Posts

Debunking Myth : Is "Ubuntu" a Spying on Me ??

Image
After reading the title of this post, you might be a bit astonished , WTF!!! is Ubuntu really spying on ME ??. Ubuntu is currently the most popular Linux distribution used by a hell lot of people including myself and it is the most user friendly Linux distro i have ever seen.Ubuntu has lot of cool features like a software center,periodic updates and of course, its based on Debian. So, Is Ubuntu Really Spying on Me?? The answer for this question is "YES" .Ubuntu is definitely spying on you.It records all your dash searches and is sending all your information to interested parties like Amazon,Facebook,Twitter etc. If you really want to see this for yourself then  Goto DASH (press SUPER key) - > System Settings - > Details  And you can see this for yourselves     Should i be worried about this ? I personally think that you are not supposed to be worrying too much about this because in todays world all your information ONL...

How to Execute Shell codes and get their output in Python[ with Code ]

Image
In this tutorial, I will be providing you a code snippet with which u can execute shell codes(or commands in terminal and obtain the output of these commands) Here, I am using the linux command "ls" ,which is used to list the files in the given directory So in terminal we have somthing like this So Now we will see how the same output can be obtained and stored in a variable in python So here is the Code snippet import subprocess output = subprocess.check_output("ls") print(output) In the above code, we first import a module called "subprocess"  Then we are executing a method called "check_output()" and the result is stored in a variable called "output". Thus , we can execute and retrieve the output of any shell code executed in python Now, we run the python script and view the same output

How to Decompile JAR files and View Source Code of Java Programs

Image
In software terms, JAR (Java Archive) is a package file format typically used to aggregate many Java class files and associated metadata and resources (text, images, etc.) into one file to distribute application software or libraries on the Java platform. Typically, The Contents of any JAR file can be viewed by Extracting the JAR file with the Help of Tools like WinZIP or WinRAR . Once You have successfully extracted the contents of the JAR file . you will get a lot of Files with file extension " .class " and these class files are not in Human Readable Format. So, to Overcome this problem and to view the original JAVA source code hidden inside these class files stored inside the JAR file container ,we use a tool called JD-GUI . JD stands for "Java Decompiler" . It is a standalone graphical utility that displays Java source codes of “ .class ” files. You can browse the reconstructed source code with the JD-GUI for instant access to methods...

How to Hack website using SQLi Injection -- Full Tutorial + Software

Image
Its a Dream for Everyone who is Interested in Computers to " HACK Something ". In this Tutorial, I am Going to Teach you how  to Hack a Website using an SQLi attack . This attack is a famous attack. But there are no complete tutorials available on this. So in this tutorial i am going to teach you how to perform this attack on a Vulnerable Site. What all Do you need to perform this Attack? Well, You need an Internet Connection , Havij 1.5 ( Click to DOWNLOAD )  and a Bit brain. So to Begin with You need to Find a Website which is " HACKABLE ". Go to www.google.com and type " newsitem.php?id=140220 " Now Click on any Link When the Page Loads   you can the URL of the Website Like This Now add a Single quote ( ' ) to the URL and Press Enter So,Now your URL looks LIKE this [ http://www.10ccworld.com/newsitem.php?id=140220' ] Now,You can See an Error Message Like This or Any other Similar Error Messag...

How to Hide a Text File inside another Text File

Image
Hi guys, In this Tuorial I am going to teach you how to hide a Text File inside another Text File. This is a very simple trick and it only works with NTFS file system. So in this tutorial, I will be using a TextFile called " Sample.txt " stored in my " D: Drive "  You can See the Contents of my File   Now Click on Start - > Run and you will get a Window Like this    Now Press ENTER button Navigate to D: Drive by typing " D: " and Press ENTER Now type " notepad.exe sample.txt:hiddenfile "   Note: " hiddenfile " is the name of the file that you are going to create inside " sample.txt ".So Don't forget this name.If you forget " hiddenfile " keyword then you wont be able to access this file in future.  Now Click on " Yes " and Start Typing the Contents that You want to Hide. After typing , Click on File - > Save Now You Have Sucessfully Hidden a File insi...

How is Mozilla Firefox Developer Edition Different from Regular Edition???

Image
Mozilla recently launched a new version of their web browser called Mozilla Firefox Developer Edition that is specifically geared towards web developers. Version 35.0a2, first offered to Firefox Developer Edition users on November 10, 2014 Th is Edition is Nothing but,a   modified version of Firefox that is specifically designed for web developers. It also uses a separate profile from the regular version so that running them side-by-side is an option. That does mean that all your add-ons and settings will not be available in the Firefox Developer Ed...

Way2Sms Password Cracker v1.0 by [ im0ck53c ]

Image
Way2sms.com is a Free sms Service provider based in India. This Tool will help you to crack any way2sms account using your mobile no as input. DISCLAIMER This Tool ' Way2sms Password Cracker ' is provided with as is warranty.If any Attack is carried out on Way2sms.com with this tool . I the Creater of this Tool cannot be held Responsible for the same.Use It at Your own Risk. This Tool is a Bruteforcer ,which means it will check all possible combinations of Passwords to find the correct  password .  This Tool has 3 Modes of Operations namely 1) Dictionary Attack : You provide a list of words and the tool will only check those words as passwords 2) BruteForce Attack : In this Mode of Attack you can Choose a Minimum Password Lengh & a Maximum Password Length, Then You can also specify the types of character combination like  "Lowercase" that is    a,b,c,d,...................z "Uppercase" that is   A,B,C,.......