<?xml version='1.0' encoding='UTF-8'?><?xml-stylesheet href="http://www.blogger.com/styles/atom.css" type="text/css"?><feed xmlns='http://www.w3.org/2005/Atom' xmlns:openSearch='http://a9.com/-/spec/opensearchrss/1.0/' xmlns:blogger='http://schemas.google.com/blogger/2008' xmlns:georss='http://www.georss.org/georss' xmlns:gd="http://schemas.google.com/g/2005" xmlns:thr='http://purl.org/syndication/thread/1.0'><id>tag:blogger.com,1999:blog-7438230220644688822</id><updated>2018-12-31T01:59:10.400-08:00</updated><category term="Hacking Tools"/><category term="Hacking Tutorials"/><category term="Tricks and Tips"/><category term="Free Full Version Softwares"/><category term="Sql injection"/><category term="Cyber security"/><category term="Keys and Keygens"/><category term="Free Ethical Hacking Course"/><category term="Phreaking"/><category term="Video Tutorials"/><category term="Programming"/><category term="Hacking News"/><category term="Website Hacking"/><category term="Windows Hacking"/><category term="Mobile and Smartphone Hacking"/><category term="Proxy"/><category term="Web Application Security"/><category term="Facebook Hacks"/><category term="Hacking Ebooks"/><category term="Viruses"/><category term="Hacking Web Servers"/><category term="Attack phases"/><category term="Denial of Service attacks"/><category term="Security Basics"/><category term="Wireless Hacking"/><category term="C / C++"/><category term="Password Cracking"/><category term="Enumeration"/><category term="Exploits/Vulnerabilities"/><category term="Network Sniffers"/><category term="Gmail Hacks"/><category term="Windows"/><category term="Yahoo hacks"/><category term="Hotmail Hacks"/><category term="Linux"/><category term="Penetration Testing"/><category term="RFI(Remote File Inclusion)"/><category term="Xss(Cross Site Scripting)"/><category term="Metasploit"/><category term="Operating Systems"/><category term="Session hijacking"/><category term="Trojans and Backdoors"/><category term="Linux Hacking"/><category term="Cryptography"/><category term="DDos"/><category term="LFI(Local File Inclusion)"/><category term="SMB Relay"/><category term="Twitter hacks"/><category term="Hacking Phases"/><category term="KEYLOGGERS"/><category term="Youtube hacks"/><category term="Cracking"/><category term="Google Hacks"/><category term="PC Games"/><category term="PHP"/><category term="Social Engineering"/><category term="Hackers"/><category term="ITIL"/><category term="Password Guessing"/><category term="Perl"/><category term="Python"/><category term="Footprinting"/><category term="Google"/><category term="Note"/><category term="Password Sniffing"/><category term="Rapidshare Hacks"/><category term="fingerprinting"/><category term="."/><category term="CRLF Injection"/><category term="Contact Us"/><category term="Data Networks"/><category term="Hack PTC Sites"/><category term="Hacker5"/><category term="Information About Blog"/><category term="Links"/><category term="New Domain For This Blog"/><category term="Password Stealers"/><category term="Tools"/><category term="Tricks"/><category term="hack clash of clans"/><title type='text'>Learn Cyber Security</title><subtitle type='html'>hack clash of clans, instagram hack, snapchat hack, kali linux, candy crush hack, hack whatsapp</subtitle><link rel='http://schemas.google.com/g/2005#feed' type='application/atom+xml' href='http://www.hackguide4u.com/feeds/posts/default'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/7438230220644688822/posts/default?redirect=false'/><link rel='alternate' type='text/html' href='http://www.hackguide4u.com/'/><link rel='hub' href='http://pubsubhubbub.appspot.com/'/><link rel='next' type='application/atom+xml' href='http://www.blogger.com/feeds/7438230220644688822/posts/default?start-index=26&amp;max-results=25&amp;redirect=false'/><author><name>Adnan Anjum</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='32' src='//lh3.googleusercontent.com/-NHpB_wp4R3U/AAAAAAAAAAI/AAAAAAAAAyI/Mw3BRkjop5w/s512-c/photo.jpg'/></author><generator version='7.00' uri='http://www.blogger.com'>Blogger</generator><openSearch:totalResults>950</openSearch:totalResults><openSearch:startIndex>1</openSearch:startIndex><openSearch:itemsPerPage>25</openSearch:itemsPerPage><entry><id>tag:blogger.com,1999:blog-7438230220644688822.post-4155952683601097890</id><published>2017-10-16T03:00:00.000-07:00</published><updated>2017-10-16T09:19:21.316-07:00</updated><title type='text'>Hack WPA2-PSK clients with Key Re-installation Attacks</title><summary type="text">





Mathy Vanhoef discovered serious weaknesses in WPA2, a protocol that secures all modern protected Wi-Fi networks. An attacker within range of a victim can exploit these weaknesses using key reinstallation attacks (KRACKs). Concretely, attackers can use this novel attack technique to read information that was previously assumed to be safely encrypted. This can be abused to steal sensitive </summary><link rel='replies' type='application/atom+xml' href='http://www.hackguide4u.com/feeds/4155952683601097890/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.hackguide4u.com/2017/10/hack-wpa2-psk-clients-with-key-re.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/7438230220644688822/posts/default/4155952683601097890'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/7438230220644688822/posts/default/4155952683601097890'/><link rel='alternate' type='text/html' href='http://www.hackguide4u.com/2017/10/hack-wpa2-psk-clients-with-key-re.html' title='Hack WPA2-PSK clients with Key Re-installation Attacks'/><author><name>Adnan Anjum</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-7438230220644688822.post-7778450631480633511</id><published>2017-05-20T07:18:00.000-07:00</published><updated>2017-06-29T07:27:39.712-07:00</updated><title type='text'>WannaCry Ransomware | Solution | Fix</title><summary type="text">


Since the WannaCry ransomware ripped through the internet in May 2017, infecting hundreds of thousands of machines and locking up critical systems from health care to transportation, cryptographers have searched for a cure. Finding a flaw in WannaCry’s encryption scheme, after all, could decrypt all those systems without any ransom.

Now one French researcher says he’s found at least a hint of</summary><link rel='replies' type='application/atom+xml' href='http://www.hackguide4u.com/feeds/7778450631480633511/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.hackguide4u.com/2017/06/wannacry-ransomware-solution-fix.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/7438230220644688822/posts/default/7778450631480633511'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/7438230220644688822/posts/default/7778450631480633511'/><link rel='alternate' type='text/html' href='http://www.hackguide4u.com/2017/06/wannacry-ransomware-solution-fix.html' title='WannaCry Ransomware | Solution | Fix'/><author><name>Adnan Anjum</name><uri>https://plus.google.com/110311237631564786309</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='32' src='//lh3.googleusercontent.com/-NHpB_wp4R3U/AAAAAAAAAAI/AAAAAAAAAyI/Mw3BRkjop5w/s512-c/photo.jpg'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://1.bp.blogspot.com/-fFYgDcmFb6k/WVUL3IxdH0I/AAAAAAAAA-g/wAnVCnCTYnArhtqLRqKRgyJ3HUU4TfpngCLcBGAs/s72-c/wanacry.png" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-7438230220644688822.post-4360967891467344359</id><published>2016-12-26T11:44:00.001-08:00</published><updated>2016-12-26T11:44:15.865-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="hack clash of clans"/><title type='text'>Hack Clash of Clans , Coins, elixir, Gems, </title><summary type="text">





freemium mobile MMO strategy video game Clash of clans developed and published by Supercell. August 2, 2012, The game was released for iOS platforms and on October 7, 2013 on Google Play for Android. you can easily cheat coc or coc hack is not a big deal.


Click here to Download Android Apk













To generate onlineClick Here


</summary><link rel='replies' type='application/atom+xml' href='http://www.hackguide4u.com/feeds/4360967891467344359/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.hackguide4u.com/2016/12/hack-clash-of-clans-coins-elixir-gems.html#comment-form' title='2 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/7438230220644688822/posts/default/4360967891467344359'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/7438230220644688822/posts/default/4360967891467344359'/><link rel='alternate' type='text/html' href='http://www.hackguide4u.com/2016/12/hack-clash-of-clans-coins-elixir-gems.html' title='Hack Clash of Clans , Coins, elixir, Gems, '/><author><name>Adnan Anjum</name><uri>https://plus.google.com/110311237631564786309</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='32' src='//lh3.googleusercontent.com/-NHpB_wp4R3U/AAAAAAAAAAI/AAAAAAAAAyI/Mw3BRkjop5w/s512-c/photo.jpg'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://3.bp.blogspot.com/-9DrmznqaFFA/WGFw2YCvZvI/AAAAAAAAA94/aHbrxYHKv-0YWblzfN2TkWmNP3jT230DwCLcB/s72-c/hack%2Bclash%2Bof%2Bclans.png" height="72" width="72"/><thr:total>2</thr:total><georss:featurename>Newark, NJ, USA</georss:featurename><georss:point>40.734770989672406 -74.1522216796875</georss:point><georss:box>40.638468489672405 -74.3135831796875 40.831073489672406 -73.9908601796875</georss:box></entry><entry><id>tag:blogger.com,1999:blog-7438230220644688822.post-2513131272429695428</id><published>2013-12-31T10:56:00.000-08:00</published><updated>2013-12-31T10:56:22.975-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Hacking Tools"/><title type='text'>Sharing my Penetration Testing Tools with Source</title><summary type="text">




After conducting Penetration Tests over the last 15 years i have a huge collection of windows and linux tools which help you to conduct penetration tests. They cover what backtrack tools, nessus, metasploit and many other cool dev&#39;s did not do the job for me.Tool categories are:webscanner, smtp scanner, ipv6 scanner, android trojans, stealth keyloggers, stealth remote control software </summary><link rel='replies' type='application/atom+xml' href='http://www.hackguide4u.com/feeds/2513131272429695428/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.hackguide4u.com/2013/12/sharing-my-penetration-testing-tools.html#comment-form' title='2 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/7438230220644688822/posts/default/2513131272429695428'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/7438230220644688822/posts/default/2513131272429695428'/><link rel='alternate' type='text/html' href='http://www.hackguide4u.com/2013/12/sharing-my-penetration-testing-tools.html' title='Sharing my Penetration Testing Tools with Source'/><author><name>Adnan Anjum</name><uri>https://plus.google.com/110311237631564786309</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='32' src='//lh3.googleusercontent.com/-NHpB_wp4R3U/AAAAAAAAAAI/AAAAAAAAAyI/Mw3BRkjop5w/s512-c/photo.jpg'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="http://1.bp.blogspot.com/-NzwAHAERm3I/UsMSXjVQNyI/AAAAAAAAA2c/O-o3sez1E40/s72-c/android-antitheft.jpg" height="72" width="72"/><thr:total>2</thr:total></entry><entry><id>tag:blogger.com,1999:blog-7438230220644688822.post-206854408390533717</id><published>2012-12-29T13:41:00.000-08:00</published><updated>2012-12-29T13:41:08.350-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Exploits/Vulnerabilities"/><category scheme="http://www.blogger.com/atom/ns#" term="Metasploit"/><title type='text'>WordPress Asset-Manager PHP File Upload Vulnerability</title><summary type="text">##
# This file is part of the Metasploit Framework and may be subject to
# redistribution and commercial restrictions. Please see the Metasploit
# Framework web site for more information on licensing and terms of use.
#   http://metasploit.com/framework/
##

require &#39;msf/core&#39;
require &#39;msf/core/exploit/php_exe&#39;

class Metasploit3 &lt; Msf::Exploit::Remote
    Rank = ExcellentRanking

    include Msf</summary><link rel='replies' type='application/atom+xml' href='http://www.hackguide4u.com/feeds/206854408390533717/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.hackguide4u.com/2012/12/wordpress-asset-manager-php-file-upload.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/7438230220644688822/posts/default/206854408390533717'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/7438230220644688822/posts/default/206854408390533717'/><link rel='alternate' type='text/html' href='http://www.hackguide4u.com/2012/12/wordpress-asset-manager-php-file-upload.html' title='WordPress Asset-Manager PHP File Upload Vulnerability'/><author><name>Adnan Anjum</name><uri>https://plus.google.com/110311237631564786309</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='32' src='//lh3.googleusercontent.com/-NHpB_wp4R3U/AAAAAAAAAAI/AAAAAAAAAyI/Mw3BRkjop5w/s512-c/photo.jpg'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-7438230220644688822.post-6798875273250746485</id><published>2012-12-29T13:35:00.005-08:00</published><updated>2012-12-29T13:38:21.514-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Hacking Tutorials"/><category scheme="http://www.blogger.com/atom/ns#" term="SMB Relay"/><category scheme="http://www.blogger.com/atom/ns#" term="Sql injection"/><title type='text'>Executing SMB Relay Attacks via SQL Server using Metasploit</title><summary type="text">In this blog, I’ll provide a brief overview of SMB Relay attacks and 
show how they can be initiated through a Microsoft SQL Server.  I will 
also provide some practical examples that show how to use new Metasploit
 modules to gain unauthorized access to SQL Servers during a penetration
 test.    Below is a summary of what will be covered in this blog:

 A Brief History of SMB Relay
Using SQL </summary><link rel='replies' type='application/atom+xml' href='http://www.hackguide4u.com/feeds/6798875273250746485/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.hackguide4u.com/2012/12/executing-smb-relay-attacks-via-sql.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/7438230220644688822/posts/default/6798875273250746485'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/7438230220644688822/posts/default/6798875273250746485'/><link rel='alternate' type='text/html' href='http://www.hackguide4u.com/2012/12/executing-smb-relay-attacks-via-sql.html' title='Executing SMB Relay Attacks via SQL Server using Metasploit'/><author><name>Adnan Anjum</name><uri>https://plus.google.com/110311237631564786309</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='32' src='//lh3.googleusercontent.com/-NHpB_wp4R3U/AAAAAAAAAAI/AAAAAAAAAyI/Mw3BRkjop5w/s512-c/photo.jpg'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-7438230220644688822.post-5294297283062073776</id><published>2012-12-29T13:32:00.002-08:00</published><updated>2012-12-29T13:32:57.483-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Hacking Tools"/><category scheme="http://www.blogger.com/atom/ns#" term="Sql injection"/><title type='text'>SQL Fingerprint Xmas Released</title><summary type="text">Microsoft SQL Server fingerprinting can be a time 
consuming process, because it involves trial and error methods to 
determine the exact version. Intentionally inserting an invalid input to
 obtain a typical error message or using certain alphabets that are 
unique for certain server are two of the many ways to possibly determine
 the version, but most of them require authentication, permissions</summary><link rel='replies' type='application/atom+xml' href='http://www.hackguide4u.com/feeds/5294297283062073776/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.hackguide4u.com/2012/12/sql-fingerprint-xmas-released.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/7438230220644688822/posts/default/5294297283062073776'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/7438230220644688822/posts/default/5294297283062073776'/><link rel='alternate' type='text/html' href='http://www.hackguide4u.com/2012/12/sql-fingerprint-xmas-released.html' title='SQL Fingerprint Xmas Released'/><author><name>Adnan Anjum</name><uri>https://plus.google.com/110311237631564786309</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='32' src='//lh3.googleusercontent.com/-NHpB_wp4R3U/AAAAAAAAAAI/AAAAAAAAAyI/Mw3BRkjop5w/s512-c/photo.jpg'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-7438230220644688822.post-3360716040745103361</id><published>2012-09-24T10:57:00.000-07:00</published><updated>2013-12-31T11:49:58.684-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Hacking Tools"/><category scheme="http://www.blogger.com/atom/ns#" term="LFI(Local File Inclusion)"/><category scheme="http://www.blogger.com/atom/ns#" term="Penetration Testing"/><category scheme="http://www.blogger.com/atom/ns#" term="RFI(Remote File Inclusion)"/><category scheme="http://www.blogger.com/atom/ns#" term="Sql injection"/><category scheme="http://www.blogger.com/atom/ns#" term="Website Hacking"/><title type='text'>Online Penetration Testing Tools [Private] </title><summary type="text">



Word Press
Remote Code Execution , BruteForce via IP , Theme ScaNne via IP , Theme ScaNne , Site Extracte. Joomla
Turbo Brute Force , Token ScaNe Server, ScaNner Site Extracte,
vBulletin 
vB SQL[4.0.x =&gt;4.1.3] , vB Brut Force [Proxy] 
Sql 
SQL Server ScaNne, SQL Target ScanNer, SQL Dork ScaNne, SQL Injection Helpe,r Admin Finder. LFI 
LFI Server ScaNner, LFI ToOl&#39;z Kit, LFI Inject Shell, LFI </summary><link rel='replies' type='application/atom+xml' href='http://www.hackguide4u.com/feeds/3360716040745103361/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.hackguide4u.com/2012/09/online-penetration-testing-tools-private.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/7438230220644688822/posts/default/3360716040745103361'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/7438230220644688822/posts/default/3360716040745103361'/><link rel='alternate' type='text/html' href='http://www.hackguide4u.com/2012/09/online-penetration-testing-tools-private.html' title='Online Penetration Testing Tools [Private] '/><author><name>Adnan Anjum</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="http://3.bp.blogspot.com/-Uf9X-8b18lg/UGCfnGqxy5I/AAAAAAAAA8E/y1r5d-NU59c/s72-c/penetration-testing.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-7438230220644688822.post-2266091971738140766</id><published>2012-07-24T11:52:00.000-07:00</published><updated>2012-07-24T11:52:14.392-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Hacking Tutorials"/><category scheme="http://www.blogger.com/atom/ns#" term="Metasploit"/><category scheme="http://www.blogger.com/atom/ns#" term="Penetration Testing"/><title type='text'>Metasploit Nmap Version</title><summary type="text">For those of you wondering why metasploit uses nmap 5.61 instead of 6.01 when you do
an nmap scan in metasploit its because metasploit has its own nmap built in and the metasploit devs haven&#39;t upgraded it yet
if you want to use Nmap 6.01 in metasploit do the following.

Code:
su
mv /opt/metasploit/common/bin/nmap /opt/metasploit/common/bin/nmap.bak
ln -s /usr/local/bin/nmap /opt/metasploit/common</summary><link rel='replies' type='application/atom+xml' href='http://www.hackguide4u.com/feeds/2266091971738140766/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.hackguide4u.com/2012/07/metasploit-nmap-version.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/7438230220644688822/posts/default/2266091971738140766'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/7438230220644688822/posts/default/2266091971738140766'/><link rel='alternate' type='text/html' href='http://www.hackguide4u.com/2012/07/metasploit-nmap-version.html' title='Metasploit Nmap Version'/><author><name>Adnan Anjum</name><uri>https://plus.google.com/110311237631564786309</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='32' src='//lh3.googleusercontent.com/-NHpB_wp4R3U/AAAAAAAAAAI/AAAAAAAAAyI/Mw3BRkjop5w/s512-c/photo.jpg'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-7438230220644688822.post-7431585204341242838</id><published>2012-07-23T12:17:00.000-07:00</published><updated>2012-07-23T12:17:23.294-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Hacking Ebooks"/><category scheme="http://www.blogger.com/atom/ns#" term="Metasploit"/><category scheme="http://www.blogger.com/atom/ns#" term="Penetration Testing"/><title type='text'>Metasploit Penetration Testing Cookbook</title><summary type="text">

Download Metasploit Penetration Testing Cookbook

Set up a complete penetration testing environment using metasploit and virtual machines
Learn to penetration-test popular operating systems such as Windows7, Windows 2008 Server, Ubuntu etc.
Get familiar with penetration testing based on client side  exploitation techniques with detailed analysis of vulnerabilities and  codes
Avail of exclusive </summary><link rel='replies' type='application/atom+xml' href='http://www.hackguide4u.com/feeds/7431585204341242838/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.hackguide4u.com/2012/07/metasploit-penetration-testing-cookbook.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/7438230220644688822/posts/default/7431585204341242838'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/7438230220644688822/posts/default/7431585204341242838'/><link rel='alternate' type='text/html' href='http://www.hackguide4u.com/2012/07/metasploit-penetration-testing-cookbook.html' title='Metasploit Penetration Testing Cookbook'/><author><name>Adnan Anjum</name><uri>https://plus.google.com/110311237631564786309</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='32' src='//lh3.googleusercontent.com/-NHpB_wp4R3U/AAAAAAAAAAI/AAAAAAAAAyI/Mw3BRkjop5w/s512-c/photo.jpg'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="http://4.bp.blogspot.com/-ul20ZxNQjBs/UA2cztmmCxI/AAAAAAAAAxc/zBdqQ-1HRug/s72-c/Metasploit+Penetration+Testing+Cookbook+.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-7438230220644688822.post-6035036790639167433</id><published>2012-07-23T11:40:00.000-07:00</published><updated>2012-07-23T11:40:51.347-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Hacking Tutorials"/><category scheme="http://www.blogger.com/atom/ns#" term="Metasploit"/><category scheme="http://www.blogger.com/atom/ns#" term="Penetration Testing"/><title type='text'>Real-World Security Tests Using Metasploit</title><summary type="text">The Perl-based Metasploit was designed to be a robust exploit  development system. It just so happens that you can use it to run  previously developed exploits against your own systems. You can use its  security testing features to see if your systems vulnerable to  penetration and how they react when specific payloads are sent their  way. 
Outside of common Web application tests such as SQL </summary><link rel='replies' type='application/atom+xml' href='http://www.hackguide4u.com/feeds/6035036790639167433/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.hackguide4u.com/2012/07/real-world-security-tests-using.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/7438230220644688822/posts/default/6035036790639167433'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/7438230220644688822/posts/default/6035036790639167433'/><link rel='alternate' type='text/html' href='http://www.hackguide4u.com/2012/07/real-world-security-tests-using.html' title='Real-World Security Tests Using Metasploit'/><author><name>Adnan Anjum</name><uri>https://plus.google.com/110311237631564786309</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='32' src='//lh3.googleusercontent.com/-NHpB_wp4R3U/AAAAAAAAAAI/AAAAAAAAAyI/Mw3BRkjop5w/s512-c/photo.jpg'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="http://3.bp.blogspot.com/-nZ_1Tla0-lA/UA2agolidzI/AAAAAAAAAxU/tafyfm_48AU/s72-c/msfconsole.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-7438230220644688822.post-7647033422833841825</id><published>2012-07-23T11:12:00.000-07:00</published><updated>2012-07-23T11:12:02.893-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Hacking Tools"/><category scheme="http://www.blogger.com/atom/ns#" term="Xss(Cross Site Scripting)"/><title type='text'>Owasp Xelenium - XSS Scanner</title><summary type="text"> Xelenium  is a security testing tool that can be used to identify the security  vulnerabilities present in the web application. Xelenium uses the open  source functional test automation tool &#39;Selenium&#39; as its engine and has  been built using Java swing.
  Xelenium has been designed considering that it should obtain very few inputs from users in the process of discovering the bugs.

Current </summary><link rel='replies' type='application/atom+xml' href='http://www.hackguide4u.com/feeds/7647033422833841825/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.hackguide4u.com/2012/07/owasp-xelenium-xss-scanner.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/7438230220644688822/posts/default/7647033422833841825'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/7438230220644688822/posts/default/7647033422833841825'/><link rel='alternate' type='text/html' href='http://www.hackguide4u.com/2012/07/owasp-xelenium-xss-scanner.html' title='Owasp Xelenium - XSS Scanner'/><author><name>Adnan Anjum</name><uri>https://plus.google.com/110311237631564786309</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='32' src='//lh3.googleusercontent.com/-NHpB_wp4R3U/AAAAAAAAAAI/AAAAAAAAAyI/Mw3BRkjop5w/s512-c/photo.jpg'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="http://3.bp.blogspot.com/-vD0B9vQFItg/UA2TjzKcTfI/AAAAAAAAAxI/0COtwCnWFwg/s72-c/Owasp+Xelenium+-+XSS+Scanner.png" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-7438230220644688822.post-3191364302307250254</id><published>2012-03-12T05:28:00.000-07:00</published><updated>2012-03-12T05:28:32.253-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Hacking Tools"/><category scheme="http://www.blogger.com/atom/ns#" term="Linux"/><category scheme="http://www.blogger.com/atom/ns#" term="Penetration Testing"/><title type='text'>Download BackTrack 5 R2</title><summary type="text">BackTrack 5R2 comes in several flavours and architectures. 
Download BackTrack 5R2 32bit Gnome
Download BackTrack 5R2 32bit KDE
DownloadBackTrack 5R2 64bit Gnome
Download BackTrack 5R2 64bit KDE

</summary><link rel='replies' type='application/atom+xml' href='http://www.hackguide4u.com/feeds/3191364302307250254/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.hackguide4u.com/2012/03/download-backtrack-5-r2.html#comment-form' title='2 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/7438230220644688822/posts/default/3191364302307250254'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/7438230220644688822/posts/default/3191364302307250254'/><link rel='alternate' type='text/html' href='http://www.hackguide4u.com/2012/03/download-backtrack-5-r2.html' title='Download BackTrack 5 R2'/><author><name>Adnan Anjum</name><uri>https://plus.google.com/110311237631564786309</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='32' src='//lh3.googleusercontent.com/-NHpB_wp4R3U/AAAAAAAAAAI/AAAAAAAAAyI/Mw3BRkjop5w/s512-c/photo.jpg'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="http://3.bp.blogspot.com/-jkihOfm7fDU/T0lGL17SCPI/AAAAAAAAAxI/d6PmrSWqnJU/s72-c/Backtrack-Black-Dragon-Wallpaper.jpg" height="72" width="72"/><thr:total>2</thr:total></entry><entry><id>tag:blogger.com,1999:blog-7438230220644688822.post-8041209233186823345</id><published>2012-01-13T20:20:00.000-08:00</published><updated>2012-01-13T20:21:06.994-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Hacking Tutorials"/><title type='text'>Metasploit Framework Post Exploitation - Windows Security Center</title><summary type="text">

Quick demo as part of post exploitation phase with Metasploit Framework and some tips about the Windows Security Center and the system notifications</summary><link rel='replies' type='application/atom+xml' href='http://www.hackguide4u.com/feeds/8041209233186823345/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.hackguide4u.com/2012/01/metasploit-framework-post-exploitation.html#comment-form' title='1 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/7438230220644688822/posts/default/8041209233186823345'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/7438230220644688822/posts/default/8041209233186823345'/><link rel='alternate' type='text/html' href='http://www.hackguide4u.com/2012/01/metasploit-framework-post-exploitation.html' title='Metasploit Framework Post Exploitation - Windows Security Center'/><author><name>Adnan Anjum</name><uri>https://plus.google.com/110311237631564786309</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='32' src='//lh3.googleusercontent.com/-NHpB_wp4R3U/AAAAAAAAAAI/AAAAAAAAAyI/Mw3BRkjop5w/s512-c/photo.jpg'/></author><thr:total>1</thr:total></entry><entry><id>tag:blogger.com,1999:blog-7438230220644688822.post-2213739324648680814</id><published>2012-01-13T20:15:00.000-08:00</published><updated>2012-01-13T20:15:20.721-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Cyber security"/><category scheme="http://www.blogger.com/atom/ns#" term="Operating Systems"/><title type='text'>DEFT Linux 7 Computer Forensic Live Cd - Released</title><summary type="text">DEFT (Digital Evidence &amp; Forensic Toolkit) is a customised distribution of the Lubuntu live Linux CD. It is an easy-to-use system that includes excellent hardware detection and some of the best open-source applications dedicated to incident response and computer forensics.   


New features:


- Based on Lubuntu 11.10
- Installable Distro
- Linux kernel 3.0.0-12, USB 3 ready
- Libewf 20100226
- </summary><link rel='replies' type='application/atom+xml' href='http://www.hackguide4u.com/feeds/2213739324648680814/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.hackguide4u.com/2012/01/deft-linux-7-computer-forensic-live-cd.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/7438230220644688822/posts/default/2213739324648680814'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/7438230220644688822/posts/default/2213739324648680814'/><link rel='alternate' type='text/html' href='http://www.hackguide4u.com/2012/01/deft-linux-7-computer-forensic-live-cd.html' title='DEFT Linux 7 Computer Forensic Live Cd - Released'/><author><name>Adnan Anjum</name><uri>https://plus.google.com/110311237631564786309</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='32' src='//lh3.googleusercontent.com/-NHpB_wp4R3U/AAAAAAAAAAI/AAAAAAAAAyI/Mw3BRkjop5w/s512-c/photo.jpg'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-7438230220644688822.post-8539415263036164827</id><published>2012-01-12T17:22:00.000-08:00</published><updated>2012-01-12T17:23:01.268-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Hacking Tutorials"/><title type='text'>Hack Windows 7 with Metasploit</title><summary type="text">In this tutorial i will exploit a Windows 7 Sp1 OS using Metasploit. i will be using the exploit/multi/handler module which “provides all of the features of the Metasploit payload system to exploits that have been launched  outside of the framework“
Before we fire up Metasploit, we need to create a payload in order to gain a meterpreter shell. To create a payload type this in the terminal without</summary><link rel='replies' type='application/atom+xml' href='http://www.hackguide4u.com/feeds/8539415263036164827/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.hackguide4u.com/2012/01/hack-windows-7-with-metasploit.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/7438230220644688822/posts/default/8539415263036164827'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/7438230220644688822/posts/default/8539415263036164827'/><link rel='alternate' type='text/html' href='http://www.hackguide4u.com/2012/01/hack-windows-7-with-metasploit.html' title='Hack Windows 7 with Metasploit'/><author><name>Adnan Anjum</name><uri>https://plus.google.com/110311237631564786309</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='32' src='//lh3.googleusercontent.com/-NHpB_wp4R3U/AAAAAAAAAAI/AAAAAAAAAyI/Mw3BRkjop5w/s512-c/photo.jpg'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="http://3.bp.blogspot.com/-H3oEJsZC5SA/Tw-FqPzjxRI/AAAAAAAAAwE/iDUyg1vCx4E/s72-c/Pawning+Windows+7+Sp1+Box+with+Metasploit+by+hackguide4u.png" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-7438230220644688822.post-8703489896473485484</id><published>2012-01-09T14:34:00.001-08:00</published><updated>2012-01-09T14:34:58.904-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Exploits/Vulnerabilities"/><title type='text'>MS11-100 DoS PoC exploit published</title><summary type="text">If you have not patched yet for vulnerability MS11-100 you might want to do it ASAP, because the DoS PoC exploit for this vulnerability has been published three days ago.


More information about the vulnerability and patches at http://technet.microsoft.com/en-us/security/bulletin/ms11-100</summary><link rel='replies' type='application/atom+xml' href='http://www.hackguide4u.com/feeds/8703489896473485484/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.hackguide4u.com/2012/01/ms11-100-dos-poc-exploit-published.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/7438230220644688822/posts/default/8703489896473485484'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/7438230220644688822/posts/default/8703489896473485484'/><link rel='alternate' type='text/html' href='http://www.hackguide4u.com/2012/01/ms11-100-dos-poc-exploit-published.html' title='MS11-100 DoS PoC exploit published'/><author><name>Adnan Anjum</name><uri>https://plus.google.com/110311237631564786309</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='32' src='//lh3.googleusercontent.com/-NHpB_wp4R3U/AAAAAAAAAAI/AAAAAAAAAyI/Mw3BRkjop5w/s512-c/photo.jpg'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-7438230220644688822.post-2709246765103126305</id><published>2012-01-09T14:30:00.000-08:00</published><updated>2012-01-09T14:30:02.202-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Exploits/Vulnerabilities"/><title type='text'>Simple Mail Server - SMTP Authentication Bypass Vulnerability</title><summary type="text">Title: Simple Mail Server - SMTP Authentication Bypass Vulnerability


Software : Simple Mail Server


Software Version : 2011-12-30


Vendor: http://simplemailsvr.sourceforge.net/


Class:  Origin Validation Error  


CVE:

Remote:  Yes  


Local:  No  


Published:  2012-01-08


Updated: 


CVSS2 Base: 6.4 (AV:N/AC:L/Au:N/C:P/I:N/A:P)


Impact : Medium (4 &lt; 6.4 &lt; 8)


Bug Description :
Simple </summary><link rel='replies' type='application/atom+xml' href='http://www.hackguide4u.com/feeds/2709246765103126305/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.hackguide4u.com/2012/01/simple-mail-server-smtp-authentication.html#comment-form' title='1 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/7438230220644688822/posts/default/2709246765103126305'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/7438230220644688822/posts/default/2709246765103126305'/><link rel='alternate' type='text/html' href='http://www.hackguide4u.com/2012/01/simple-mail-server-smtp-authentication.html' title='Simple Mail Server - SMTP Authentication Bypass Vulnerability'/><author><name>Adnan Anjum</name><uri>https://plus.google.com/110311237631564786309</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='32' src='//lh3.googleusercontent.com/-NHpB_wp4R3U/AAAAAAAAAAI/AAAAAAAAAyI/Mw3BRkjop5w/s512-c/photo.jpg'/></author><thr:total>1</thr:total></entry><entry><id>tag:blogger.com,1999:blog-7438230220644688822.post-6530973653482168539</id><published>2012-01-06T07:42:00.000-08:00</published><updated>2012-01-06T07:55:02.535-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Hacking Tools"/><title type='text'>Perform Smart SSL Cipher Enumeration:SSL Smart</title><summary type="text">SSLSmart, a highly flexible and interactive tool aimed at improving efficiency and reducing the false positives during SSL testing.
Among other things, SSLSmart simply an advanced and highly flexible Ruby based smart SSL cipher enumeration tool. It is an open source, cross platform, free tool. It was programmed because a number of tools on the Windows platform allow users to test for supported </summary><link rel='replies' type='application/atom+xml' href='http://www.hackguide4u.com/feeds/6530973653482168539/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.hackguide4u.com/2012/01/perform-smart-ssl-cipher-enumerationssl.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/7438230220644688822/posts/default/6530973653482168539'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/7438230220644688822/posts/default/6530973653482168539'/><link rel='alternate' type='text/html' href='http://www.hackguide4u.com/2012/01/perform-smart-ssl-cipher-enumerationssl.html' title='Perform Smart SSL Cipher Enumeration:SSL Smart'/><author><name>Adnan Anjum</name><uri>https://plus.google.com/110311237631564786309</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='32' src='//lh3.googleusercontent.com/-NHpB_wp4R3U/AAAAAAAAAAI/AAAAAAAAAyI/Mw3BRkjop5w/s512-c/photo.jpg'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-7438230220644688822.post-1998597546293544062</id><published>2011-12-31T13:24:00.000-08:00</published><updated>2011-12-31T13:24:47.357-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Cyber security"/><category scheme="http://www.blogger.com/atom/ns#" term="Hacking Tutorials"/><title type='text'>Bypass Intrusion Detection/Prevention Signatures</title><summary type="text">*Please note that this does not include the multitude of configuration errors (disabled by default checks like POST search/bad preprocessor configurations like minimum fragment length) nor network vs. host-based issues like fragment reassembly.For configuration errors by default, please check http://cvs.snort.org....cgi/snort/doc/ and read appropriate preproc documents for disabled checks. By </summary><link rel='replies' type='application/atom+xml' href='http://www.hackguide4u.com/feeds/1998597546293544062/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.hackguide4u.com/2011/12/bypass-intrusion-detectionprevention.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/7438230220644688822/posts/default/1998597546293544062'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/7438230220644688822/posts/default/1998597546293544062'/><link rel='alternate' type='text/html' href='http://www.hackguide4u.com/2011/12/bypass-intrusion-detectionprevention.html' title='Bypass Intrusion Detection/Prevention Signatures'/><author><name>Adnan Anjum</name><uri>https://plus.google.com/110311237631564786309</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='32' src='//lh3.googleusercontent.com/-NHpB_wp4R3U/AAAAAAAAAAI/AAAAAAAAAyI/Mw3BRkjop5w/s512-c/photo.jpg'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-7438230220644688822.post-5110880256771966666</id><published>2011-12-31T13:17:00.000-08:00</published><updated>2011-12-31T13:17:16.699-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Hacking Tutorials"/><title type='text'>Writing Shell Code On/For Windows</title><summary type="text">IntroductionThis article/tutorial assumes you have some common sense and some knowledge.I won&#39;t be explaining what shell code, DLL&#39;s, Memory Adresses etc...You should know that before starting on this.EnvironmentInitially we will be focusing on creating Windows Assembly; however, Linux is reallygood for developing assembly and shell code. But because we are on windows we&#39;lluse Cygwin.Download the</summary><link rel='replies' type='application/atom+xml' href='http://www.hackguide4u.com/feeds/5110880256771966666/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.hackguide4u.com/2011/12/writing-shell-code-onfor-windows.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/7438230220644688822/posts/default/5110880256771966666'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/7438230220644688822/posts/default/5110880256771966666'/><link rel='alternate' type='text/html' href='http://www.hackguide4u.com/2011/12/writing-shell-code-onfor-windows.html' title='Writing Shell Code On/For Windows'/><author><name>Adnan Anjum</name><uri>https://plus.google.com/110311237631564786309</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='32' src='//lh3.googleusercontent.com/-NHpB_wp4R3U/AAAAAAAAAAI/AAAAAAAAAyI/Mw3BRkjop5w/s512-c/photo.jpg'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-7438230220644688822.post-6055884260025208344</id><published>2011-12-31T13:10:00.000-08:00</published><updated>2011-12-31T13:10:07.079-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Hacking Tools"/><title type='text'>Password Security Scanner v.1.00</title><summary type="text">This utility scans the passwords stored by popular Windows applications (Microsoft Outlook, Internet Explorer, Mozilla Firefox, and more...) and displays security information about all these passwords. The security information of every stored password includes the total number of characters, number of numeric characters, number of lowercase/uppercase characters, number of repeating characters, </summary><link rel='replies' type='application/atom+xml' href='http://www.hackguide4u.com/feeds/6055884260025208344/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.hackguide4u.com/2011/12/password-security-scanner-v100.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/7438230220644688822/posts/default/6055884260025208344'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/7438230220644688822/posts/default/6055884260025208344'/><link rel='alternate' type='text/html' href='http://www.hackguide4u.com/2011/12/password-security-scanner-v100.html' title='Password Security Scanner v.1.00'/><author><name>Adnan Anjum</name><uri>https://plus.google.com/110311237631564786309</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='32' src='//lh3.googleusercontent.com/-NHpB_wp4R3U/AAAAAAAAAAI/AAAAAAAAAyI/Mw3BRkjop5w/s512-c/photo.jpg'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-7438230220644688822.post-6798910117367158717</id><published>2011-11-28T13:18:00.000-08:00</published><updated>2011-11-28T13:18:14.332-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Facebook Hacks"/><category scheme="http://www.blogger.com/atom/ns#" term="Gmail Hacks"/><category scheme="http://www.blogger.com/atom/ns#" term="Hacking Tools"/><category scheme="http://www.blogger.com/atom/ns#" term="Hacking Tutorials"/><category scheme="http://www.blogger.com/atom/ns#" term="Hotmail Hacks"/><category scheme="http://www.blogger.com/atom/ns#" term="KEYLOGGERS"/><category scheme="http://www.blogger.com/atom/ns#" term="Twitter hacks"/><category scheme="http://www.blogger.com/atom/ns#" term="Yahoo hacks"/><title type='text'>How To Hack Facebook</title><summary type="text">


After watching this video you are now able to build keylogger server with default options for some advance options you can explore various builder functions.

Last Update Date: 10/11/2011 (Curing update.)

Latest Version: v1.78
Project Neptune (1.7 MiB )

Project Neptune includes many features that separate it from other programs and simply make it the best. Each of it,s functions are entirely</summary><link rel='replies' type='application/atom+xml' href='http://www.hackguide4u.com/feeds/6798910117367158717/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.hackguide4u.com/2011/11/how-to-hack-facebook.html#comment-form' title='7 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/7438230220644688822/posts/default/6798910117367158717'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/7438230220644688822/posts/default/6798910117367158717'/><link rel='alternate' type='text/html' href='http://www.hackguide4u.com/2011/11/how-to-hack-facebook.html' title='How To Hack Facebook'/><author><name>Adnan Anjum</name><uri>https://plus.google.com/110311237631564786309</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='32' src='//lh3.googleusercontent.com/-NHpB_wp4R3U/AAAAAAAAAAI/AAAAAAAAAyI/Mw3BRkjop5w/s512-c/photo.jpg'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://img.youtube.com/vi/nf4HKW5QIPM/default.jpg" height="72" width="72"/><thr:total>7</thr:total></entry><entry><id>tag:blogger.com,1999:blog-7438230220644688822.post-4848786935176266208</id><published>2011-10-21T12:30:00.000-07:00</published><updated>2011-10-21T12:30:04.749-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Free Full Version Softwares"/><category scheme="http://www.blogger.com/atom/ns#" term="Keys and Keygens"/><title type='text'>Free Comodo Internet Security Pro 2012 one year license key</title><summary type="text">Comodo Internet Security Pro 2012 which is priced at $49.99. This promo will allow users to use the latest pro version completely free for a year.
 Free Comodo Internet Security Pro 2012 Comodo Internet Security Pro comes with powerful cloud based Antivirus,  Antispyware, and an excellent award winning firewall with defense plus  technology that provides high-level of protection. The 2012 </summary><link rel='replies' type='application/atom+xml' href='http://www.hackguide4u.com/feeds/4848786935176266208/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.hackguide4u.com/2011/10/free-comodo-internet-security-pro-2012.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/7438230220644688822/posts/default/4848786935176266208'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/7438230220644688822/posts/default/4848786935176266208'/><link rel='alternate' type='text/html' href='http://www.hackguide4u.com/2011/10/free-comodo-internet-security-pro-2012.html' title='Free Comodo Internet Security Pro 2012 one year license key'/><author><name>Adnan Anjum</name><uri>https://plus.google.com/110311237631564786309</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='32' src='//lh3.googleusercontent.com/-NHpB_wp4R3U/AAAAAAAAAAI/AAAAAAAAAyI/Mw3BRkjop5w/s512-c/photo.jpg'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-7438230220644688822.post-3005649368371426721</id><published>2011-10-17T05:30:00.000-07:00</published><updated>2011-10-17T05:30:10.975-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Linux"/><category scheme="http://www.blogger.com/atom/ns#" term="Tricks and Tips"/><title type='text'>Official GNOME Shell Extensions</title><summary type="text">Official GNOME Shell Extensions Available In The WebUpd8 GNOME 3 PPA For Ubuntu 11.10The latest official GNOME Shell Extensions (version 3.2.0) are now available in the WebUpd8 GNOME 3 PPA  for Ubuntu 11.10 Oneiric Ocelot. This PPA is an attempt to have all the  stable GNOME 3.2 packages that aren&#39;t available in the official Ubuntu  11.10 repositories in a single place. Please note that I did not</summary><link rel='replies' type='application/atom+xml' href='http://www.hackguide4u.com/feeds/3005649368371426721/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.hackguide4u.com/2011/10/official-gnome-shell-extensions.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/7438230220644688822/posts/default/3005649368371426721'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/7438230220644688822/posts/default/3005649368371426721'/><link rel='alternate' type='text/html' href='http://www.hackguide4u.com/2011/10/official-gnome-shell-extensions.html' title='Official GNOME Shell Extensions'/><author><name>Adnan Anjum</name><uri>https://plus.google.com/110311237631564786309</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='32' src='//lh3.googleusercontent.com/-NHpB_wp4R3U/AAAAAAAAAAI/AAAAAAAAAyI/Mw3BRkjop5w/s512-c/photo.jpg'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="http://2.bp.blogspot.com/--4zi9mFNkVw/TpwcDx5T9dI/AAAAAAAAAus/4zicsOqskww/s72-c/Screenshot+at+2011-10-04+17%253A12%253A24.png" height="72" width="72"/><thr:total>0</thr:total></entry></feed>