" and "adb shell").

                                  Download it from here

10. WiFi Analyzer

WiFi Analyzer is one of the most popular applications in the Android Marketplace, which is really a testament to how wildly useful this tool is for both the average user and the more technically inclined. In the most basic of terms, WiFi Analyzer is a tool to scan the area for WiFi networks and determine which channel is the least populated so you can adjust your own hardware to a less congested part of the spectrum.

                             Download it from here 

11. ConnectBot

ConnectBot is an exceptionally well done SSH/Telnet client, which also acts as a terminal emulator for the local Linux sub-system. While there are better terminal emulators (though not for free), there is no question that ConnectBot is the absolute best SSH client available for Android. 

                                              Download it from here 


12. Network Discovery

Network Discovery is a handy tool for finding and enumerating devices on public WiFi networks. Network Discovery uses a simple ping scan to find hosts on the network, and then allows the user to select one of the found hosts to target for a TCP connect() scan. 

                          Download it from here

Bonus : dSploit

dSploit is an Android network analysis and penetration suite which aims to offer to IT security experts/geeks the most complete and advanced professional toolkit to perform network security assesments on a mobile device. Once dSploit is started, you will be able to easily map your network, fingerprint alive hosts operating systems and running services, search for known vulnerabilities, crack logon procedures of many tcp protocols, perform man in the middle attacks such as password sniffing ( with common protocols dissection ), real time traffic manipulation, etc, etc . 

                                  Download it from here

Well I Have Installed Them All ! Have You ? If Yes, Then Please Share Your Experience Through Posting a Comment Below

ALSO SEE : 

TOP ANDROID HACKING SECRET CODES

Top 7 Android Security/Antiviurs Apps | One Must Have Any One


SHARE

ad

Contact Form

Name

Email *

Message *

Copyright © 2014 | Pc TiPs AnD TriCkS | REFERENCE | Pc TiPs AnD TriCkS |
Designed By: | ANOOP KAUSHAL | Powered By: | Pc TiPs AnD TriCkS | All Right Reserved.|