Lets Start Creating Unlimited FB Accounts Step 1: Firstly, go to http://m.facebook.com and then click “Create New Account” Step 2: Fill the complete form ( use http:// fakenamegenerator.com/ ) In the section of “Email or Phone” use email from http://10minutemail.com/ Step 3: Press “Sign up” and then visit http://10minutemail.com/ to get email verification from Facebook (Press F5 until you see it) use that CODE to activate your account. NOTE: Your Account may get banned in a day, so do make sure that you are providing the proper identity (college, school, place of living…) and don’t forget to upload a profile picture to keep the life of your account longer. [.....]
Tech:- Create A blank name or non name folder
1. Select any file or folder whose name you want to remove or change its name as a blank space.
2. Right click on it and choose rename or simply press F2 from keyboard to rename that file or folder
3. Press and hold the Alt key. While holding the Alt key, type numbers 0160 (0r 999999999 or 255) from the numpad.
Enjoy your tricks with Mr. Mighty Dude Hacker... [.....]
Hi guys today I am going to tell you how to hack facebook using keylogger or any other email account.
First of what is keylogger, a keylogger is suspicious program that record your keystrokes, there are advanced keylogger which can even take the screenshot of the desktop but we are here only gonna use a simple keylogger through which we are gonna hack victims email id.
So lets try How to hack facebook using keylogger. First you need to download our keylogger package from below: Here
[.....]
Havij 1.16 Pro Full Version Cracked | Mdude Logic
Free Download Havij 1.16 Pro Full Cracked
Download Havij Pro
[.....]
This small tutorial is will explain you how professional hackers got root on servers. This tut is for beginner, so lets look at some contents of
this tutorials below
1. What is Root ?
2. How can I get on the Root ?
3. Local root and how to search for him ?
4. How connect the server ?
5. How to get Root access ?
6. What happen after the root ?
7. The withdrawal of my domain ?
8. How to do mass deface ?
[.....]
Introduction
This TUT assumes a working knowledge of basic shellcoding techniques, and x86 assembly, I will not rehash these in this TUT. I hope to teach you some of the lesser known shellcoding techniques that I have picked up, which will allow you to write smaller and better shellcodes. I do not claim to
have invented any of these techniques, except for the one that uses the div instruction.
The multiplicity of mul
This technique was originally developed by Sorbo.
The mul instruction may, on the surface, seem mundane, and it’s [.....]
After getting the admin access in the website attacker will upload his own control penal that’s called shell. It helps attacker to maintain access
for the long time. There are many types of shells like DDOSE shell, symlink shell etc.
Using shell attacker can destroy whole database and he can leak the database of the website and using the shell he can root the server. (Only Linux server can be rooted windows server cant be rooted because there is no ROOT :P) After rooting he can destroy whole server. Suppose One server
contains [.....]