ဒီစာအုပ္ေလးက ေတာ. ဟက္ကင္းမွာ မ၇ွိမျဖစ္ Dork ေ၇းသားနည္း အေျခ ခံ စာ အုပ္ေလး ပါ
Google Search Engine ကိုအသံုး ခ်ျပီး ကိုယ္လိုခ်င္တာ ကိ ု၇ွာမယ္ ဟက္မယ္ေပါ .ဗ်ာ
Download
Showing posts with label Hacking. Show all posts
Showing posts with label Hacking. Show all posts
Monday, May 27, 2013
Hacking 1000
ဒီ ဟာေလး ကေတာ. အေျခ ေလာက္ ၇ွိျပီးမွ ကိုေလ.လာ သင္.တဲ. ဟာေလး ပါ
အထဲမွာ အေျကာင္ းအ၇ာ ေတြ ေတာ္ေတာ္ မ်ားမ်ား ပါတယ္ ဗ်
Download
အထဲမွာ အေျကာင္ းအ၇ာ ေတြ ေတာ္ေတာ္ မ်ားမ်ား ပါတယ္ ဗ်
Download
TheHacker'sHandbook PDF
ဒီစာအုပ္ေလး ကေတာ. ဟက္ကာျဖစ္ခ်င္တဲ. သူတုိင္း ဖတ္သင္. တဲ.စာအုပ္ေလး ပါ
ဟက္ကင္းကိ ုစေလ.လာေနတဲ. သူေတြ လညး္ ဖတ္အသင္.ဆံုးေပါ .
Cythosia Bot PDF
Cythosia Bot ဆိုတဲ. အေျကာင္းကို ကုိ Emc Phyo Lay ေ၇းေပးထားတာ ပါ
ဖတ္ ျကည္. ပါ ဗဟုသုတ ၇ တာေပါ.
Download
ဖတ္ ျကည္. ပါ ဗဟုသုတ ၇ တာေပါ.
Download
Coding for Penetration Testers
Coding for Penetration Testers ဆိုတဲ. စာအုပ္ေလး ပါ
အေနာ္လညး္ မဖတ္ ဘူးဘူး ဖတ္လို.ေကာင္း၇င္ အေျကာင္းျပန္ :D
Download
အေနာ္လညး္ မဖတ္ ဘူးဘူး ဖတ္လို.ေကာင္း၇င္ အေျကာင္းျပန္ :D
Download
Contains Yummy PDFs for Web Hacking!! Here's the list,
Credit to Xero Mhu!!!!
--► Contains Yummy PDFs for Web Hacking!!
Here's the list,
1. Ghost in the Wires By Kevin Mitnick.pdf (3.88MB)
2. Hacking The Art Of Exploitation.pdf (4.04MB)
3. The Art of Intrusion-The Real Stories Behind the Exploits of Hackers Intruders and Deceivers (Wiley- Feb 2005).pdf (3.07MB)
4. The Anarchist Cookbook - William Powell (1971) - DiOS.pdf (14.30MB)
5. The Art of Deception by Kevin Mitnick.pdf (5.19MB)
6. We_Are_Anonymous_Inside_the_Hacker_World_of_LulzSe.pdf (1.35MB)
ကဲ။ ကိုဇီးရိုးေရ။ အစ္ကိုေျပာတဲ့ အတိုင္း ျပန္ရွဲလိုက္ျပီေနာ္။ :D
Download For 4.The Anarchist Cookbook
Download
--► Contains Yummy PDFs for Web Hacking!!
Here's the list,
1. Ghost in the Wires By Kevin Mitnick.pdf (3.88MB)
2. Hacking The Art Of Exploitation.pdf (4.04MB)
3. The Art of Intrusion-The Real Stories Behind the Exploits of Hackers Intruders and Deceivers (Wiley- Feb 2005).pdf (3.07MB)
4. The Anarchist Cookbook - William Powell (1971) - DiOS.pdf (14.30MB)
5. The Art of Deception by Kevin Mitnick.pdf (5.19MB)
6. We_Are_Anonymous_Inside_the_Hacker_World_of_LulzSe.pdf (1.35MB)
ကဲ။ ကိုဇီးရိုးေရ။ အစ္ကိုေျပာတဲ့ အတိုင္း ျပန္ရွဲလိုက္ျပီေနာ္။ :D
Download For 4.The Anarchist Cookbook
Download
CERTIFIED ETHICAL HACKER EBOOKS
CERTIFIED ETHICAL HACKER EBOOKS
စာအုပ္ ေပါင္း ၇၀ ပါတယ္။
ဟက္ကင္းေလ့လာသူမ်ားအတြက္ အေထာက္အကူျပဳမဲ့စာအုပ္ေတြစုျပီးတင္ေပးထားပါတယ္။ပါဝင္တဲ့စာအုပ္ေတြကေတာ့
ေအာက္မွာျပထားပါတယ္။
1: Student Introduction
2: Introduction to Ethical Hacking
3: Hacking Laws
4: Footprinting
5: Google Hacking
6: Scanning
7: Enumeration
8: System Hacking
9: Trojans and Backdoors
10: Viruses and Worms
11: Sniffers
12: Social Engineering
13: Phishing
14: Hacking Email Accounts
15: Denial of Service
16: Session Hijacking
17: Hacking Webservers
18: Web Application Vulnerabilities
19: Web based Password Cracking Techniques
20: SQL Injection
21: Hacking Wireless Networks
22: Physical Security
23: Linux Hacking
24: Evading IDS Firewall and Honeypot
25: Buffer Overflows
26: Cryptography
27: Penetration Testing
28: Writing Virus Codes
29: Assembly Language Tutorial
30: Exploit Writing 1
31: Exploit Writing 2
32: Exploit Writing 3
33: Reverse Engineering Techniques
34: MAC OS X Hacking
35: Hacking Routers, Cable Modems and Firewalls
36: Hacking Mobile Phones, PDA and Handheld Devices
37: Bluetooth Hacking
38: VoIP Hacking
39: RFID Hacking
40: Spamming
41: Hacking USB Devices
42: Hacking Database Servers
43: Cyber Warfare- Hacking Al-Qaida and Terrorism
44: Internet Content Filtering Techniques
45: Privacy on the Internet
46: Securing Laptop Computers
47: Spying Technologies
48: Corporate Espionage by Insiders
49: Creating Security Policies
50: Software Piracy and W
51: Hacking and Cheating Online Games
52: Hacking RSS and Atom
53: Hacking Web Browsers
54: Proxy Server Technologies
55: Preventing Data Loss
56: Hacking Global Positioning System
57: Computer Forensics and Incident Handling
58: Credit Card Frauds
59: How to Steal Passwords
60: Firewall Technologies
61: Threats and Countermeasures
62: Case Studies
63: Botnets
64: Economic Espionage
65: Patch Management
67: Security Convergence
68: Identifying the Terrorists
69: prova 312-50
70: CEH - Classroom Lab Setup v6
တို႕ပါဝင္ပါတယ္။ ဖိုင္ဆိုဒ္ကေတာ့ 268 MB ရိွပါတယ္။ က်ေနာ္ ၂ ပိုင္း ခြဲ ထားပါတယ္။
http://www.mgnyinyi.com ကဟာေလးပါ ေနာ္ :D
password က Maya Badmash ပါ
Download
Mediafire
part1 part2
Dropbox
part1 part2
Tusfiles
part1 part2
Solidfiles
part1 part2
Box
part1 part2
Copy
part1 part2
ဟက္ကင္းေလ့လာသူမ်ားအတြက္ အေထာက္အကူျပဳမဲ့စာအုပ္ေတြစုျပီးတင္ေပးထားပါတယ္။ပါဝင္တဲ့စာအုပ္ေတြကေတာ့
ေအာက္မွာျပထားပါတယ္။
1: Student Introduction
2: Introduction to Ethical Hacking
3: Hacking Laws
4: Footprinting
5: Google Hacking
6: Scanning
7: Enumeration
8: System Hacking
9: Trojans and Backdoors
10: Viruses and Worms
11: Sniffers
12: Social Engineering
13: Phishing
14: Hacking Email Accounts
15: Denial of Service
16: Session Hijacking
17: Hacking Webservers
18: Web Application Vulnerabilities
19: Web based Password Cracking Techniques
20: SQL Injection
21: Hacking Wireless Networks
22: Physical Security
23: Linux Hacking
24: Evading IDS Firewall and Honeypot
25: Buffer Overflows
26: Cryptography
27: Penetration Testing
28: Writing Virus Codes
29: Assembly Language Tutorial
30: Exploit Writing 1
31: Exploit Writing 2
32: Exploit Writing 3
33: Reverse Engineering Techniques
34: MAC OS X Hacking
35: Hacking Routers, Cable Modems and Firewalls
36: Hacking Mobile Phones, PDA and Handheld Devices
37: Bluetooth Hacking
38: VoIP Hacking
39: RFID Hacking
40: Spamming
41: Hacking USB Devices
42: Hacking Database Servers
43: Cyber Warfare- Hacking Al-Qaida and Terrorism
44: Internet Content Filtering Techniques
45: Privacy on the Internet
46: Securing Laptop Computers
47: Spying Technologies
48: Corporate Espionage by Insiders
49: Creating Security Policies
50: Software Piracy and W
51: Hacking and Cheating Online Games
52: Hacking RSS and Atom
53: Hacking Web Browsers
54: Proxy Server Technologies
55: Preventing Data Loss
56: Hacking Global Positioning System
57: Computer Forensics and Incident Handling
58: Credit Card Frauds
59: How to Steal Passwords
60: Firewall Technologies
61: Threats and Countermeasures
62: Case Studies
63: Botnets
64: Economic Espionage
65: Patch Management
67: Security Convergence
68: Identifying the Terrorists
69: prova 312-50
70: CEH - Classroom Lab Setup v6
တို႕ပါဝင္ပါတယ္။ ဖိုင္ဆိုဒ္ကေတာ့ 268 MB ရိွပါတယ္။ က်ေနာ္ ၂ ပိုင္း ခြဲ ထားပါတယ္။
http://www.mgnyinyi.com ကဟာေလးပါ ေနာ္ :D
password က Maya Badmash ပါ
Download
Mediafire
part1 part2
Dropbox
part1 part2
Tusfiles
part1 part2
Solidfiles
part1 part2
Box
part1 part2
Copy
part1 part2
Sunday, May 26, 2013
Havij 1.16 Pro Portable Cracked by Service Manual { AoRE Team }
ဒါေလး ကေတာ. sql injection မွာ သံုးတဲ. ဟာေလးပါ ဟက္ကင္း စေလ.လာခ်င္း သူေတြ သံုးေနျက ဟာေလးပါ သူက အသံုး လညး္ ၀င္ပါတယ္ သံုး ကတာ လြယ္လုိ. ေပါ.
Cracked by Service Manual { AoRE Team } က လုပ္ထားတဲ. ဟာေလး ပါ
Havij အမ်ား စု ကအတု ျဖစ္ျပီး Full version မဟုတ္ ဘူး Full vErsion မ ဟုတ္၇င္ function ေတြ အကုန္သံုးလုိ .မ၇ဘူးေလ
ဟက္ကင္းေလ.လာေနတဲ. သူေတြ ကို ျမဴဆြယ္ ျပီး အသံုး ခ် ျကပါတယ္
အထဲ မွာ RAt ,Keylogger ေတြ ပါတတ္ပါတယ္
တကယ္ ဟက္ကာ ျဖစ္ ခ်င္၇င္တဲ. tools ေတြနဲ. ကင္းကင္းေနေပါ
Tools ေတြ ကို ကိုယ္တိုင္ေ၇းျပီးသံုးတာတို.. ဥပမာ sqlmap တို. ပါတုိ. သံုးေပါ .
ေနာက္မွ Sql map အေျကာင္း သိသေလာက္ေလး ေ၇းေပးပါမယ္ ေမွ်ာ္ :D
ေမ.လုိ. သူ ကအျပင္ကို ထုတ္ျပီး Run as Administrator နဲ. run မွ အဆင္ေျပတယ္ ဗ် Crack Version ဆိုေတာ.လညး္
Download
Cracked by Service Manual { AoRE Team } က လုပ္ထားတဲ. ဟာေလး ပါ
Havij အမ်ား စု ကအတု ျဖစ္ျပီး Full version မဟုတ္ ဘူး Full vErsion မ ဟုတ္၇င္ function ေတြ အကုန္သံုးလုိ .မ၇ဘူးေလ
ဟက္ကင္းေလ.လာေနတဲ. သူေတြ ကို ျမဴဆြယ္ ျပီး အသံုး ခ် ျကပါတယ္
အထဲ မွာ RAt ,Keylogger ေတြ ပါတတ္ပါတယ္
တကယ္ ဟက္ကာ ျဖစ္ ခ်င္၇င္တဲ. tools ေတြနဲ. ကင္းကင္းေနေပါ
Tools ေတြ ကို ကိုယ္တိုင္ေ၇းျပီးသံုးတာတို.. ဥပမာ sqlmap တို. ပါတုိ. သံုးေပါ .
ေနာက္မွ Sql map အေျကာင္း သိသေလာက္ေလး ေ၇းေပးပါမယ္ ေမွ်ာ္ :D
ေမ.လုိ. သူ ကအျပင္ကို ထုတ္ျပီး Run as Administrator နဲ. run မွ အဆင္ေျပတယ္ ဗ် Crack Version ဆိုေတာ.လညး္
Download
Saturday, May 25, 2013
An Introduction To Keylogger, RATS And Malware
Metasploit The Penetration Tester Guide
ဒီစာအုပ္ေလး ကေတာ. Security သမားေတြ ေကာ ဟက္ကင္းေလ.လာ ေနတဲ. သူေတြ ေကာ ဖတ္သင္.တဲ. စာအုပ္ေလးပါ
Metasploit The Penetration Tester Guide
Download
Metasploit The Penetration Tester Guide
Download
Web Cruiser Latest Version Cracked (Vulnerability Scanner)
Web Developer ေတြ နဲ. Hacker သံုးေနျက လညး္ ျဖစ္တဲ. ဟာေလးပါ
Web Developer ေတြ ကသူတုိ. ဆိုက္ဒ္ေတြ ကို Security ေကာင္းမေကာင္း စစ္ ျကတယ္
Hacker ေတြ က သူတို. ေဖါက္ ခ်င္တဲ. ဆိုက္ဒ္ကို ေပါက္မေပါက္ စစ္ ျက ပါတယ္ Vulnerability Scanner တစ္ခုခု နဲ.
It can support scanning website as well as POC (Proof of concept) for web vulnerabilities: SQL Injection, Cross Site Scripting, XPath Injection etc. So, WebCruiser is also an automatic SQL injection tool, an XPath injection tool, and a Cross Site Scripting tool!
Key Features:
* Crawler(Site Directories And Files);
* Vulnerability Scanner: SQL Injection, Cross Site Scripting, XPath Injection etc.;
* SQL Injection Scanner;
* SQL Injection Tool: GET/Post/Cookie Injection POC(Proof of Concept);
* SQL Injection for SQL Server: PlainText/Union/Blind Injection;
* SQL Injection for MySQL: PlainText/Union/Blind Injection;
* SQL Injection for Oracle: PlainText/Union/Blind/CrossSite Injection;
* SQL Injection for DB2: Union/Blind Injection;
* SQL Injection for Access: Union/Blind Injection;
* Post Data Resend;
* Cross Site Scripting Scanner and POC;
* XPath Injection Scanner and POC;
* Auto Get Cookie From Web Browser For Authentication;
* Report Output.
Download
Serial Number:
User: WWW
Serial: 3E08-3C1B-CAFB-321F
Friday, May 24, 2013
What is DDOS
ဒီတစ္ခါ ဟက္ကင္းေလ. လာေနတဲ. ညီကို ေတြ မသိမျဖစ္ သိသင္.တဲ. DDOS အေျကာင္း
စာအုပ္ေလး တင္ေပးခ်င္ပါတယ္
အထဲ မွာ ကbot လုပ္နည္း irc bot လုပ္နည္း DDOS အေျကာင္းအ ေျခ ခံေတြ အကုန္လံုးနည္းပါးပါ ပါ တယ္
ေလ.လာသင္.တဲ. စာအုပ္တစ္အုပ္လည္း ျဖစ္ပါတယ္
ဒီစာအုပ္ကို ေတာ.
ကိုဂ်ီတုန္း ၅ ၇က္ေလာက္အခ်ိန္ ကုန္ခံျပီး ေ၇းထားတာပါတဲ.
Download
http://adf.ly/PTff2
စာအုပ္ေလး တင္ေပးခ်င္ပါတယ္
အထဲ မွာ ကbot လုပ္နည္း irc bot လုပ္နည္း DDOS အေျကာင္းအ ေျခ ခံေတြ အကုန္လံုးနည္းပါးပါ ပါ တယ္
ေလ.လာသင္.တဲ. စာအုပ္တစ္အုပ္လည္း ျဖစ္ပါတယ္
ဒီစာအုပ္ကို ေတာ.
ကိုဂ်ီတုန္း ၅ ၇က္ေလာက္အခ်ိန္ ကုန္ခံျပီး ေ၇းထားတာပါတဲ.
Download
http://adf.ly/PTff2
Subscribe to:
Posts (Atom)