Category Archives: Exploit
Exploit (computer security)

Window Password Cracking —————————————————————————————————————————————– It is quiet hurting that u lost your windows password of forgot ur password Ur friend PC is placed in front of U but it is password protected Really Hurting Read more…

Cyber Stalking can be defined as the repeated acts harassment or threatening behavior of the cyber criminal towards the victim by using internet services. Stalking in General terms can be referred to as the repeated acts of harassment targeting the Read more…
HOW TO HACK SCADA SYSTEMS? SCADA stands for Supervisory Control And Data Acquisition. These are the systems which are spread over a wide area, used in controlling and managing industrial environments, to know more about SCADA read our post An Read more…

If you want to access your local computer through remote computer ; first you need configure ssh daemon .Because nowadays people are not using telnet due to plain text protocol. How to configure ssh in Backtrack 5 r3? (1)First we Read more…

Hey here is new tools which I found is WEBSPLOIT. First download WEBSPLOIT from here.Now install it. (it`s old article; view updated part at bottom to download latest version) Installation process are as follow. (1)First download WebSploit toolkit (2)Now unzip Read more…