passion for hacccken anyone wanna be my mentor


im totally unknow with hacking !
i dont even know very well what i can do with my laptop !
im married but not sure if she cheat or not so i want to know all her msg on BBM
i have the mobile nr that she uses and her nickname .
I need urgent REALL help for this .

my mobile nr is +32486.985.920
thx for it and if needed i can reward !


many man are cheated by wife , and so looking for a way to hack into any site ( BBM )
who finally found what he wanted ?

what i said before.

as what i said before it isn't my first time involved with hacking and it all started in 2015 back in last October i was playing around on the internet when i met this girl on a site and she said she was 16 and i'm like well hey i'm 1 year older than you! i was stupid and i said can we online date idk why I WAS SO STUPID so anyways we dated online and then one day i got up in the morning looked at my phone and it said i got a message from her and it said "I SEE YOU" and i gasped obviously and i replied how do you see me...and she said i hacked a drone...well on y next blog ill tell you guys the rest.

a new anon

since i am new to hacking i am now a different just feels weird to be involved, but...its not the first time though i have been.

chrom dox

(function(define, require, requireNative, requireAsync, exports, console, privates,$Array, $Function, $JSON, $Object, $RegExp, $String, $Error) {'use strict';// Copyright 2014 The Chromium Authors. All rights reserved.
// Use of this source code is governed by a BSD-style license that can be
// found in the LICENSE file.

// chrome.runtime.messaging API implementation.

// TODO(kalman): factor requiring chrome out of here.
var chrome = requireNative('chrome').GetChrome();
var Event = require('event_bindings').Event;
var lastError = require('lastError');
var logActivity = requireNative('activityLogger');
var logging = requireNative('logging');
var messagingNatives = requireNative('messaging_natives');
var processNatives = requireNative('process');
var utils = require('utils');
var messagingUtils = require('messaging_utils');

// The reserved channel name for the sendRequest/send(Native)Message APIs.
// Note: sendRequest is deprecated.
var kRequestChannel = "chrome.extension.sendRequest";
var kMessageChannel = "chrome.runtime.sendMessage";
var kNativeMessageChannel = "chrome.runtime.sendNativeMessage";

// Map of port IDs to port object.
var ports = {};

// Change even to odd and vice versa, to get the other side of a given
// channel.
function getOppositePortId(portId) { return portId ^ 1; }

// Port object. Represents a connection to another script context through
// which messages can be passed.
function PortImpl(portId, opt_name) {
this.portId_ = portId; = opt_name;

var portSchema = {name: 'port', $ref: 'runtime.Port'};
var options = {unmanaged: true};
this.onDisconnect = new Event(null, [portSchema], options);
this.onMessage = new Event(
[{name: 'message', type: 'any', optional: true}, portSchema],
this.onDestroy_ = null;

Look for TWCable routers..Examples below..

SSID: "DG1670A52"
psk: "DG1670ACF5052"
SSID: "DG1670AD2"
psk: "DG1670AA9EBD2"
SSID: "TC8715D0D"
psk: "TC8715DB3270D"
SSID: "TC8717T26"
psk: "TC8717T111726"
SSID: "TG862G12"
psk: "TG862GBF4E12"

Sik1est3 /G\


First download Router Keygen Apk..this app gives you the name of the router..and of course the Mac address.. Use the first(4) of the last (6) of the Mac address and place them in front of the last (2) of the name of the router..TimeWarner Routers only..if the router's default on its is the password!! Enjoy..Sik1est3 /G\ ORDER of the TEMPLAR KNIGHTS /•\


I have a problem of login into admin accounts (cpanel, inmotion hosting etc...). Last several websites that i have hacked using SQL injection , and obtaining admin username,password , as well as finding admin login pages ( . Every time same message (INVALID LOGIN).....Can anyone help???
Thanks for your time!!!!
P.S. This is a link to my latest failed admin login attempted:

username: Admin
password: wtjV0uFSoKRRl6Y%3D

The Linux Security Circus: On GUI isolation

The Linux Security Circus: On GUI isolation
There certainly is one thing that most Linux users
don't realize about their Linux systems... this is the
lack of GUI-level isolation, and how it essentially
nullifies all the desktop security. I wrote about it a
few times, I spoke about it a few times, yet I still
come across people who don't realize it all the time.
So, let me stress this one more time: if you have two
GUI applications, e.g. an OpenOffice Word Processor,
and a stupid Tetris game, both of which granted
access to your screen (your X server), then there is
no isolation between those two apps. Even if they run
as different user accounts! Even if they are somehow
sandboxed by SELinux or whatever! None, zero, null,
The X server architecture, designed long time ago by
some happy hippies who just thought all the people
apps are good and non-malicious, simply allows any
GUI application to control any other one. No bugs, no
exploits, no tricks, are required. This is all by design.
One application can sniff or inject keystrokes to
another one, can take snapshots of the screen
occupied by windows belonging to another one, etc.
If you don't believe me, I suggest you do a simple
experiment. Open a terminal window, as normal
user, and run xinput list, which is a standard
diagnostic program for Xorg (on Fedora you will likely
need to install it first: yum install xorg-x11-apps):
$ xinput list
It will show you all the pointer and keyboard devices
that your Xorg knows about. Note the ID of the device
listed as “AT keyboard” and then run (as normal
$ xinput test id
It should now start displaying the scancodes for all
the keys you press on the keyboard. If it doesn't, it
means you used a wrong device ID.
Now, for the best, start another terminal window,
and switch to root (e.g. using su, or sudo). Notice
how the xinput running as user is able to sniff all
your keystrokes, including root password (for su),
and then all the keystrokes you enter in your root
session. Start some GUI app as root, or as different
user, again notice how your xinput can sniff all the
keystrokes you enter to this other app!
Yes, I can understand what is happening in your
mind and heart right now... Don't worry, others have
also passed through it. Feel free to hate me, throw
out insults at me, etc. I don't mind, really (I just won't
moderate them). When you calm down, continue
In Qubes the above problem doesn't exist, because
each domain (each AppVM) has it own local, isolated,
dummy X server. The main X server, that runs in
Dom0 and that handles the real display is never
exposed to any of the AppVMs directly (AppVMs
cannot connect to it via the X protocol). For details
see this technical overview.
You can repeat the same experiment in Qubes. You
just need to use the ID of the “qubesdev” device, as
shown by xinput list (should be 7). Run the xinput in
one of your domains, e.g. in the “red” one. Because
we actually use the same device for both mouse and
keystrokes, you should now see both the key
scancodes, as well as all the mouse events. Notice
how your xinput is able to sniff all the events that are
destined for other apps belonging to the same
domain where you run xinput, and how it is unable to
sniff anything targeted to other domains, or Dom0.
BTW, Windows is the only one mainstream OS I'm
aware of, that actually attempts to implement some
form of GUI-level isolation, starting from Windows
Vista. See e.g. this ancient article I wrote in the days
when I used Vista at my primary laptop. Of course,
it's still easy to bypass this isolation, because of the
huge interface that is exposed to each GUI client (that
also includes GPU API). Nevertheless, they at least
attempt to prevent this at the architecture level.

Syndicate content