I love hacking

If you give a hacker a new toy, the first thing he'll do is take it apart to figure out how it works.

Lets Start Hacking

Feelopedia

What the fcuk is feelopedia? Before going to see what it is, lets see what it is not like Not a social networking shit Not a blog Not Wikipedia Not a recipe website Finally, its definitely not a porn site Lets discuss about the actual shit Many times in my life I got depressed, happy, sad, etc etc and I love…

Email Password Cracker

I know you guys tried and tired of using so called hacking tools, which by the way never work or simply hack your account instead of the one’s you are trying. Hacking email accounts is not so simple and sometimes you can say impossible(technically). There are many ways to hack an account, but none of…

A Beginners Guide To Ethical Hacking

A Beginners Guide to Ethical Hacking.

Book Index A. Introduction 1. Who is a Hacker? 2. Types of Hackers? 3. Hackers Hierarchy 4. What takes to become a Hacker B. Programming 1. Hacking and Programming 2. Where to learn Programming? C. Password Hacking 1. Guessing the secret Answer 2. Guessing the Password 3. Social Engineering 4. Phishing 5. Desktop Phishing 6.…

PHP Folder Upload code

Uploading entire folder recursively using PHP and HTML5 (Works only for Chrome) You can download complete code from github : Download code from github HTML Code : <input type=”file” id=”files” name=”files[]” webkitdirectory directory multiple/> <input type=”hidden” name=”paths” id=”paths”/> In the above we used brackets [] for name of input files which enables to upload multiple…

Dictionary Attack on Gmail

What is the problem ? So, I got this problem often. When I hack any database which contain huge number of emails and passwords; most of the emails and passwords are used as it is for their mail accounts. So for every email I have to try to login to gmail using browser only and…

System Hacking

From the previous articles; now you should be able to fetch as much as information from various techniques and sources. Now it’s time to have fun by hacking. So after Reconnaissance, Footprinting and Scanning we are getting into System Hacking (my favorite part). System Hacking means gaining the highest privileges of a system without the…

Scanning (Footprinting)

What is Footprinting? Collecting as much information as possible about the target network. In the previous stage we have collected good amount of information about the target company. Using that information now we have to concentrate on the technical details of the target network. In the previous article we must collect these following details: Domain…

Stages of Hacking

Hacking in real time takes five stages to complete a task. It is an organized way of doing things. A beginner who follows these guidelines can become a very good security analyst; this is where we can see the difference between a lame hacker and a security analyst. Five Stages of Hacking: Reconnaissance Scanning Gaining…

What is Hacking ?

What actually hacking is ? Hacking is an art of cracking application and gaining access to control it, as you wish. Typically, the word “hack” refers to “make it simple”, it’s like Jugaad in Hindi. Hacking also means to chop down a tree with an axe. Hacking started in early 90s. To have a look…