Archive for the ‘Windows Hacking’ Category

Edav3rs have just made the jailbreak community the perfect Christmas Gift!


The new Jailbreak applies to any iDevice that runs iOS from 7 to 7.0.4!



Let’s get away from the Hacky stuff for a moment. We have all seen Google Now with some great, innovative Features that could also be integrated to Artificial Intelligent Assistants like Siri.

Google Now uses Gmail Cards for Smart notifications like the one on the left.

And many people HAVE created such Assistants themselves. Including me.

Searching Google about how to use Notifications like Google Now was a Dead end. Especially when it came for the Gmail Cards.

So the idea was to Create that library myself, free and open source on Github, to access the Gmail Inbox and if there is any Gmail Card Available, convert it to Human-Readable Data.


Today I am going to show you how to bypass Web Application Firewalls (WAF). I will demonstrate from the Simpliest and most Basic Techniques to the Most Advanced ones!

NOTE: SQL Injection is not demonstrated here! If you don’t know SQL Injection, read this first…

What is WAF?

WAF stands for Web Application Firewall. It is widely used nowadays to detect and defend SQL Injections!

Let’s Begin!


Viruses have been a great daily problem on Windows (well, now on Mac OS X, too…).
Many people concern about them and freak out when they realise they got infected!


So, let me show you how to remove viruses from your machine in minutes (and how to protect yourself from future attacks):


Truecrypt has many great functions. I will explain one of the most interesting ones. Hiding a REAL Encrypted Volume into a Fake-Encrypted Volume. Let me explain the whole notion and give an example:

You create a volume encrypted by a password. In that volume you have some files encrypted. Inside that encrypted volume, you create another encrypted volume that contains the REALLY Encrypted Files. This means that you have two passwords.

Here is an example that can be implemented in real life:


A penetration test subjects a system or a range of systems to real life security tests. The benefit of a complete penetration suite compared to a normal vulnerability scan system is to reach beyond a vulnerability scan test and discover different weaknesses and perform a much more detailed analysis.

When performing a penetration test with the any Penetrator, you have the advantage of a wide range of integrated advanced utilities to do penetration testing. This includes extensive vulnerability scanning, launching of real exploits, buffer overflow attacks, a wide range of advanced utilities and Denial of Service.