Tag Archive | "cracking"


16 August 2010 | 22,830 views

RSMangler – Keyword Based Wordlist Generator For Bruteforcing

RSMangler will take a word list and perform various manipulations on it similar to those done by John the Ripper with a few extras. It goes along well with our previous post on Password Cracking Wordlists and Tools for Brute Forcing. There are other options too like Wyd – Automated Password Profiling Tool, which is [...]

Continue Reading


21 October 2009 | 33,145 views

Retarded E-mails – Carding, Coins, Bombs & More!

Ah it’s that time of the year again when all the back to skoolers have some mad l33t knowledge and wanna h4x0r the planet or something. Hmmm website hacking, sounds simple eh? thriller wrote: hai i would like to know website hacking how?……… sedn to my mail Ok I’m following up up to the exploding [...]

Continue Reading


19 May 2009 | 10,465 views

Retarded E-mails – Brute Force, Change School Grades, Hack US Military & MORE

It’s been a few months since the last Retard Update, and it’s definitely been slower since I posted the disclaimer and link on the Contact Page. There have been some weird ones, one worders, one liners and stuff in foreign languages. Anyway let’s get started with a classic ‘script-kiddy I can’t operate my computer‘ type [...]

Continue Reading


24 December 2008 | 7,142 views

Retarded E-mails – ATM Cards, Very Important Details, VOIP Testing Tools and MORE!

Merry xmas everyone, here is the year end summary of retarded e-mails. We have had a splendid amount of retarded comments recently too and some decent e-mails too (but all asking the same thing “How do I start learning to be a hacker, what should I do, what should I read etc..I’ll write a post [...]

Continue Reading


04 December 2008 | 63,349 views

Retarded E-mails – Crack Hotmail? Hack Facebook? Boyfriend Cheating?

I get a lot of these e-mails, sometimes I receive them almost every day. I had a thought the other day, it might be amusing if I shared them with you guys. So I’ll post them up every time I receive 2-3. I’ve had a LOT of these kind of e-mails and some spooky ones [...]

Continue Reading


26 June 2008 | 41,043 views

Hackers Crack London Tube Oyster Card

It just goes to show, having an aluminium lined wallet could really be useful! Hackers in the Netherlands found they could clone an access card using the Mifare chip, after that they traveled to London to try their technique out on the Oyster card (used on the London Underground), which uses the same chip. It [...]

Continue Reading


05 September 2007 | 6,520 views

ServiceCapture – HTTP Traffic Capture for Debugging Flash

ServiceCapture runs on your pc and captures all HTTP traffic sent from your browser or IDE. It is designed to help Rich Internet Application(RIA) developers in the debugging, analysis, and testing of their applications. You can download the free trial below. After it is installed and running, visit the Macromedia Exchange with your web browser [...]

Continue Reading


20 August 2007 | 19,497 views

Immunity Debugger v1.0 (immdbg) Release – Download it Now!

After almost a year of intensive development and internal use, Immunity (The guys who bought us CANVAS) has announced the public release of Immunity Debugger v1.0. The main objective for this tool was to combine the best of commandline based and GUI based debuggers. Immunity Debugger is a powerful new way to write exploits, analyze [...]

Continue Reading


08 June 2007 | 19,014 views

yahoo password grabber

Phishers never give up, password theft protected pages? But what about password protected messenger application… No more to say check it out (lame)… Link :: www.ourgodfather.com Another Yahoo anti-phising (did you know?): zahoo.com (also yahoo, for the ones that have inverted keyboard y-z)

Continue Reading


29 December 2006 | 84,239 views

GoldenEye (GoldEye) Password Cracker – Download goldeye.zip or goldeneye.zip

GoldenEye is a brute-force hacking program and was written for web-masters to test the security of their own sites. This is an oldskool file, a lot of people are still looking for this. It should not be use by others to hack sites – this would be illegal! Under no circumstances should the author or [...]

Continue Reading


Popular Tags

computer-security · darknet · exploits · google · hacking · hacking-networks · hacking-websites · hacking-windows · hacking tool · Hacking Tools · Information-Security · information gathering · malware · microsoft · network-security · Network Hacking · Password Cracking · penetration-testing · Phishing · Privacy · Python · scammers · Security · Security Software · spam · spammers · sql-injection · trojan · trojans · virus · viruses · vulnerabilities · web-application-security · web-security · Web Hacking · windows · windows-security · Windows Hacking · worms · XSS ·