Have you ever wanted to check out the list of people in Facebook whom you used to often look into. Well this trick helps you to get a list of people whom you keep stalking on Facebook for a long time. The list also will rank the profiles according to the frequency the times you viewed the persons profile.So read below for instructions for the trick.
You are now just one click away from getting your android device being successfully rooted up and are able to unlock not just one but handful number of devices at any point of time by a well- known unlock root tool. (more…)
Have you ever wanted to create fake facebook conversations for fun, hence here we try to explain to you a simple web service that will make you create fake facebook conversations and save the picture for you to share it.
SQL injection being one of the popular hacking techniques used by hackers, can still be vulnerable to a lot of website online. FatCat as the title says is a automatic SQL injection tool. This software can be used for testing SQL vulnerabilities and loopholes of a web application vulnerable to SQL injections. (more…)
The Internet has been a revolutionary technology that changed the world and the hackers have been trying to crack the vulnerabilities that they can use for their own gains. They also pose a threat to the internet.Here are the top 10 viruses and worms that impacted the world. (more…)
The THC-SSL-DOS tool released on Monday exploits a flaw in SSL(Secure Sockets Layer) renegotiation protocol by flooding the web service with multiple renegotiation requests over a already established SSL connection for a new key. This works in same way as more common DOS(Denial of service) attacks , except the fact that this flaw in SSL renegotiation takes up more resources than a single HTTP request, hence leading to taking down a large webserver with a single computer.
Phishing is a type of social engineering form of hacking a persons private data like passwords or credit card details or any other private data by faking the identity of any legitimate trustworthy company or individual.Phishing is a basic form of hacking,to steal any sensitive data and due to the less complexity involved in carrying out this hack, it is one of the most widely used method of stealing ones sensitive data. Hence this kind of attack is mainly carried out by noobs who try to steal any sensitive data and the people who are less conscious about these kinds of scam usually fall as a victim. (more…)
Super Bluetooth Hack is the best and also well known Mobile Bluetooth hacking software available. Many of you might be aware of this or even already be using this free tool. So the post is mainly for the noobs out there who didn’t come across this tool until now. (more…)