Kon-Boot Lets You Bypass Logon for Windows and Linux   http://www.piotrbania.com/all/kon-boot/   Kon-Boot is an prototype piece of so...
                                Read More 
                                
Home / Archive for August 2014
MySQL Error Based Injection Explained
  We have already covered on Basics of SQL Injections with UNION Technique. You can check my POST here http://www.madleets.com/Thread-sql-in...
                                Read More 
                                
How to hack website using sql injection (waf bypass)
 Note: Before starting this topic, I want to clarify that I won't be  covering on basic SQL Injection attacks. This article is meant for...
                                Read More 
                                
How to scan subdomains
         knock  Knock Subdomain Scan     Introduction Knock allows you to scan subdomains, Transfer Zone discovery, Wildcard testing with in...
                                Read More 
                                
How To Create Virus Without Any Programming Knowledge
Hi To All The Mindbenders, Tool Name:-  Sonic Bat Batch File Virus Maker This program creates batch (.bat) viruses and has varied options to...
                                Read More 
                                
Unlock almost all Android device pattern Lock
Hi To All Frinds, One  of the most common and popular lock in android phones is pattern lock.  we know that we have 3 attempts to open the l...
                                Read More 
                                
Subscribe to:
Comments
                            (
                            Atom
                            )