Click here to Skip to main content
15,890,579 members
Everything / Hacking

Hacking

hacking

Great Reads

by Alexander Eremeev
The Windows kernel-hacking library and development framework written on C++17
by ASP.NET Community
suppose your url ishttp://www.xyz.com/defaultand some hacker try for hacking the website so type some script text on url
by _Ravikant Tiwari_
Code Injection - A Generic Approach for 32bit and 64bit Versions

Latest Articles

by Alexander Eremeev
The Windows kernel-hacking library and development framework written on C++17
by _Ravikant Tiwari_
Code Injection - A Generic Approach for 32bit and 64bit Versions
by ASP.NET Community
suppose your url ishttp://www.xyz.com/defaultand some hacker try for hacking the website so type some script text on url

All Articles

Sort by Updated

Hacking 

30 Jul 2023 by OriginalGriff
We do not condone, support, or assist in the production of malicious code in any way, form, or manner. This is a professional site for professional developers. If you want to know how to create such things, you need to visit a hacking site: but...
7 Dec 2022 by Member 15855006
Hi, I have this website which was made for the specific reason to try sql injection, hence why it is not parametrized or uses prepared statements. I am new to SQL injection and I am trying to see how I can maybe bypa What I have tried: I have...
5 Dec 2022 by Richard Deeming
Google will find plenty of examples of bypassing simple filters like this. For example: SQL Injection: Bypassing Common Filters - PortSwigger[^]: If you do need to introduce a string in to your attack payload, you can do this without needing to...
5 Dec 2022 by OriginalGriff
We do not condone, support, or assist in the production of malicious code in any way, form, or manner. This is a professional site for professional developers. If you want to know how to create such things, you need to visit a hacking site: but...
6 Nov 2022 by GinCanhViet
I just checked the Event Viewer and saw multiple requests trying to login my mssql server, with multiple random IDs and passwords (sa, mssql, hawai, etc). All from multiple IP addresses How can I prevent that or what can I do to protect my...
6 Nov 2022 by Richard Deeming
Make sure your firewall is configured to block access to the ports used by MS SQL Server - typically TCP 1433, 4022, 135, and 1434, and UDP 1434. If you really need to access it from outside of your network, then look at setting up a VPN, or...
16 Dec 2020 by Member 15022892
Compare this with yours though its the same code but I changed some variables. Make sure your are testing it on http(port 80) not https(port443) and be mindful of your indents too import netfilterqueue import scapy.all as scapy import re def...
16 Dec 2020 by Member 14056957
[+] Request >> Exception TypeError: "'module' object has no attribute '__getitem__'" in 'netfilterqueue.global_callback' ignored Exception IndexError: IndexError('Layer [TCP] not found',) in 'netfilterqueue.global_callback' ignored These two errors come while executing my python code given: ...
13 Jul 2020 by Member 14888563
hi I would change your if statement to: if scapy.Raw in scapy_packet and scapy.TCP in scapy_packet: instead of: if scapy_packet.haslayer(scapy.Raw):
16 May 2020 by RickZeeland
Maybe you can use Activator.CreateInstance. See: c# - Create an instance of a class from a string - Stack Overflow[^]
16 May 2020 by Richard MacCutchan
You probably need to initialise your handler by creating a List of the commands in the folder to speed lookup. Every time you read a command from the user you can check your list to see if it is valid. If so then build the actual command and...
10 Dec 2018 by Member 14084535
I have been trying to send a video to a small receiver using a series of high pitched noises that only the receiver can hear, but I can't find a way to convert the video into binary so that it is a text file. It is fine if it is in anything other than binary, but binary is preferred, as long as...
10 Dec 2018 by CPallini
Videos are stored in files. Files are binary (even text files are actually binary), so if you start with a video file (e.g. AVI, MP4) the you already have the binary data you need.
10 Dec 2018 by RickZeeland
Here is a collection of online tools: Convert Binary to Text - Online Binary Tools[^] But there will probably be a limit to the file length you can use ...
9 Dec 2018 by Member 14082835
SqlDateTime overflow.Will causes any issues ? If yes what are those ? is any kind of hacking or bypassing age restriction is possible in this case ? I don't have any knowledge on programming... What I have tried: We have a website with age restriction. If a user want to register in our...
9 Dec 2018 by OriginalGriff
The first thing you need to learn is to validate inputs: That means checking what the user typed to make sure it is correct, valid, and reasonable data. For a "year of birth" value, "0001" is not valid - it is not reasonable to assume that anyone born over 2,000 years ago is still alive! So read...
1 Nov 2018 by Alexander Eremeev
The Windows kernel-hacking library and development framework written on C++17
22 Feb 2018 by phil.o
Most of us are professional programmers, who will never assist in any form of malicious activity. If you are a professional and need this tool, then pay for it. If you are not a professional or cannot afford its price, then you have to find a product which is cheaper, or free.
22 Feb 2018 by Patrice T
Quote: Assistance to use olldbg bypass license verification Sorry, I don't help in such activity which is probably illegal.
7 Jul 2017 by Patrice T
No need to Repost same question again and again, it will not help. Quote: I'm developer of anti-cheat and I need to stop this application: I am sorry to say this, but it looks you are not qualified for this job. Preventing cheat by killing an app based on its name is idiot because cheater will...
25 Jun 2017 by Dave Kreskowiak
Nope. Not going to help you cheat.
23 Dec 2016 by Member 12919601
So I've been very paranoid that someone could be hacking into my phone and viewing deleted data and files by simply having my WhatsApp accountWhat I have tried:I've asked many tech people and they haven't replied yet so please guys reply asap!
23 Dec 2016 by Patrice T
Quote:So I've been very paranoid that someone could be hacking into my phone and viewing deleted data and files by simply having my WhatsApp accountHacking an account can't allow such things.If ever it was known that an app was allowing those things, it would be discussed on forums by users....
8 Dec 2016 by Dave Kreskowiak
Contact your cloud host provider and explain it to them.
4 Aug 2016 by Member 12361187
In my college , i was trying to open youtube , but i am able to open youtube. please , tell me how to solve this problem??What I have tried:I was searched in internet and tried , but no use. with some websites , i am opening youtube but i was not supposed to download them..
4 Aug 2016 by Patrice T
Simple, you just need to get the unlocking pass code from the NetAdmin.But you are a student and the filter is here to prevent what you want to do.And your question just confirmed that the filter is here for good reasons.
4 Aug 2016 by F-ES Sitecore
c0nTakt ur sys4dm1n bR0 n t311 m u w4Nt 4l1 teh int3RN3tz!!1
4 Aug 2016 by OriginalGriff
The chances are that the college has prohibited YouTube and other sites deliberately to prevent students from wasting bandwidth on movies when they should be using the internet for research.As such, we are not here to help you bypass that restriction: it is their internet connection, it is...
4 Apr 2016 by Member 11747036
Hello; I've been trying to get this code to work but all it does is give me weird numbers;#include #include #include using namespace std;int main(){ static int base = 0x00509B74; static int health = 0xF8; const int value =...
4 Apr 2016 by Jochen Arndt
You should check the return values of all API functions. It is very probable that one of them fails. If so, call GetLastError() to know why it fails.See also the OpenProcess function (Windows)[^]:Quote:To open a handle to another local process and obtain full access rights, you must enable...
25 Feb 2016 by OriginalGriff
Even if we had enough information to tell you, we wouldn't.We do not condone, support or assist in the production of malicious code in any way, form or manner. This is a professional site for professional developers. And trying to circumvent the site restrictions is certainly malicious, if not...
25 Nov 2015 by Devendra lodha
Thanks for the help.I have checked the vulnerabilities and removed all unwanted filed from the root directory and changed the all Access credentials of C Panel including FTP.Currently site is safe.Thanks.Have a good day.
18 Nov 2015 by AdamASPGeek
Just find yesterday post on social media, it is good explanation and maybe it will be helpful for you, just readt http://bit.ly/1lhLnHh
16 Nov 2015 by F-ES Sitecore
The main things to look for are SQL Injection attacks, and possibly XSS, as well as other issues like weak passwords etc. Ultimately it's a massive subject, far too big for here. If you're serious then get the code scanned using a tool like HP's Fortify, and there will be others. You can also...
16 Nov 2015 by Devendra lodha
Hi All,Hope you are doing well.I've suffering from hacker attack for one of my client website.Each and ever time anonymous user adding unwanted code and hyperlink on my website home page(default.aspx).These hyperlinks he added bottom of my default.aspx page.Due to above code web page...
16 Nov 2015 by Afzaal Ahmad Zeeshan
This is a very broad question. But, start by revoking any "write" access to your users, unless they are admin and then try to secure your control panel. Unless that is someone from within, he won't be able to access it. Also, try to see who makes changes, thus "source control" is always a...
28 Sep 2015 by F-ES Sitecore
Every scammer wants to do this as well, this is not an appropriate forum for such questions.
27 Feb 2015 by OriginalGriff
We do not condone, support or assist in the production of malicious code in any way, form or manner. This is a professional site for professional developers. If you want to know how to create such things, you need to visit a hacking site: but be sure to disable all firewalls and antivirus...
27 Feb 2015 by JeseemRazak619
My college is conducting a national level tech fest on next month.. pls provide me some ideas to conduct hacking . Sorry I know this is not the right . BT this is the only technical site am following so far. pls help me.....
10 Oct 2014 by E.F. Nijboer
The APK is signed with a private key to detect changes to the package and prevent installation when it is changed. This is for security reasons. Maybe you might be able to install it when you disable security options. Check settings for apps/security/dev options.Good luck!
10 Oct 2014 by ‫محم د‬‎
Hi I have an .apk file and I want to cange the data in that db file in assets folderBut when I extrack and change and agane compress file I cant install software !!whay ?how I can change data and file in apk files ??
7 Mar 2014 by _Ravikant Tiwari_
Code Injection - A Generic Approach for 32bit and 64bit Versions
4 Jan 2014 by sivamzcet
I need to put my windows 7 in virtual machine into sleep mode, shutdown and wakeup mode using php script.. is there any chances to do this??ThanksSiva
4 Jan 2014 by Christian Graus
What does this have to do with Linux, or MySQL ? PHP can't do this. It runs on the server, which I assume you don't want to put to sleep. It generates HTML, which runs in a browser. HTML and javascript cannot put a computer to sleep.
28 Dec 2013 by OriginalGriff
We do not support, assist or condone hacking in any form.This is a site for professional developers, not script kiddies.I suggest you go to a hacking site and ask there. But don't forget to disable your firewall and antivirus to show you trust them first...or they may not speak to you.
6 Dec 2013 by Member 10449498
I need to know how to break the password in this code, its just a test question nothing malicious.http://i.imgur.com/I4F5lK4.png[^]
6 Dec 2013 by Hamassss
Well since password is hashed with md5 and u already know it is first letter m + 1-4 digits it should be fast;[edit]Hacking code removed[/edit]
6 Dec 2013 by OriginalGriff
No.We do not assist with any form of hacking cracking or other activity that could be seen as malicious. And password hacking is that.Please do not ask again.
3 Dec 2013 by Mehdi Gholam
Yes it is possible through brute force but it is not probable.You are advised to stick to the RSA guidelines on publishing and securing keys and not deviate.
3 Dec 2013 by hamed.shams40
HiIs it possible for a cracker to gain D of a RSA Key (The Private Key) when he has it's Modulus, Exponent, P, Q, DP, DQ, InverseQ ?Means can these (Except of D) be shared with others ?Or All of them are as secure as D ?
13 Nov 2013 by thatraja
Another good reading oneSecurity: It’s Getting Worse[^]
13 Nov 2013 by Mehdi Gholam
Start here : ASP.NET web application security review: Do's & Don'ts[^]
13 Nov 2013 by Dycz
Hi everybody, I am currently working on a .NET portal and today my collegue and I stopped a moment to think about our portal security from hackers. I realized I am not prepared enough to discuss this issue professionally, so I was wondering... Is there any good reading you'd suggest on...
16 Oct 2013 by Sergey Alexandrovich Kryukov
First of all, you should understand that the best topic is the one you create for yourself. And the best programming work is the one you would love to use yourself. You only need to get a good idea on how to generate pretty good ideas. If this is does not have to be an idea of a century, this is...