Finally, the stolen sources of Kaspersky anti-virus (passing from hand to hand last year ot two) found their way to public, here is the li...

Kaspersky Source Goes Public...

Monday, January 31, 2011 Sensei Fedon 0 Comments

Finally, the stolen sources of Kaspersky anti-virus (passing from hand to hand last year ot two) found their way to public, here is the links:

So, I see no reasons not to share my own copy which I got about a year ago (thanks to friends from cih.ms!):
subj :-) (direct http link, 7z, 191MB)
Folders:        2990
Files:            27654
Size:            1046259453
Compressed: 195934996
MD5 0397c86ceee911b36076cd3fea67ff98
The password is asd

Source: VX Heavens

0 comments:

This toolbar will help you in testing sql injections, XSS holes and site security. It is NOT a tool for executing standard exploits and it ...

Hackbar Mozilla Firefox Addon...

Monday, January 24, 2011 Sensei Fedon 0 Comments

This toolbar will help you in testing sql injections, XSS holes and site security. It is NOT a tool for executing standard exploits and it will NOT teach you how to hack a site. Its main purpose is to help a developer do security audits on his code. If you know what your doing, this toolbar will help you do it faster. If you want to learn to find security holes, you can also use this toolbar, but you will probably also need a book, a lot of Google and a brain :)

0 comments:

XSS Rays is a complete XSS reversing/scanner tool. It helps you to find how a site is filtering code, and allows you to check for injecti...

XSS Rays: A Google Chrome XSS Scanning Browser Extension!

Sunday, January 23, 2011 Sensei Fedon 0 Comments

XSS Rays is a complete XSS reversing/scanner tool. It helps you to find how a site is filtering code, and allows you to check for injections and inspect objects. It is a security tool to help pen test large web sites. It’s core features include a XSS scanner, XSS Reverser and object inspection. If you want to know how a certain page filters output and don’t have its source code, XSS Rays will perform a blackbox reverse of the XSS filter without needing the source code!
You can also extract/view and edit forms non-destructively that normally can’t be edited. For example if you want to modify the value of a checkbox without changing it’s type XSS Rays can link to the object and allow you to change the value without altering the original object.

0 comments:

Internet Society - World IPv6 Day: "World IPv6 Day About World IPv6 Day On 8 June, 2011, Google, Facebook, Yahoo!, Akamai and Limelig...

Internet Society - World IPv6 Day

Friday, January 21, 2011 Sensei Fedon 0 Comments

Internet Society - World IPv6 Day:
"World IPv6 Day About World IPv6 Day On 8 June, 2011, Google, Facebook, Yahoo!, Akamai and Limelight Networks will be amongst some of the major organisations that will offer their content over IPv6 for a 24-hour 'test drive'. The goal of the Test Drive Day is to motivate organizations across the industry – Internet service providers, hardware makers, operating system vendors and web companies – to prepare their services for IPv6 to ensure a successful transition as IPv4 addresses run out."

0 comments:

UPDATE: Phone Creeper v0.98! — PenTestIT: "Phone Creeper is a phone espionage suite It can be silently installed by just inserting an...

Phone Creeper v0.98!

Friday, January 21, 2011 Sensei Fedon 0 Comments

UPDATE: Phone Creeper v0.98! — PenTestIT:
"Phone Creeper is a phone espionage suite It can be silently installed by just inserting an sd card with the files below on it.
The program does not show up under installed programs or running programs and allows for a useful array or features. Phones running this software can be remotely controled by sms text messages. All commands will be silently received and deleted immediately and results will be issued back to sender.
Pre-configured settings can be added to the installer to have your own default password and phone number to receive live updates. By default, this program will silently reinstall itself even after a hard reset, if the memory card with these files is still in the device."

0 comments:

Since Facebook opened its API, its users have been able to access the social network via a number of different platforms and devices. If yo...

Want to access Facebook from within Gmail? Now you can.

Thursday, January 20, 2011 Sensei Fedon 0 Comments

Since Facebook opened its API, its users have been able to access the social network via a number of different platforms and devices.
If you are one of those Gmail users that constantly has one tab open to keep on top of the onrushing torrent of electronic mail you receive and another to check on the latest updates on your Facebook feed, you might be surprised to learn there is a way to integrate Facebook into your Gmail account by way of the Google Labs experiement “Add any gadget by URL”.
Just follow these easy steps (provided by Instant Fundas) to integrate Facebook from within your Gmail account:

0 comments:

Attack Surface Analyzer is the same tool used by Microsoft's internal product teams to catalogue changes made to the operating syste...

Ms Attack Surface Analyzer

Thursday, January 20, 2011 Sensei Fedon 0 Comments



Attack Surface Analyzer is the same tool used by Microsoft's internal product teams to catalogue changes made to the operating system by the installation of new software.

Attack Surface Analyzer takes a snapshot of your system state before and after the installation of product(s) and displays the changes to a number of key elements of the Windows attack surface.

This allows:
- Developers to view changes in the attack surface resulting from the introduction of their code on to the Windows platform
- IT Professionals to assess the aggregate Attack Surface change by the installation of an organization's line of business applications
- IT Security Auditors evaluate the risk of a particular piece of software installed on the Windows platform during threat risk reviews
- IT Security Incident Responders to gain a better understanding of the state of a systems security during investigations (if a baseline scan was taken of the system during the deployment phase)


Download details: Attack Surface Analyzer

0 comments:

m28sx.html - Twitter Search You might prefer to access the links in a controlled environment (i.e. VM box ) unless yo want to get pwned :)...

Twitter Worm : Watch out for "m28sx.html"

Thursday, January 20, 2011 Sensei Fedon 0 Comments

m28sx.html - Twitter Search

You might prefer to access the links in a controlled environment (i.e. VM box ) unless yo want to get pwned :)

0 comments:

This is a Mass clicking bot which uses proxies to click your adf.ly links for you. --Instructions-- 1. Run iView Fur U v3.exe 2. Load a...

adf.ly Mass Auto-clicking Bot v3.3

Wednesday, January 19, 2011 Sensei Fedon 0 Comments

This is a Mass clicking bot which uses proxies to click your adf.ly links for you.


--Instructions--
1. Run iView Fur U v3.exe
2. Load a list of mostly USA proxies in the form IP:Port or import from a .txt
3. Input your adf.ly link. (Remember to add the http://www part!)
3. Set the delay to 9 to 16 seconds to avoid ban.
4. Start the program.

DOWNLOAD LINK


Virus Total report
http://www.virustotal.com/file-scan/...827-1290158321

0 comments:

I was just checking out my posts on Techotoys and found that I haven't posted any tutorial on how to hack Website. There are many tool...

LOIC: Hack website using DOS- Denial Of Service Attack

Tuesday, January 18, 2011 Sensei Fedon 2 Comments

I was just checking out my posts on Techotoys and found that I haven't posted any tutorial on how to hack Website. There are many tools like SQLI Helper, Admin Finder and many ways like SQL Injection used to hack website or in proper words, deface a website. Today, I am posting a simple but useful website hacking software- LOIC (Low Orbit Ion Cannon). LOIC is used to hack website by implementing DOS or DDOS attack which temporarily takes a website down. I have provided link for software download... just read on.

Note: The article is meant for educational purpose only. I am not responsible for any act done by you. Remember, hacking website is legally offensive and can take you behind the bars.

2 comments:

Description: Havij is an automated SQL Injection tool that helps penetration testers to find and exploit SQL Injection vulnerabilities on ...

Havij v1.14 Advanced SQL Injection

Tuesday, January 18, 2011 Sensei Fedon 0 Comments

Havij is an automated SQL Injection tool that helps penetration testers to find and exploit SQL Injection vulnerabilities on a web page.
It can take advantage of a vulnerable web application. By using this software user can perform back-end database fingerprint, retrieve DBMS users and  password hashes, dump tables and columns, fetching data from the database, running SQL  statements and even accessing the underlying file system and executing commands on the  operating system.
The power of Havij that makes it different from similar tools is its injection methods. The success rate is more than 95% at injectiong vulnerable targets using Havij.
The user friendly GUI (Graphical User Interface) of Havij and automated settings and detections makes it easy to use for everyone even amateur users.

0 comments: