Skip to main content

Posts

Showing posts with the label Downloads
אתמול הועלתה ל מארקיט תוכנית ש תעזור לכם ללמוד סי על הדרך , בכול מקום אשר יש גם כשאתה בשרותים משחק עם הפלאפון אתה יכול לפתוח את התוכנית וללמוד עוד משהוא חדש !! Description ללמוד C בשפה העברית ועכשיו ישירות ממכשיר האנדרואיד שלך!! , לכל בקשה ל שיפור או לתיקון באגים אתם מוזמנים לפנות אלי ישירות תהנו . קישור ישיר

Hacking Books new android app

my first app on the android market : Description It's one of the biggest archives of hacking books, now accessible just as easy as your mobile ! and this is a direct link : LINK

My new Project "Free Wifi Scaner"

still under construction many think to work on , but finally all can get that free OpenSource YAAA

The Hackers Underground Handbook

The Hacker’s Underground Handbook will guide you through password hacking, windows hacking, malware, phising, web hacking, network hacking and Linux (intro, installation, etc). All this material fully packed with images, thus being a top step-by-step guide, on the course of which you cannot fail. The Hacker’s Underground Handbook which contains information unknown to 99.9% of the world will teach you the hacker’s ways. A great starting book which will guide you in the right direction, helping you understand the basic concepts of computer security and matters that you should take in consideration. How will the skills uncovered in this handbook affect me? - You will learn all the hackers underground tricks and learn to apply them in real world situations. - You will be put into a hackers mindset and learn to think like one. - By Learning how a hacker thinks and acts, you will be able to protect yourself from future hack attacks. - You will aquire knowledge nonexistant to 99.9% of the peo...

Make Trojan Fully Undetectable (FUD) using Xenocode

Make Trojan Fully Undetectable (FUD) using Xenocode A few weeks before, we had posted on how you can make your trojan using LostDoor . But the problem with the so formed trojan is it being detected by almost all AV softwares. We know that after learning to make your own trojan, the next thing you must've exhausted your bandwidth searching for is: "How to make a Trojan undetectable?" Well here is the answer. First of all you'll have to download Xenocode (Never heard of it? We can't help it google it) Xenocode is a set of application virtualization and portable application creation technologies developed by Code Systems Corporation. Applications are packed into single executable files that can be executed instantly on any Windows desktop (so called "portable apps"). The technology therefore emulates only the operation system features that are necessary for the application to run. Applications can be deployed using existing infrastructure, software deployme...

Computer Power User – July 2010

Computer Power User is a monthly print publication aimed at people who breathe, eat, and sleep technology. The kind of person who gets his kicks upgrading graphics cards and smashing benchmarks. The type of person who reinstalls Windows at 2 a.m. because his system keeps crashing while he’s encoding video. Hotfile http://hotfile.com/dl/47759286/3f0bead/cpu_07-2010.rar.html

The Mac Hacker’s Handbook

The honeymoon is over. Prepare yourself to thwart Mac attacks. Where security is concerned, Macs have long led a charmed existence. No more. If you manage security for a network that includes OS X machines, this update on the strengths and weaknesses of Mac OS X is required reading. As more and more vulnerabilities are found in the Mac OS X (Leopard) operating system, security researchers are realizing the importance of developing proof-of-concept exploits for those vulnerabilities. This unique tome is the first book to uncover the flaws in the Mac OS X operating system—and how to deal with them. Written by two white hat hackers, this book is aimed at making vital information known so that you can find ways to secure your Mac OS X systems, and examines the sorts of attacks that are prevented by Leopard’s security defenses, what attacks aren’t, and how to best handle those weaknesses. Beginning with the core differences between Mac OS X and Windows or Linux, this book follows the steps ...

The Web Application Hacker’s Handbook

This book is a practical guide to discovering and exploiting security flaws in web applications. The authors explain each category of vulnerability using real-world examples, screen shots and code extracts. The book is extremely practical in focus, and describes in detail the steps involved in detecting and exploiting each kind of security weakness found within a variety of applications such as online banking, e-commerce and other web applications. The topics covered include bypassing login mechanisms, injecting code, exploiting logic flaws and compromising other users. Because every web application is different, attacking them entails bringing to bear various general principles, techniques and experience in an imaginative way. The most successful hackers go beyond this, and find ways to automate their bespoke attacks. This handbook describes a proven methodology that combines the virtues of human intelligence and computerized brute force, often with devastating results. The authors ar...

The Database Hacker’s Handbook

Databases are the nerve center of our economy . Every piece of your personal information is stored there-medical records, bank accounts, employment history, pensions, car registrations, even your children’s grades and what groceries you buy. Database attacks are potentially crippling-and relentless. In this essential follow-up to The Shellcoder’s Handbook, four of the world’s top security experts teach you to break into and defend the seven most popular database servers. You’ll learn how to identify vulnerabilities, how attacks are carried out, and how to stop the carnage. The bad guys already know all this. You need to know it too. * Identify and plug the new holes in Oracle and Microsoft(r) SQL Server * Learn the best defenses for IBM’s DB2(r), PostgreSQL , Sybase ASE, and MySQL (r) servers * Discover how buffer overflow exploitation, privilege escalation through SQL , stored procedure or trigger abuse, and SQL injection enable hacker access * Recognize vulnerabilities peculiar to ...

The Oracle Hacker’s Handbook: Hacking And Defending Oracle

David Litchfield has devoted years to relentlessly searching out the flaws in the Oracle database system and creating defenses against them. Now he offers you his complete arsenal to assess and defend your own Oracle systems. This in-depth guide explores every technique and tool used by black hat hackers to invade and compromise Oracle and then it shows you how to find the weak spots and defend them. Without that knowledge, you have little chance of keeping your databases truly secure. Knowledge is power, and the power can be yours While Oracle continues to improve the security features of its product, it still has a long way to go. David Litchfield has devoted years to relentlessly searching out the flaws in this ubiquitous database system and creating defenses against them. Now he offers you his complete arsenal to assess and defend your own Oracle systems. Like The Shellcoder’s Handbook and The Database Hacker’s Handbook, this in-depth guide explores every technique and tool use...

Passmark WirelessMon 3.1.1000

WirelessMon is a software tool that allows users to monitor the status of wireless WiFi adapter(s) and gather information about nearby wireless access points and hot spots in real time. WirelessMon can log the information it collects into a file, while also providing comprehensive graphing of signal level and real time IP and 802.11 WiFi statistics. • Verify 802.11 network configuration is correct. • Test WiFi hardware and device drivers are functioning correctly. • Check signal levels from your local WiFi network and nearby networks. • Help locate sources of interference to your network. • Scan for hot spots in your local area ( wardriving ) • Create signal strength maps of an area • GPS support for logging and mapping signal strength • Correctly locate your wireless antenna (especially important for directional antennas ). • Verify the security settings for local access points. • Measure network speed & throughput and view available data rates. • Help check Wifi network ...

USB Hidden Copier

This sneaky little program will copy any USB drive content to your hard drive without detection of the USB owner. 1. It is totally invisible and masked enough in order not to be detected easily. 2. It will copy a maximum of 8GB that is enough space and information will not fit all hard drive space if you can not monitor it for a long time. 3. Content is saved in a folder named as the copied Usb Drive name so you can find easily who is the owner of usb copied. 4. It starts at startup of computer. 5. First copy is made 3 minutes after computer starts and then every 10 minutes the content will be overwritten, so you will have always lasted content of that USB. 6. With it’s Control Panel you can easily manage it. 7. Content copied is saved by default in: “C:\ WINDOWS \sysbackup\” 8. The copier program is called “systemidle. exe ” in order to mask it. 9. In order not to copy you own USB Drive you can create a file named “friendflag.winxp” and put it directly on your usb (this fil...

Last Call for Freedom

Last Call for Freedom is a four part video series. The first video Watch Out is about government surveillance including the use of cameras, tapping phone calls, reading emails, and creating databases of everything about you. RFID: Total Control is the second video and it is about how every product that you buy in the future will have a computer chip in it. The video shows the process of RFID technology being put into place worldwide and how it will be used for total control. This leads into the third film where the RFID technology is used in microchips that are implanted in the flesh of humans. This video also covers the topic of creating new humans through technology. Part four of this documentary has various Hollywood movie clips that bring parts 1-3 together giving examples how movies show us the future and what is planned for us. Part 1- Watch Out Part 2- RFID: Total Control Part 3: Microchipping Us to Slavery Part 4: Showing Us the Future Hotfile : http://hotfile.com/dl/24253822/8...

Wireless Hacking Live (FBI Version)

This version is for all systems except systems with the Intel B/G wireless cards (IPW2200). - Live CD with all the tools you need to hack a WLAN / wireless Access point – Linux Live-CD – OS runs from CD – 635 MB ISO - Also used by the FBI WEP Hacking – The Next Generation WEP is an encryption scheme, based on the RC-4 cipher, that is available on all 802.11a, b and g wireless products. WEP uses a set of bits called a key to scramble information in the data frames as it leaves the access point or client adapter and the scrambled message is then decrypted by the receiver. Both sides must have the same WEP key, which is usually a total of 64 or 128 bits long. A semi-random 24 bit number called an Initialization Vector (IV), is part of the key, so a 64 bit WEP key actually contains only 40 bits of strong encryption while a 128 bit key has 104. The IV is placed in encrypted frames header, and is transmitted in plain text. Traditionally, cracking WEP keys has been a slow and boring process. ...

Deep Learning Training Exercises Enhance Your Memory and Concentration

Improve memory & concentration Absorb, retain, and recall information. Expand awareness and increase creativity Do you ever wonder why as children we learn more in our first few years of life? The answer lies in the mysterious and elusive Theta brain wave state. Up until the age of six, children are predominantly in Theta. This frequency allows the brain to absorb and retain massive amounts of information that gets stored in long-term memory. You can restore this magical ability through daily Theta brain wave training. When you need to study and assimilate new information, slip on your headphones, relax and listen to Deep Learning. Within minutes, memory receptors are gently stimulated as precision-engineered frequencies shift your brain into perfect balance. In this state of heightened receptivity, the clarity and speed with which you can concentrate, study, and integrate and store information is profoundly improved. Theta brain waves are associated with long-term-potentiatio...