Text Box: + Downloads +
 

Text Box: + About Me  +
 

Text Box: + HOME +
 
Text Box: + S.Security +
 

Text Box: + Hacking +
 

 

 

 

 

+ Hacking Stuff +

[ + Ðëpëñdïñg öñ whömë ÿöü ä§k, hä©k뮧 ä®ë hä®ml맧 p®äñk§t뮧, ©ü®ïöü§ të©hïë§, ñößël f®ëëdöm fïghtë® ö® däñgë®öü§lÿ üñp®ëdï©täßlë ©ÿßë®-të®®ö®ï§t§. ħ thë wö®ld göë§ öñlïñë, hä©k뮧' pötëñtïäl ïñflüëñce -äñd mëñä©ë-g®öw§.+]

+ Cool Links +

+ Cracking Software +

 + Hackers. COM +

 + 2600.com +

Definition of HACKING :  Gaining unauthorized access to a particular security system is called as hacking. Literally hacking means cutting down and conventionally it means breakdown. Cutting down and break down of a certain security system to get required information. Here information means manipulated data that is useful to run a security system.

+ Altalavista +

    + Hacked +
    + virus +
    + Sub7 +
+ BugMafia +

+ Hacking +

+ Euyulio +
+ Underground +
+ hackzone +

+ hope +
Breaking out of restricted Win95 Environments by BioMenace
Explanation of the MSIE 3.0 bug by Goat
Hacking Webpages by Goat
Turning your Mail Bomber into a ICQ Pager Bomber by Sandman
The Ultimate Guide Passwd Files by Goat
  Exploiting Net Administration Cgi's like nethosting.com
IRC-Social Engineering by Optik Lenz
Hacking Servers 101 by ChronicK  
How to Get a *Good* Shell Account Part 2
How to Get a *Good* Shell Account Part 1
Guide To (mostly) Harmless Hacking ; Linux
How to nuke offensive Web sites
How get email spammers kicked off their ISPs
Good Background on hacking Part 1
Good Background on hacking Part 2
Have a shell in 24hours after reading this
TCP Port Stealth Scanning
The Hotmail Hack by Digital
Getting URLs through Telnet by PLahZma
Tracing an e-mail message
Guide to mostly harmless hacking
List of Anonyomous E-mail Servers
Simple Active Attack Against TCP
Get into someone else work space in Win95 by Sub-Atomic

+ Cracking +

Introduction to Win95 Cracking
How To Disassemble A Windows Program(part 1)
How To Disassemble A Windows Program(part 2)
Odin's Cracking Tutorial
Qapla's cracking tutorial, version 0.1 rel 970209
raZZia's Tutorial on Key Generators (01-97)
  razzia's tutorial for vb cracking
How to undongle by +Xoanon
The flags-faking approach
TimeLOCK DLL "a cracking approach"
Softice CHAPTER 1 - Introduction
Softice CHAPTER 2 - Getting Started
Softice CHAPTER 3 - Debugging In 30 Minutes
Softice CHAPTER 4 - Using Break Point Commands
Softice CHAPTER 5 - Using Other Commands
Softice CHAPTER 6 - Soft-ICE Initialization Options
Softice CHAPTER 7 - Symbolic and Source Level Debugging
Softice CHAPTER 8 - Expanded Memory Support
Softice CHAPTER 9 - Back Trace Ranges
Softice CHAPTER 10 - Using Soft-ICE with MagicCV or MagicCVW
Softice CHAPTER 11 - Advanced Features
SoftICE Tutorial
Using Breakpoints

+ Phreaking +

Get ca$h, from the fon company free by ChronicK
How to build and operate my DeLier Box by PsycðPyrð
A Newbies guide to Phreaking in the 90's
What do all the colored boxes do?
What is an ANAC number?
What is a Black Box?
What is a Blue Box?
What is Caller-ID?
What is a CNA number?
  What are the DTMF frequencies?  
What are all of the * (LASS) codes? Example: *70
What is a loop?
What is a PBX?
What is a Red Box?
What is a ringback number?
What is scanning?
What is a VMB?

 

 

Text Box: + Contact +