Category Archives: Defacements

Vulnerability Assessment and Penetration Testing (VAPT)


ROBOTICS (SIXTH SENSE)

Robotics Development summer Internship Training Program provides a comprehensive Robotics Sixth Sense -training program to meet the standards of highly skilled security professionals. 72-B, III Floor, Vijay Block, Main Vikas Marg, Laxmi Nagar, New Delhi – 110092 Near Nirman Vihar Read more…


ByteCode is a leading company in delivering the IT Training and Certifications. Since its foundation we are committed to offer the best Trainings and Services to our students, clients and partners with a high standard, Because we believe that high standards Read more…


5000+ SQL Injection Dorks Got Stucked Know SQL Injection but no dorks Here Byte Code presents 5000+ Dorks Want to hack website using SQL Injection, But didn’t be able to find out the dorks. so byte code presents yo here 5000+ Read more…


How Be Hack Website With DarkMysql in Backtrack step 1 . step 2 . step 3. step 4 . Published By Praveen Kumar


Hackers Types Hackers are three types:- 1. White hat hacker 2. Gray hat hacker 3. Black hat hacker White Hat and Grey Hat Hacker & What is the Real Difference? What is worse, the public is not able to understand Read more…


Private sql dorks Submitted by Praveen kumar inurl:group_concat username 0x3a PASSWORD from robot inurl:group_concat username 0x3a PASSWORD from pirates inurl:group_concat username 0x3a PASSWORD from obama inurl:group_concat username 0x3a PASSWORD from shadow inurl:group_concat username 0x3a PASSWORD from khan inurl:group_concat username 0x3a Read more…


  Javascript Injection – Submitted By:Praveen kumar Javascript Injections These three things i will try to explain to you: Injection Basics, Cookie and Form Editing. In these articles i will teach you only the super basics of javascript and for Read more…


CRLF Injections ———————————- [-]CRLF Injection Attacks [-] [-]By Ethernet [-] [-]EnigmaGroup.9/04/07 [-] ———————————- —————————————- [0x] Table of Contents —————————————- [1x] – What is a CRLF Injection? [2a] – Vulnerability PoC – Comment System [2b] – Vulnerability PoC – Email Form Read more…


Full Website Hacking Tutorials -= Intro in this tutorial, we will discuss the vulnerabilities, and what goes wrong with the developer, and some ways to exploit them… Enjoy!! Tutorial: [ Basic || 1 ] +——————————————+ | | || Starter || Read more…


  Blogger 0Day Vulnerability-Hacking Sub Domains Of Blog FRIDAY 30-AUG-2013 PRAVEEN KUMAR 2 New BlogDNS 0day, Discovered By Shadow008By This trick you can hack any site or sub domain attach to google server 1st) Firstly Let take a site like Read more…


Shell Finder Perl Script autoshellfinder password ==> p7771