free Hosting
Your Hashrate cex.io
Mining Bitcoin GHS cex.io
polisionline
cex.io
free bitcoin world
free bitcoin india
Translate
jangan lupa klik suka
Diberdayakan oleh Blogger.
statistics
HOME
Mengenai Saya
Arsip Blog
-
▼
2014
(25)
-
▼
Oktober
(18)
- Automated Android APK Unpacking
- [good tool for pentester] netool.sh V4.0 just rele...
- Ebury SSH Rookit/Backdoor Trojan
- Why You Should Learn Programming & Networking befo...
- Something About Virus!!!
- How To Make Dangerous Computer Virus ? 10 Most Fam...
- How to set up a web-based lightweight system monit...
- Android Sqlmap Gui Alpha
- Command to copy/clone user profile to root.
- How to build Python application for Android / iOS ...
- Fool keylogger and protect yourself from hackers
- CMD Fun Tricks and Useful CMD Commands
- 32-bit or 64-bit, What to choose and Why?
- Anti Sniffer Tools List To Protect You From Sniffi...
- New Tool] Interactive Network Packet Builder v1.0
- Top 5 Security Tips To Protect Your Computer From ...
- Make Your Own FUD Crypter
- Hidden Secret Codes for all Android Devices [LATEST]
-
▼
Oktober
(18)
Archive for 2014
Automated Android APK Unpacking
Performing static analysis on an Android application can get a bit tedious when having to use apktool.
[good tool for pentester] netool.sh V4.0 just released
netool.sh is a script in bash to automate frameworks like Nmap,Driftnet,SSLstrip,Metasploit and Ettercap.
Ebury SSH Rookit/Backdoor Trojan
About 3 days ago, an Ubuntu user (aka Empire-Phoenix) shouted for help at Ubuntu Forums - Security Discussions.
Why You Should Learn Programming & Networking before learn hacking
When | Where | How | - can I learning Hacking ?I've started this with the term 'Hacking'.
Something About Virus!!!
What is a Computer Virus ?A potentially damaging computer programme capable of reproducing itself causing.
How To Make Dangerous Computer Virus ? 10 Most Famous Computer Viruses Codes
Today i tell you how to make simple yet very powerful or you can say Harmful computer.
How to set up a web-based lightweight system monitor on Linux

Sometimes we, as a normal user or a system admin, need to know how well our system is running. Many.
Android Sqlmap Gui Alpha
Its a very very very simple Gui No extra No Support just a Open Source Alpha Dirty coding skill.What.
Command to copy/clone user profile to root.
Code: [Select]sudo cp -r /home/user/* /rootsudo cp -r /home/user/.[^.]* /rootThis will copy over all.
How to build Python application for Android / iOS and Desktop
I’ll just present you Buildozer. With this tool, you will be able to build your Python projects to Android,.
Fool keylogger and protect yourself from hackers
when you surf net at public computers or net cafes…maybe it can be even at your friends house..etc...
CMD Fun Tricks and Useful CMD Commands
(1)If you are using a guest account and run is disabled you can use notepad to open regedit and cmd'open.
32-bit or 64-bit, What to choose and Why?

The tendency of a computer’s processor to deal with information on RAM (random access memory) depends.
Anti Sniffer Tools List To Protect You From Sniffing Attacks

As we known spoofing attack is a situation in which one person or program successfully masquerades as.