So You’re Sick Of Being A SKIDDIE? Let’s Hack For Real

This post below is an article written by michaeljay from HackForums, you can see the original post here.  I find it quite informative and it has quality over other similar threads.

Then what can you do about it?

Sick of just being able to push buttons and not know what you’re doing? Tired of seeing error messages in aircrack and being frozen because you have no real idea of what you’re typing? I saw a thread here from someone saying he’s sick of being a skiddie, so I figured I’d write this post up to explain how I went from being a skiddie to someone who knows his way around various protocols and techniques. Not that I consider myself a l337 hax0r, by any means. Most of the posters here would blow me away with their skill and knowledge. But I feel I’ve got some stuff to share, and my girlfriend is doing her own thing tonight, so I’m going to write this post up for you. For good or for evil. Read the rest of this entry »

Nessus + Metasploit = db_autopwn

Have you ever wanted to use 1 line of code that can do all the wonders of hacking for you, eg. entering the remote computer in your network without the target knowing?  Or remotely install a program into the computer and start running that program without their consent?  Wondering which exploit exists in Metasploit that is similar to the vulnerability you have found using Nessus?

Enter the world of combination between Metasploit and Nessus.  By linking both of them together, you can now run a simple code in Metasploit to do both of it at the same time!


Read on to find out more on what hydra is and how it is used by hackers to crack password in matter of hours! Be it email, ftp or Facebook! With the right set of skills, you can do whatever you want with it as long as it is in the area you are allowed to. In this article, I will be writing a quick description on how to install it and how to use it on a basic level.

Read the rest of this entry »

HTTP File Downloader for Linux and Windows in C | Source Code

A member in HackForums by the handle Jakash3 has posted a source code on how to download files from the Internet that can be compiled in both Linux and Windows.  Another great feature is that it supports IPv6. Read the rest of this entry »

The official way of writing a crypter in C | Source Code

mindlessdeath, a member from HackForums have posted a thread regarding how to write a crypter in C!  I find this source code a very good example for people that are trying to learn to write their own crypter.  Compared to any other source codes that are posted on the internet, the author of this source code gave a very detailed information on each line on what the statements does.  In order to use this source code without much trouble, there are some prerequisites that was mentioned by the author himself.  Read the rest of this entry »

Googlestruction, the ultimate power!

Do you know that Google is a very powerful search tool?  I am not trying to pull your leg here asking you to use Uncle Google in time of needs.  I had a lesson today in one of my lecturer classes given by my professor in the subject Malicious Software and Security Programming.  Do you know that googling may give you result you may never expected?  Try googling for “ allintext:exam paper filetype:doc OR filetype:pdf”.  This may just give you your coming exams paper!  Today i will be posting some of the amazing links that can be helpful with Google!

1.) IHS | GHDB
2.) Google Hacking Database, GHDB, Google Dorks

I would like to highlight that the first link posted above is the person that has discovered GHDB according to my professor.  If you like this post or require some study materials in learning Google Hacking, write a comment below so i will update it further.

Decrypt Firefox 3.5 and 3.6 stored passwords in C | Source Code | Application

If you have already decrypted passwords for Firefox 1, 2 and 3 (if you need them, it’s here), here is the source code in C that helps you decrypt Firefox passwords for version 3.5 and 3.6!  This source code is written by ZeR0 from  This source code is generally open source by the author but the terms of use is to give credits if you use it.

Download source code here (link removed).
Download binary / application here (link removed).