... net.sf.xss-html-filter xss-html-filter 1.1 xss-html-filter releases xss-html-filter Releases Repository http://xss-html-filter.sf.net/releases/ Computer Hacks and tricks: May 2014

Friday, May 23, 2014

I am giving away Fedoracoins!

I have a decent amount of Fedoracoins and if you want to get some send me your wallet address sen it to this email you can email me at: computersrule12@gmail.com , if you don't have a Fedoracoin wallet yet you can download one from here: http://coin-ads.com/BvezyU I would appreciate it if you like this article after I send you some.

Wednesday, May 21, 2014

Top three books to learn to Hack

Kali Linux although it sounds like slang for California, Kali through the 

phases of the penetration testing life cycle; one major tool from each phase

 is explained. The book culminates with a chapter on reporting that will 
provide examples of documents used prior to, during and after the pen test. To buy it click the image on the right and to download the pdf click the download button below. 

This guide will benefit information security professionals of all levels, hackers, systems administrators, network administrators, and beginning and intermediate professional pen testers, as well as students majoring in information security.

or download here: http://coin-ads.com/vLdVpD

So there is an amazing book on hacking in assembly and C it come with a live cd it is called Hacking the art of penetration it can be purchased by searching for it on Google or you can download the ebook and the live CD below the CD download is a torrent you will need a torrent client to download it.

 Torrent for live CD


Python Programming for Hackers and Reverse Engineers (Download)

Python is fast becoming the programming language of choice for hackers, reverse engineers, and software testers because it’s easy to write quickly, and it has the low-level support and libraries that make hackers happy. But until now, there has been no real manual on how to use Python for a variety of hacking tasks. You had to dig through forum posts and man pages, endlessly tweaking your own code to get everything working. Not anymore.
ghp1Gray Hat Python explains the concepts behind hacking tools and techniques like debuggers, trojans, fuzzers, and emulators. But author Justin Seitz goes beyond theory, showing you how to harness existing Python-based security tools – and how to build your own when the pre-built ones won’t cut it.
You’ll learn how to:
·        Automate tedious reversing and security tasks
·        Design and program your own debugger
·        Learn how to fuzz Windows drivers and create powerful fuzzers from scratch
·        Have fun with code and library injection, soft and hard hooking techniques, and other software trickery
·        Sniff secure traffic out of an encrypted web browser session
·        Use PyDBG, Immunity Debugger, Sulley, IDAPython, PyEMU, and more

Most of the worlds best hackers are using python to do their handiwork so I would suggest that you learn this language to buy the book click the image above to download the pdf click the download button down below.

Hope you guys liked this post please like subscribe and follow

Tuesday, May 20, 2014

I am thinking of writing a book let me know what you think.

Hey guys, I am writing a book on tutorials on hacking and computers. If you have any ideas that I should know about do not hesitate to email me at computersrule12@gmail.com . If you want to write part of it contact me if you are interested in donating I would be willing to give back a share of the profits in appreciation. You can donate by clicking the donate button on the right side of the page if you want me to write it but don't want to invest please hit that +1  if you support it anyways thanks.

Free bitcoins

Hey guys sorry for the wait I am busy with exams, but I wanted to give you guys something in the meantime so here it is. Bitcoins if you haven't heard of them yet are a crypto currency most people mine these with miners you used to be able to mine them with GPUs but it is no longer profitable. The good thing is they are still worth a decent amount of money I believe currently it is a couple hundred dollars per bitcoin. This site will give you parts of these coins. If you want to get started just click the link below to get started.



Friday, May 16, 2014

THS side of the story by GalaxyNinja from Top-Hat-Sec

Hey there, this is GalaxyNinja from Top-Hat-Sec.
I have been asked to provide my side of the D4RkNiK0l4s story and was asked a few questions, which I have answered here.

The question you have to ask, is this: 
Is there any reason for an admin or owner to betray his Black-Hat-Sec forum members by compromising his own forum, taking the hashes, cracking the hashes and logging into the Top-Hat-Sec forum with one of His member's username and cracked password?

If the answer is Yes there is a reason to betray the trust of all your forum members, then you will fit right in at BHS.

Because this is what D4RkNiK0l4s did to Darkc0d3, a member on our forum and at one point, an admin on BHS.
The proof is in the wording and language that D4RkNiK0l4s used when he compromised Darkc0d3's account, and also in the email he changed Darkc0d3's account to at the time of the incident.

When our forum is back up, I will be able to grab that proof and you can see with your own eyes.

D4RkNiK0l4s (who is Male in answer to a question about his gender) registered July 30th 2013.
We have reason to believe that he registered under another account in April 2013 and was last on that account June 1st 2013. We gifted him a Premium THS Member on September 7, 2013.

The situation was this, he had release Hades back in August with our program that he did not pay for, and with some of our member only scripts.
We explained to N1k0ls that hey, we aren't sure how you got these programs/scripts, but they are only for members. 
Can you please take them off your OS? 
He was very polite and did so. Later in August, he asked me (and I think R4v3n as well) to check his OS and make sure there weren't scripts that shouldn't be there:

I had issues with the size, but after a while did discover that it had some scripts that were members only.

I would like to make a comment at this point. We understand that people share things with their real friends. It is okay, we expect this. In fact, if someone orders one of our courses, their close friends and family members only have to pay for testing ($15 or $20) if they want a certificate; they do not have to pay for the course, and only have to pay for testing because it takes time and money to do the test and send the certificate. In some cases the certificate shipping costs almost the same as the testing fee.
The issue is in Redistributing the scripts etc, either for a cost or without permission of the owners. 

Then on September 7th, the following took place (I wish we had the original posts, but there were links so someone erased them, which sucks because it proved our point even more :-(  )
Someone was harassing NiK0l4s for his OS (he was having trouble uploading it), so I told them, hey back off! He is doing this on his own time for people and if you dont like waiting you can make your own Distro (or something like that).

As you can see, he was very thankful and shortly afterwards said he would just post the distros in our members section so he wouldnt' have to erase the scripts.

I told him that once he became a paid member that he would be able to see stuff, but to hold on because I was checking on something (was asking R4v3n about giving him a free membership, which we do sometimes). 
All of a sudden he became panicked and started posting on the forum that the OS wasn't going to be available because he didn't have any money etc.
I had a few people offering to pay membership and before I could respond to the post, Th3Cr4ck3r bought a gift card for him (but I had already given N1K0l4s free membership at this point, so to my knowledge, he still has the giftcard code). 

And That is how N1K0l4s became a member! 

In response to him saying that we were just trying to get rich off of him? His OS actually overshadowed Our OS, created by Th3Cr4ck3r, which we were trying to release at the time.
I was not very happy about that, but just let it be as it was making N1K0l4s happy to post his OS's.

We also did not DDoS his Free Hosted site... he just didn't have enough bandwidth to keep it up so it kept going down. 

Darkc0d3 was not there to spy on his forum. Darkc0d3 had asked me permission to be an admin on N1K0l4's site because it was a great opportunity and I said "Sure, and if you can, please watch out for our stuff on his site, and we will watch out for his stuff on our site".  And that I didn't approve of the way N1K0l4s had put his forum up or copied the THS format and some of the boards, but that I wished him all the best (before he betrayed us). 

It is because of his childish behavior, that we had to close public registration. 

Since then, NiK0l4s has taken his article down claiming that he was moving on.
So we will move on too... 
We have a bunch of new stuff in the works.
We are changing hosting providers, we have a cool new website, a wiki and a scholarship fund for people who want to take our courses but are not able to for whatever reason.

Have a great day!

Thursday, May 1, 2014

How to Hide the Drives in your Computer

1. Go to start--->run.Type regedit.Now go to:
2. Now in the right pane
create a new DWORD item and name
it NoDrives (it is case sensitive).
3. Now modify it's value and set it to
3FFFFFF (Hexadecimal).
4. Now restart your computer.
5. So, now when you click on My
Computer, no drives will be shown
Note: To enable display of drives in My
Computer, simply delete this DWORD
item that you created.Again restart
your computer.You can now see all
the drives again.

Please like subscribe and follow