// API callback pageNavi({"version":"1.0","encoding":"UTF-8","feed":{"xmlns":"http://www.w3.org/2005/Atom","xmlns$openSearch":"http://a9.com/-/spec/opensearchrss/1.0/","xmlns$blogger":"http://schemas.google.com/blogger/2008","xmlns$georss":"http://www.georss.org/georss","xmlns$gd":"http://schemas.google.com/g/2005","xmlns$thr":"http://purl.org/syndication/thread/1.0","id":{"$t":"tag:blogger.com,1999:blog-3549945082353733982"},"updated":{"$t":"2024-03-26T23:37:49.719-07:00"},"category":[{"term":"downloads"},{"term":"sql injection"},{"term":"404"},{"term":"Free Internet Trick"},{"term":"NSA"},{"term":"anonymous"},{"term":"crime"},{"term":"hackers"},{"term":"hacking"},{"term":"leakes"},{"term":"lists"},{"term":"nsa prism"},{"term":"php"},{"term":"prism"},{"term":"prism of nsa"},{"term":"reports on twitter"},{"term":"scripts"},{"term":"shell"},{"term":"sql"},{"term":"sql vulnerable"},{"term":"sqli list"},{"term":"twitter"},{"term":"web shells"},{"term":"wifi hacking app for android"}],"title":{"type":"text","$t":"Security blog"},"subtitle":{"type":"html","$t":"Behind Every Secured System There Is A Hand Of Hacker "},"link":[{"rel":"http://schemas.google.com/g/2005#feed","type":"application/atom+xml","href":"https:\/\/sniperhaxx.blogspot.com\/feeds\/posts\/summary"},{"rel":"self","type":"application/atom+xml","href":"https:\/\/www.blogger.com\/feeds\/3549945082353733982\/posts\/summary?alt=json-in-script\u0026max-results=99999"},{"rel":"alternate","type":"text/html","href":"https:\/\/sniperhaxx.blogspot.com\/"},{"rel":"hub","href":"http://pubsubhubbub.appspot.com/"}],"author":[{"name":{"$t":"ahmed mehtab"},"uri":{"$t":"http:\/\/www.blogger.com\/profile\/02191953907257374209"},"email":{"$t":"noreply@blogger.com"},"gd$image":{"rel":"http://schemas.google.com/g/2005#thumbnail","width":"16","height":"16","src":"https:\/\/img1.blogblog.com\/img\/b16-rounded.gif"}}],"generator":{"version":"7.00","uri":"http://www.blogger.com","$t":"Blogger"},"openSearch$totalResults":{"$t":"105"},"openSearch$startIndex":{"$t":"1"},"openSearch$itemsPerPage":{"$t":"99999"},"entry":[{"id":{"$t":"tag:blogger.com,1999:blog-3549945082353733982.post-848839192320518920"},"published":{"$t":"2022-04-06T17:36:00.005-07:00"},"updated":{"$t":"2022-04-06T17:38:27.081-07:00"},"category":[{"scheme":"http://www.blogger.com/atom/ns#","term":"404"},{"scheme":"http://www.blogger.com/atom/ns#","term":"php"},{"scheme":"http://www.blogger.com/atom/ns#","term":"scripts"},{"scheme":"http://www.blogger.com/atom/ns#","term":"shell"},{"scheme":"http://www.blogger.com/atom/ns#","term":"web shells"}],"title":{"type":"text","$t":"PHP Web Shells Collection - 2022 - FUD - Web Shell Scripts "},"summary":{"type":"text","$t":"In case if you guys are wondering if PHP webshells are dead or aren't useful now a days just because they are outdated then you are wrong. I have seen alot of community members actively working on these shell scripts and trying to make them stealth and FUD fully undetectable.About PHP Web Shells \u0026amp; Scripts\u0026nbsp;PHP web shells or scripts is a peice of code or some very well written scripts "},"link":[{"rel":"replies","type":"application/atom+xml","href":"https:\/\/sniperhaxx.blogspot.com\/feeds\/848839192320518920\/comments\/default","title":"Post Comments"},{"rel":"replies","type":"text/html","href":"https:\/\/sniperhaxx.blogspot.com\/2022\/04\/php-web-shells-collection-2022-fud-web.html#comment-form","title":"1 Comments"},{"rel":"edit","type":"application/atom+xml","href":"https:\/\/www.blogger.com\/feeds\/3549945082353733982\/posts\/default\/848839192320518920"},{"rel":"self","type":"application/atom+xml","href":"https:\/\/www.blogger.com\/feeds\/3549945082353733982\/posts\/default\/848839192320518920"},{"rel":"alternate","type":"text/html","href":"https:\/\/sniperhaxx.blogspot.com\/2022\/04\/php-web-shells-collection-2022-fud-web.html","title":"PHP Web Shells Collection - 2022 - FUD - Web Shell Scripts "}],"author":[{"name":{"$t":"ahmed mehtab"},"uri":{"$t":"http:\/\/www.blogger.com\/profile\/02191953907257374209"},"email":{"$t":"noreply@blogger.com"},"gd$image":{"rel":"http://schemas.google.com/g/2005#thumbnail","width":"16","height":"16","src":"https:\/\/img1.blogblog.com\/img\/b16-rounded.gif"}}],"thr$total":{"$t":"1"}},{"id":{"$t":"tag:blogger.com,1999:blog-3549945082353733982.post-2256888074156361678"},"published":{"$t":"2018-10-06T17:50:00.002-07:00"},"updated":{"$t":"2022-04-06T17:08:09.570-07:00"},"title":{"type":"text","$t":"wso 404 php shell - 2019 updated"},"summary":{"type":"text","$t":"WSO 404 Error Shell | PHP Code\n#WSO #404 #error #shell #3.0 #FUD\nAboutWSO 404 Error web shell is a PHP based shell script written to exploit and manage servers and websites remotely. This allows you to perform high command tasks using this 404 shell script such some of them include creating directories , modifying files , defacement, changing permissions, fetch server information and versions, "},"link":[{"rel":"replies","type":"application/atom+xml","href":"https:\/\/sniperhaxx.blogspot.com\/feeds\/2256888074156361678\/comments\/default","title":"Post Comments"},{"rel":"replies","type":"text/html","href":"https:\/\/sniperhaxx.blogspot.com\/2018\/10\/wso-404-php-shell-2019-updated.html#comment-form","title":"7 Comments"},{"rel":"edit","type":"application/atom+xml","href":"https:\/\/www.blogger.com\/feeds\/3549945082353733982\/posts\/default\/2256888074156361678"},{"rel":"self","type":"application/atom+xml","href":"https:\/\/www.blogger.com\/feeds\/3549945082353733982\/posts\/default\/2256888074156361678"},{"rel":"alternate","type":"text/html","href":"https:\/\/sniperhaxx.blogspot.com\/2018\/10\/wso-404-php-shell-2019-updated.html","title":"wso 404 php shell - 2019 updated"}],"author":[{"name":{"$t":"ahmed mehtab"},"uri":{"$t":"http:\/\/www.blogger.com\/profile\/02191953907257374209"},"email":{"$t":"noreply@blogger.com"},"gd$image":{"rel":"http://schemas.google.com/g/2005#thumbnail","width":"16","height":"16","src":"https:\/\/img1.blogblog.com\/img\/b16-rounded.gif"}}],"thr$total":{"$t":"7"}},{"id":{"$t":"tag:blogger.com,1999:blog-3549945082353733982.post-6336165084193718872"},"published":{"$t":"2016-05-31T04:38:00.000-07:00"},"updated":{"$t":"2016-05-31T04:42:49.015-07:00"},"category":[{"scheme":"http://www.blogger.com/atom/ns#","term":"sql injection"}],"title":{"type":"text","$t":"Sql injection Sqli Dorks"},"summary":{"type":"text","$t":"\u0026nbsp;Here are some of the basic sqli dorks for searching vulnerable website's on the internet for sql injection and give a try to help them in securing.\n\n\n\ninurl:db_mysql.php\n\n\ninurl:sql.php?table=wp_users\n\n\ninurl:sql.php?table=group\n\n\ninurl:sql.php?table=phpMyAdmin\n\n\ninurl:sql.php?table=users\n\n\ninurl:sql.php?table=login\n\n\n\u003C!-- Ractangular blog --\u003E\n\n\n(adsbygoogle = window.adsbygoogle || []).push"},"link":[{"rel":"replies","type":"application/atom+xml","href":"https:\/\/sniperhaxx.blogspot.com\/feeds\/6336165084193718872\/comments\/default","title":"Post Comments"},{"rel":"replies","type":"text/html","href":"https:\/\/sniperhaxx.blogspot.com\/2016\/05\/sql-injection-sqli-dorks.html#comment-form","title":"15 Comments"},{"rel":"edit","type":"application/atom+xml","href":"https:\/\/www.blogger.com\/feeds\/3549945082353733982\/posts\/default\/6336165084193718872"},{"rel":"self","type":"application/atom+xml","href":"https:\/\/www.blogger.com\/feeds\/3549945082353733982\/posts\/default\/6336165084193718872"},{"rel":"alternate","type":"text/html","href":"https:\/\/sniperhaxx.blogspot.com\/2016\/05\/sql-injection-sqli-dorks.html","title":"Sql injection Sqli Dorks"}],"author":[{"name":{"$t":"ahmed mehtab"},"uri":{"$t":"http:\/\/www.blogger.com\/profile\/02191953907257374209"},"email":{"$t":"noreply@blogger.com"},"gd$image":{"rel":"http://schemas.google.com/g/2005#thumbnail","width":"16","height":"16","src":"https:\/\/img1.blogblog.com\/img\/b16-rounded.gif"}}],"thr$total":{"$t":"15"}},{"id":{"$t":"tag:blogger.com,1999:blog-3549945082353733982.post-7800889060777580777"},"published":{"$t":"2015-12-24T08:07:00.003-08:00"},"updated":{"$t":"2016-05-31T04:43:11.645-07:00"},"title":{"type":"text","$t":"Download Dubrute + VNC Scanner + Nmap "},"summary":{"type":"text","$t":"Download Dubrute\u0026nbsp;+ VNC Scanner\u0026nbsp;+ Nmap\u0026nbsp;\n\nDubrute is usually used for cracking Remote Desktop Protocols (RDP) and VNC scanner is used for scanning active RDPs in bulk using ip ranges.\n\nYou can download dubrute from the below given link\n\n\n\u003C!-- Ractangular blog --\u003E\n\n\n(adsbygoogle = window.adsbygoogle || []).push({});\n\nDownload :\u0026nbsp;https:\/\/www.mediafire.com\/?m0q2uw4rwmqb44n\n\nPassword"},"link":[{"rel":"replies","type":"application/atom+xml","href":"https:\/\/sniperhaxx.blogspot.com\/feeds\/7800889060777580777\/comments\/default","title":"Post Comments"},{"rel":"replies","type":"text/html","href":"https:\/\/sniperhaxx.blogspot.com\/2015\/12\/download-dubrute-vnc-scanner-nmap.html#comment-form","title":"9 Comments"},{"rel":"edit","type":"application/atom+xml","href":"https:\/\/www.blogger.com\/feeds\/3549945082353733982\/posts\/default\/7800889060777580777"},{"rel":"self","type":"application/atom+xml","href":"https:\/\/www.blogger.com\/feeds\/3549945082353733982\/posts\/default\/7800889060777580777"},{"rel":"alternate","type":"text/html","href":"https:\/\/sniperhaxx.blogspot.com\/2015\/12\/download-dubrute-vnc-scanner-nmap.html","title":"Download Dubrute + VNC Scanner + Nmap "}],"author":[{"name":{"$t":"ahmed mehtab"},"uri":{"$t":"http:\/\/www.blogger.com\/profile\/02191953907257374209"},"email":{"$t":"noreply@blogger.com"},"gd$image":{"rel":"http://schemas.google.com/g/2005#thumbnail","width":"16","height":"16","src":"https:\/\/img1.blogblog.com\/img\/b16-rounded.gif"}}],"thr$total":{"$t":"9"}},{"id":{"$t":"tag:blogger.com,1999:blog-3549945082353733982.post-5692080705544533257"},"published":{"$t":"2015-12-24T06:36:00.000-08:00"},"updated":{"$t":"2015-12-24T06:43:52.965-08:00"},"title":{"type":"text","$t":"Download Darkcomet v 5.1 Beta 2015 - enhanced version "},"summary":{"type":"text","$t":"\n\n\n\u003C!-- Ractangular blog --\u003E\n\n\n\n\n\n(adsbygoogle = window.adsbygoogle || []).push({});\n\nHi everyone, many of you emailed us for the darkcomet link and i usually dont share such stuff because all of the versions of darkcomet over the internet are backdoored so why should i provide you the stuff which is infected but as per your emails and message that you really want darkcomet version 5.1 which is "},"link":[{"rel":"replies","type":"application/atom+xml","href":"https:\/\/sniperhaxx.blogspot.com\/feeds\/5692080705544533257\/comments\/default","title":"Post Comments"},{"rel":"replies","type":"text/html","href":"https:\/\/sniperhaxx.blogspot.com\/2015\/12\/download-darkcomet-v-51-beta-2015.html#comment-form","title":"23 Comments"},{"rel":"edit","type":"application/atom+xml","href":"https:\/\/www.blogger.com\/feeds\/3549945082353733982\/posts\/default\/5692080705544533257"},{"rel":"self","type":"application/atom+xml","href":"https:\/\/www.blogger.com\/feeds\/3549945082353733982\/posts\/default\/5692080705544533257"},{"rel":"alternate","type":"text/html","href":"https:\/\/sniperhaxx.blogspot.com\/2015\/12\/download-darkcomet-v-51-beta-2015.html","title":"Download Darkcomet v 5.1 Beta 2015 - enhanced version "}],"author":[{"name":{"$t":"ahmed mehtab"},"uri":{"$t":"http:\/\/www.blogger.com\/profile\/02191953907257374209"},"email":{"$t":"noreply@blogger.com"},"gd$image":{"rel":"http://schemas.google.com/g/2005#thumbnail","width":"16","height":"16","src":"https:\/\/img1.blogblog.com\/img\/b16-rounded.gif"}}],"media$thumbnail":{"xmlns$media":"http://search.yahoo.com/mrss/","url":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEg1W7SQvyqbpMIEUdvjadceiudzn-glBvh-MEv73drHV1cPTdqug1WSL9wjKg4hGDijsGZfDq2vr361TIWMSPAZnVfCjqMAM5Oe7L6hDEaMVgLpDWODuuNl3pbJJH0ZttaPxKWzxH13-lM\/s72-c\/maxresdefault.jpg","height":"72","width":"72"},"thr$total":{"$t":"23"}},{"id":{"$t":"tag:blogger.com,1999:blog-3549945082353733982.post-814140136732156251"},"published":{"$t":"2015-11-24T05:37:00.001-08:00"},"updated":{"$t":"2016-05-31T04:43:40.738-07:00"},"title":{"type":"text","$t":"Symlink SA 3.0 PHP Script"},"summary":{"type":"text","$t":"\n\u003C!-- Ractangular blog --\u003E\n\n\n(adsbygoogle = window.adsbygoogle || []).push({});\n\nSymlink SA 3.0 PHP Script is for testing server security either it is vulnerable to symlink or not..\n\nIts free , you can download it by clicking here or visit : http:\/\/pastebin.com\/mKX7QvJW\n\n\u003C!-- Ractangular blog --\u003E\n\n\n(adsbygoogle = window.adsbygoogle || []).push({});\n"},"link":[{"rel":"replies","type":"application/atom+xml","href":"https:\/\/sniperhaxx.blogspot.com\/feeds\/814140136732156251\/comments\/default","title":"Post Comments"},{"rel":"replies","type":"text/html","href":"https:\/\/sniperhaxx.blogspot.com\/2015\/11\/symlink-sa-30-php-script.html#comment-form","title":"10 Comments"},{"rel":"edit","type":"application/atom+xml","href":"https:\/\/www.blogger.com\/feeds\/3549945082353733982\/posts\/default\/814140136732156251"},{"rel":"self","type":"application/atom+xml","href":"https:\/\/www.blogger.com\/feeds\/3549945082353733982\/posts\/default\/814140136732156251"},{"rel":"alternate","type":"text/html","href":"https:\/\/sniperhaxx.blogspot.com\/2015\/11\/symlink-sa-30-php-script.html","title":"Symlink SA 3.0 PHP Script"}],"author":[{"name":{"$t":"ahmed mehtab"},"uri":{"$t":"http:\/\/www.blogger.com\/profile\/02191953907257374209"},"email":{"$t":"noreply@blogger.com"},"gd$image":{"rel":"http://schemas.google.com/g/2005#thumbnail","width":"16","height":"16","src":"https:\/\/img1.blogblog.com\/img\/b16-rounded.gif"}}],"thr$total":{"$t":"10"}},{"id":{"$t":"tag:blogger.com,1999:blog-3549945082353733982.post-6017537520059823677"},"published":{"$t":"2015-11-24T02:18:00.000-08:00"},"updated":{"$t":"2018-10-06T17:56:50.861-07:00"},"title":{"type":"text","$t":"WSO 404 error shell - PHP shell v 3.0"},"summary":{"type":"text","$t":" \u003C!-- Ractangular blog --\u003E\n\n\n(adsbygoogle = window.adsbygoogle || []).push({});\n WSO 404 error shell is a php shell which could be used to pentest the security of a web server or web application 404 wso shell is a very famous shell because 404 error shell shows a 404 page error when loaded but after there is a place to enter the password and you can login and control the entire website \/ server "},"link":[{"rel":"replies","type":"application/atom+xml","href":"https:\/\/sniperhaxx.blogspot.com\/feeds\/6017537520059823677\/comments\/default","title":"Post Comments"},{"rel":"replies","type":"text/html","href":"https:\/\/sniperhaxx.blogspot.com\/2015\/11\/wso-404-error-shell-php-shell-v-30.html#comment-form","title":"8 Comments"},{"rel":"edit","type":"application/atom+xml","href":"https:\/\/www.blogger.com\/feeds\/3549945082353733982\/posts\/default\/6017537520059823677"},{"rel":"self","type":"application/atom+xml","href":"https:\/\/www.blogger.com\/feeds\/3549945082353733982\/posts\/default\/6017537520059823677"},{"rel":"alternate","type":"text/html","href":"https:\/\/sniperhaxx.blogspot.com\/2015\/11\/wso-404-error-shell-php-shell-v-30.html","title":"WSO 404 error shell - PHP shell v 3.0"}],"author":[{"name":{"$t":"ahmed mehtab"},"uri":{"$t":"http:\/\/www.blogger.com\/profile\/02191953907257374209"},"email":{"$t":"noreply@blogger.com"},"gd$image":{"rel":"http://schemas.google.com/g/2005#thumbnail","width":"16","height":"16","src":"https:\/\/img1.blogblog.com\/img\/b16-rounded.gif"}}],"thr$total":{"$t":"8"}},{"id":{"$t":"tag:blogger.com,1999:blog-3549945082353733982.post-6725173202272078216"},"published":{"$t":"2015-08-02T08:24:00.002-07:00"},"updated":{"$t":"2015-08-02T08:24:41.472-07:00"},"title":{"type":"text","$t":"Omni Rat the best stable RAT to turn your android phone into a hacking machine"},"summary":{"type":"text","$t":"RAT ( Remote Administration Tool ) was designed to control and monitor activities of users likely for parents to monitor the activity of their children,s or if a boss want to monitor his staff either the staff is doing the job or not.\n\nA the first RAT tools were used to monitor the activity of people over the computer systems running os such as Windows and for it they mostly use .net executeable "},"link":[{"rel":"replies","type":"application/atom+xml","href":"https:\/\/sniperhaxx.blogspot.com\/feeds\/6725173202272078216\/comments\/default","title":"Post Comments"},{"rel":"replies","type":"text/html","href":"https:\/\/sniperhaxx.blogspot.com\/2015\/08\/omni-rat-best-stable-rat-to-turn-your.html#comment-form","title":"45 Comments"},{"rel":"edit","type":"application/atom+xml","href":"https:\/\/www.blogger.com\/feeds\/3549945082353733982\/posts\/default\/6725173202272078216"},{"rel":"self","type":"application/atom+xml","href":"https:\/\/www.blogger.com\/feeds\/3549945082353733982\/posts\/default\/6725173202272078216"},{"rel":"alternate","type":"text/html","href":"https:\/\/sniperhaxx.blogspot.com\/2015\/08\/omni-rat-best-stable-rat-to-turn-your.html","title":"Omni Rat the best stable RAT to turn your android phone into a hacking machine"}],"author":[{"name":{"$t":"ahmed mehtab"},"uri":{"$t":"http:\/\/www.blogger.com\/profile\/02191953907257374209"},"email":{"$t":"noreply@blogger.com"},"gd$image":{"rel":"http://schemas.google.com/g/2005#thumbnail","width":"16","height":"16","src":"https:\/\/img1.blogblog.com\/img\/b16-rounded.gif"}}],"thr$total":{"$t":"45"}},{"id":{"$t":"tag:blogger.com,1999:blog-3549945082353733982.post-7316255768149187736"},"published":{"$t":"2015-06-15T09:56:00.001-07:00"},"updated":{"$t":"2015-06-15T10:15:30.744-07:00"},"title":{"type":"text","$t":"How to Hack an App Video Series"},"summary":{"type":"text","$t":"\n\n\nHow to Hack an App Video Series\n\nDo you know how to hack an app? Well if not, it’s easier than you may think. With just a\n\nfew readily available tools, today’s hackers are able to exploit a mobile app in just a\n\nmatter of minutes.\n\nSo, why are so many apps susceptible to attack? Often times, with so much pressure to\n\nget the app to market, many developers overlook application protection as "},"link":[{"rel":"replies","type":"application/atom+xml","href":"https:\/\/sniperhaxx.blogspot.com\/feeds\/7316255768149187736\/comments\/default","title":"Post Comments"},{"rel":"replies","type":"text/html","href":"https:\/\/sniperhaxx.blogspot.com\/2015\/06\/how-to-hack-app-video-series.html#comment-form","title":"7 Comments"},{"rel":"edit","type":"application/atom+xml","href":"https:\/\/www.blogger.com\/feeds\/3549945082353733982\/posts\/default\/7316255768149187736"},{"rel":"self","type":"application/atom+xml","href":"https:\/\/www.blogger.com\/feeds\/3549945082353733982\/posts\/default\/7316255768149187736"},{"rel":"alternate","type":"text/html","href":"https:\/\/sniperhaxx.blogspot.com\/2015\/06\/how-to-hack-app-video-series.html","title":"How to Hack an App Video Series"}],"author":[{"name":{"$t":"ahmed mehtab"},"uri":{"$t":"http:\/\/www.blogger.com\/profile\/02191953907257374209"},"email":{"$t":"noreply@blogger.com"},"gd$image":{"rel":"http://schemas.google.com/g/2005#thumbnail","width":"16","height":"16","src":"https:\/\/img1.blogblog.com\/img\/b16-rounded.gif"}}],"media$thumbnail":{"xmlns$media":"http://search.yahoo.com/mrss/","url":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjj2zu_8eQpbAhF-5oM-oMms7xn8oGCFvxtIUECjd9Mhn-9dUX0mZ9Uh4Mz2QZ-doRf2eTEyz6T6ElsmK8ILyy2V9SaDFY5R0jffVaGga8eEoswVqoHp4NG1GMZvQE2uRpT_VblxwnSACE\/s72-c\/unnamed.png","height":"72","width":"72"},"thr$total":{"$t":"7"}},{"id":{"$t":"tag:blogger.com,1999:blog-3549945082353733982.post-5558684491299730488"},"published":{"$t":"2015-03-14T09:20:00.004-07:00"},"updated":{"$t":"2015-03-14T09:21:49.438-07:00"},"title":{"type":"text","$t":"Server Side MITM Attack - Proof of Concept"},"summary":{"type":"text","$t":"Hello and Salam to everyone ,\n\nI love to share my ideas and experiments , experience with peoples and today i am sharing the proof of concept on Server side MITM attack yes , i know you have not heard it before right but it is a vulnerability in which attacker can trick the user and can steal the user credentials.\n\nWe know that in MITM attack aka Man in the middle attack , attacker steals the "},"link":[{"rel":"replies","type":"application/atom+xml","href":"https:\/\/sniperhaxx.blogspot.com\/feeds\/5558684491299730488\/comments\/default","title":"Post Comments"},{"rel":"replies","type":"text/html","href":"https:\/\/sniperhaxx.blogspot.com\/2015\/03\/server-side-mitm-attack-proof-of-concept.html#comment-form","title":"16 Comments"},{"rel":"edit","type":"application/atom+xml","href":"https:\/\/www.blogger.com\/feeds\/3549945082353733982\/posts\/default\/5558684491299730488"},{"rel":"self","type":"application/atom+xml","href":"https:\/\/www.blogger.com\/feeds\/3549945082353733982\/posts\/default\/5558684491299730488"},{"rel":"alternate","type":"text/html","href":"https:\/\/sniperhaxx.blogspot.com\/2015\/03\/server-side-mitm-attack-proof-of-concept.html","title":"Server Side MITM Attack - Proof of Concept"}],"author":[{"name":{"$t":"ahmed mehtab"},"uri":{"$t":"http:\/\/www.blogger.com\/profile\/02191953907257374209"},"email":{"$t":"noreply@blogger.com"},"gd$image":{"rel":"http://schemas.google.com/g/2005#thumbnail","width":"16","height":"16","src":"https:\/\/img1.blogblog.com\/img\/b16-rounded.gif"}}],"thr$total":{"$t":"16"}},{"id":{"$t":"tag:blogger.com,1999:blog-3549945082353733982.post-5753233110665748928"},"published":{"$t":"2015-02-28T01:29:00.001-08:00"},"updated":{"$t":"2015-02-28T01:30:09.604-08:00"},"category":[{"scheme":"http://www.blogger.com/atom/ns#","term":"wifi hacking app for android"}],"title":{"type":"text","$t":"WiFi Hacking App For Android"},"summary":{"type":"text","$t":"\nIf you are a HACKER and using your smartphone as a portable and instant hacking device , than you are on the best place because i have found \u0026nbsp;Real WiFi Hacking app for android from which you can hack almost 80% of Netowrks on 100% success rate. while my older post was \" TOP 15 Android Hacking Apps \" which is also a great list for those who are looking for such apps for the android smart "},"link":[{"rel":"replies","type":"application/atom+xml","href":"https:\/\/sniperhaxx.blogspot.com\/feeds\/5753233110665748928\/comments\/default","title":"Post Comments"},{"rel":"replies","type":"text/html","href":"https:\/\/sniperhaxx.blogspot.com\/2015\/02\/wifi-hacking-app-for-android.html#comment-form","title":"14 Comments"},{"rel":"edit","type":"application/atom+xml","href":"https:\/\/www.blogger.com\/feeds\/3549945082353733982\/posts\/default\/5753233110665748928"},{"rel":"self","type":"application/atom+xml","href":"https:\/\/www.blogger.com\/feeds\/3549945082353733982\/posts\/default\/5753233110665748928"},{"rel":"alternate","type":"text/html","href":"https:\/\/sniperhaxx.blogspot.com\/2015\/02\/wifi-hacking-app-for-android.html","title":"WiFi Hacking App For Android"}],"author":[{"name":{"$t":"ahmed mehtab"},"uri":{"$t":"http:\/\/www.blogger.com\/profile\/02191953907257374209"},"email":{"$t":"noreply@blogger.com"},"gd$image":{"rel":"http://schemas.google.com/g/2005#thumbnail","width":"16","height":"16","src":"https:\/\/img1.blogblog.com\/img\/b16-rounded.gif"}}],"media$thumbnail":{"xmlns$media":"http://search.yahoo.com/mrss/","url":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjMSApYorZZcpYM43GDTnrPZpd8QQF0DtMTOe4CJe61efqN_fBnnF907jjOIcK5oH5b11bCvIDPikTDHxdNT6VRrvK3xfWljP78ljtW83WE8a0DSpepi7AEb0DuSD6CAfhaPuqoTi_1HxM\/s72-c\/kdzybgp4.png","height":"72","width":"72"},"thr$total":{"$t":"14"}},{"id":{"$t":"tag:blogger.com,1999:blog-3549945082353733982.post-7672632851249588988"},"published":{"$t":"2015-02-18T04:41:00.002-08:00"},"updated":{"$t":"2015-02-18T04:44:38.596-08:00"},"title":{"type":"text","$t":"Encrypt Your Keyboard to avoid Keyloggers "},"summary":{"type":"text","$t":"The world is very dangerous , millions of hackers are spying on you what you type , what you chat , what you buy , etc and this article is about to make sure you are secured from the keyloggers and other spying software's which logs your activity.\n\n\n\nWhile you are busy in having fun with your bae some one is monitoring you , your keys are being logged and it could be anyone including your own "},"link":[{"rel":"replies","type":"application/atom+xml","href":"https:\/\/sniperhaxx.blogspot.com\/feeds\/7672632851249588988\/comments\/default","title":"Post Comments"},{"rel":"replies","type":"text/html","href":"https:\/\/sniperhaxx.blogspot.com\/2015\/02\/encrypt-your-keyboard-to-avoid.html#comment-form","title":"3 Comments"},{"rel":"edit","type":"application/atom+xml","href":"https:\/\/www.blogger.com\/feeds\/3549945082353733982\/posts\/default\/7672632851249588988"},{"rel":"self","type":"application/atom+xml","href":"https:\/\/www.blogger.com\/feeds\/3549945082353733982\/posts\/default\/7672632851249588988"},{"rel":"alternate","type":"text/html","href":"https:\/\/sniperhaxx.blogspot.com\/2015\/02\/encrypt-your-keyboard-to-avoid.html","title":"Encrypt Your Keyboard to avoid Keyloggers "}],"author":[{"name":{"$t":"ahmed mehtab"},"uri":{"$t":"http:\/\/www.blogger.com\/profile\/02191953907257374209"},"email":{"$t":"noreply@blogger.com"},"gd$image":{"rel":"http://schemas.google.com/g/2005#thumbnail","width":"16","height":"16","src":"https:\/\/img1.blogblog.com\/img\/b16-rounded.gif"}}],"thr$total":{"$t":"3"}},{"id":{"$t":"tag:blogger.com,1999:blog-3549945082353733982.post-600752681079415833"},"published":{"$t":"2015-02-02T08:41:00.001-08:00"},"updated":{"$t":"2015-02-02T09:10:57.370-08:00"},"title":{"type":"text","$t":"How To Hack TV Channels via Cable Operator "},"summary":{"type":"text","$t":"Well this is one of the most interesting article on this blog , Ever wanted to hack into a TV Chanel ? Today i will teach you one of the most dangerous attack MITM ( Man in the middle attack ).\n\nThis topic cover,s the POC on how we can easily hack the TV channels which are being operated by Cable Operators.To proceed first of all you will have to understand how this works, Whats the logic behind "},"link":[{"rel":"replies","type":"application/atom+xml","href":"https:\/\/sniperhaxx.blogspot.com\/feeds\/600752681079415833\/comments\/default","title":"Post Comments"},{"rel":"replies","type":"text/html","href":"https:\/\/sniperhaxx.blogspot.com\/2015\/02\/how-to-hack-tv-channels-via-cabel.html#comment-form","title":"14 Comments"},{"rel":"edit","type":"application/atom+xml","href":"https:\/\/www.blogger.com\/feeds\/3549945082353733982\/posts\/default\/600752681079415833"},{"rel":"self","type":"application/atom+xml","href":"https:\/\/www.blogger.com\/feeds\/3549945082353733982\/posts\/default\/600752681079415833"},{"rel":"alternate","type":"text/html","href":"https:\/\/sniperhaxx.blogspot.com\/2015\/02\/how-to-hack-tv-channels-via-cabel.html","title":"How To Hack TV Channels via Cable Operator "}],"author":[{"name":{"$t":"ahmed mehtab"},"uri":{"$t":"http:\/\/www.blogger.com\/profile\/02191953907257374209"},"email":{"$t":"noreply@blogger.com"},"gd$image":{"rel":"http://schemas.google.com/g/2005#thumbnail","width":"16","height":"16","src":"https:\/\/img1.blogblog.com\/img\/b16-rounded.gif"}}],"media$thumbnail":{"xmlns$media":"http://search.yahoo.com/mrss/","url":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEioG7VQwCZAYKlwlbvlOZH7RJemuJNt5snQUClWg4_M0prJwm6sZO4DIiqEGXr46N3JWu11CeO0fkBegh3V21d64f7BlJ-rn6BrJlnEUJunrXdkkelvp6_KYjJXaOeAvPBriKF300SOaXI\/s72-c\/DSC_0299.jpg","height":"72","width":"72"},"thr$total":{"$t":"14"}},{"id":{"$t":"tag:blogger.com,1999:blog-3549945082353733982.post-5566191709493091118"},"published":{"$t":"2015-02-01T07:31:00.002-08:00"},"updated":{"$t":"2015-02-01T07:32:36.320-08:00"},"title":{"type":"text","$t":"FingerPrint Scanning of a server or Website - Tutorial"},"summary":{"type":"text","$t":"\n\n\n\nIn Cyber world Fingerprint scanning refers to gather all the information about your target which could play a vital role to achieve your target And indeed information gathering is the first step which a great hacker took,s before hacking his target.\n\n\n\nThere are many tools to gather the information about your target but there is one little tool which i love the most because of its efficiency "},"link":[{"rel":"replies","type":"application/atom+xml","href":"https:\/\/sniperhaxx.blogspot.com\/feeds\/5566191709493091118\/comments\/default","title":"Post Comments"},{"rel":"replies","type":"text/html","href":"https:\/\/sniperhaxx.blogspot.com\/2015\/02\/fingerprint-scanning-of-server-or.html#comment-form","title":"5 Comments"},{"rel":"edit","type":"application/atom+xml","href":"https:\/\/www.blogger.com\/feeds\/3549945082353733982\/posts\/default\/5566191709493091118"},{"rel":"self","type":"application/atom+xml","href":"https:\/\/www.blogger.com\/feeds\/3549945082353733982\/posts\/default\/5566191709493091118"},{"rel":"alternate","type":"text/html","href":"https:\/\/sniperhaxx.blogspot.com\/2015\/02\/fingerprint-scanning-of-server-or.html","title":"FingerPrint Scanning of a server or Website - Tutorial"}],"author":[{"name":{"$t":"ahmed mehtab"},"uri":{"$t":"http:\/\/www.blogger.com\/profile\/02191953907257374209"},"email":{"$t":"noreply@blogger.com"},"gd$image":{"rel":"http://schemas.google.com/g/2005#thumbnail","width":"16","height":"16","src":"https:\/\/img1.blogblog.com\/img\/b16-rounded.gif"}}],"thr$total":{"$t":"5"}},{"id":{"$t":"tag:blogger.com,1999:blog-3549945082353733982.post-5974954326672057638"},"published":{"$t":"2015-01-31T11:21:00.001-08:00"},"updated":{"$t":"2015-01-31T11:23:51.209-08:00"},"title":{"type":"text","$t":"WiFi Access Point Poisoning To Keep Access For Long Time"},"summary":{"type":"text","$t":"\nWell viewers , another unique article which you will find no where but only on my Blog because i love to share unique ideas and my experience in Hacking.\n\nWant to become a GREAT hacker ? Well being a great hacker its a good practice to keep access over everything which you hack even if its not in use but time changes as a coin flips so maybe the access of your backdoor help you in future and in "},"link":[{"rel":"replies","type":"application/atom+xml","href":"https:\/\/sniperhaxx.blogspot.com\/feeds\/5974954326672057638\/comments\/default","title":"Post Comments"},{"rel":"replies","type":"text/html","href":"https:\/\/sniperhaxx.blogspot.com\/2015\/01\/wifi-access-point-poisoning-to-keep.html#comment-form","title":"2 Comments"},{"rel":"edit","type":"application/atom+xml","href":"https:\/\/www.blogger.com\/feeds\/3549945082353733982\/posts\/default\/5974954326672057638"},{"rel":"self","type":"application/atom+xml","href":"https:\/\/www.blogger.com\/feeds\/3549945082353733982\/posts\/default\/5974954326672057638"},{"rel":"alternate","type":"text/html","href":"https:\/\/sniperhaxx.blogspot.com\/2015\/01\/wifi-access-point-poisoning-to-keep.html","title":"WiFi Access Point Poisoning To Keep Access For Long Time"}],"author":[{"name":{"$t":"ahmed mehtab"},"uri":{"$t":"http:\/\/www.blogger.com\/profile\/02191953907257374209"},"email":{"$t":"noreply@blogger.com"},"gd$image":{"rel":"http://schemas.google.com/g/2005#thumbnail","width":"16","height":"16","src":"https:\/\/img1.blogblog.com\/img\/b16-rounded.gif"}}],"thr$total":{"$t":"2"}},{"id":{"$t":"tag:blogger.com,1999:blog-3549945082353733982.post-8764085712910332583"},"published":{"$t":"2015-01-13T01:09:00.000-08:00"},"updated":{"$t":"2015-01-13T01:11:43.467-08:00"},"title":{"type":"text","$t":"How to identify the Manuacturer and UPtime of Access Point or WiFi"},"summary":{"type":"text","$t":"\n\nIN hacking the first step is to gather the information for your target so , dont worry in order to identify the uptime i.e for how long the router is running like from the time it was restarted and manufacturer i.e which brand is it ? whats its manufacturer like linksys etc.\n\n\n\n\u003C!-- Ractangular blog --\u003E\n\n\n\n\n(adsbygoogle = window.adsbygoogle || []).push({});\n\n\n\nSo in order to identify first "},"link":[{"rel":"replies","type":"application/atom+xml","href":"https:\/\/sniperhaxx.blogspot.com\/feeds\/8764085712910332583\/comments\/default","title":"Post Comments"},{"rel":"replies","type":"text/html","href":"https:\/\/sniperhaxx.blogspot.com\/2015\/01\/how-to-identify-manuacturer-and-uptime.html#comment-form","title":"3 Comments"},{"rel":"edit","type":"application/atom+xml","href":"https:\/\/www.blogger.com\/feeds\/3549945082353733982\/posts\/default\/8764085712910332583"},{"rel":"self","type":"application/atom+xml","href":"https:\/\/www.blogger.com\/feeds\/3549945082353733982\/posts\/default\/8764085712910332583"},{"rel":"alternate","type":"text/html","href":"https:\/\/sniperhaxx.blogspot.com\/2015\/01\/how-to-identify-manuacturer-and-uptime.html","title":"How to identify the Manuacturer and UPtime of Access Point or WiFi"}],"author":[{"name":{"$t":"ahmed mehtab"},"uri":{"$t":"http:\/\/www.blogger.com\/profile\/02191953907257374209"},"email":{"$t":"noreply@blogger.com"},"gd$image":{"rel":"http://schemas.google.com/g/2005#thumbnail","width":"16","height":"16","src":"https:\/\/img1.blogblog.com\/img\/b16-rounded.gif"}}],"media$thumbnail":{"xmlns$media":"http://search.yahoo.com/mrss/","url":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgKORSe8pu7aRsa41UjYB3zD0JWyor_uHcrmxGztNcYWLttp_WAMeHHmyonjbFtT6tuEVfsjBq3KfPmtP_rwe6ONgR9v9FebKdV6qekwTAu3hY5MELeZeq6AwUyT-vRy5wkeUWQomQVeiY\/s72-c\/Screenshot+from+2015-01-13+11:46:37.png","height":"72","width":"72"},"thr$total":{"$t":"3"}},{"id":{"$t":"tag:blogger.com,1999:blog-3549945082353733982.post-1677234016021773195"},"published":{"$t":"2015-01-13T00:54:00.001-08:00"},"updated":{"$t":"2015-01-13T01:12:23.800-08:00"},"title":{"type":"text","$t":"How to identify if users are using their Internet"},"summary":{"type":"text","$t":"Salam To everyone , yet another exciting post and sharing this because i love to share my experience.\n\nIn Many Cases you will have to identify if the user or client is connected using his INTERNET via Wifi\u0026nbsp; because many times it could be in idle state.\n\nWhile capturing the handshake of WiFi many peoples face a problem and they are Unable to capture the handshake even if the clients are "},"link":[{"rel":"replies","type":"application/atom+xml","href":"https:\/\/sniperhaxx.blogspot.com\/feeds\/1677234016021773195\/comments\/default","title":"Post Comments"},{"rel":"replies","type":"text/html","href":"https:\/\/sniperhaxx.blogspot.com\/2015\/01\/how-to-identify-if-clients-are-using.html#comment-form","title":"2 Comments"},{"rel":"edit","type":"application/atom+xml","href":"https:\/\/www.blogger.com\/feeds\/3549945082353733982\/posts\/default\/1677234016021773195"},{"rel":"self","type":"application/atom+xml","href":"https:\/\/www.blogger.com\/feeds\/3549945082353733982\/posts\/default\/1677234016021773195"},{"rel":"alternate","type":"text/html","href":"https:\/\/sniperhaxx.blogspot.com\/2015\/01\/how-to-identify-if-clients-are-using.html","title":"How to identify if users are using their Internet"}],"author":[{"name":{"$t":"ahmed mehtab"},"uri":{"$t":"http:\/\/www.blogger.com\/profile\/02191953907257374209"},"email":{"$t":"noreply@blogger.com"},"gd$image":{"rel":"http://schemas.google.com/g/2005#thumbnail","width":"16","height":"16","src":"https:\/\/img1.blogblog.com\/img\/b16-rounded.gif"}}],"media$thumbnail":{"xmlns$media":"http://search.yahoo.com/mrss/","url":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgKORSe8pu7aRsa41UjYB3zD0JWyor_uHcrmxGztNcYWLttp_WAMeHHmyonjbFtT6tuEVfsjBq3KfPmtP_rwe6ONgR9v9FebKdV6qekwTAu3hY5MELeZeq6AwUyT-vRy5wkeUWQomQVeiY\/s72-c\/Screenshot+from+2015-01-13+11:46:37.png","height":"72","width":"72"},"thr$total":{"$t":"2"}},{"id":{"$t":"tag:blogger.com,1999:blog-3549945082353733982.post-2263389556680548188"},"published":{"$t":"2015-01-12T04:10:00.001-08:00"},"updated":{"$t":"2015-01-12T04:12:23.497-08:00"},"title":{"type":"text","$t":"FastMail.fm Email Spoofing Vulnerability"},"summary":{"type":"text","$t":"Hi there , another happy day and today i am publishing this vulnerability because a big reason is behind this.\n\nWe know that Fastmail.fm has started a Bug Bounty Program for White-Hat Hackers to make them-self a secured from black-hat hackers but today when i tried to exploit their web-site with some advance methods , i was successfully able to exploit their website by API Injection.\n\nThe bug was"},"link":[{"rel":"replies","type":"application/atom+xml","href":"https:\/\/sniperhaxx.blogspot.com\/feeds\/2263389556680548188\/comments\/default","title":"Post Comments"},{"rel":"replies","type":"text/html","href":"https:\/\/sniperhaxx.blogspot.com\/2015\/01\/fastmailfm-email-spoofing-vulnerability.html#comment-form","title":"18 Comments"},{"rel":"edit","type":"application/atom+xml","href":"https:\/\/www.blogger.com\/feeds\/3549945082353733982\/posts\/default\/2263389556680548188"},{"rel":"self","type":"application/atom+xml","href":"https:\/\/www.blogger.com\/feeds\/3549945082353733982\/posts\/default\/2263389556680548188"},{"rel":"alternate","type":"text/html","href":"https:\/\/sniperhaxx.blogspot.com\/2015\/01\/fastmailfm-email-spoofing-vulnerability.html","title":"FastMail.fm Email Spoofing Vulnerability"}],"author":[{"name":{"$t":"ahmed mehtab"},"uri":{"$t":"http:\/\/www.blogger.com\/profile\/02191953907257374209"},"email":{"$t":"noreply@blogger.com"},"gd$image":{"rel":"http://schemas.google.com/g/2005#thumbnail","width":"16","height":"16","src":"https:\/\/img1.blogblog.com\/img\/b16-rounded.gif"}}],"media$thumbnail":{"xmlns$media":"http://search.yahoo.com/mrss/","url":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhPDDY_2tJwRlF3xU23e83ky_4PFxaRL9cL1JbT9zrj44nTuRKEXNSh0ItLy3ifiIAmV08TDG8lEZF8gXmJFOqfQcqsAZeD4jx0PWllTjXasdYXBq6hRaR6Ban1pGdQapri4IGKHs72gF0\/s72-c\/Screenshot+from+2015-01-12+14:29:34.png","height":"72","width":"72"},"thr$total":{"$t":"18"}},{"id":{"$t":"tag:blogger.com,1999:blog-3549945082353733982.post-992516399569951624"},"published":{"$t":"2015-01-11T03:00:00.004-08:00"},"updated":{"$t":"2015-01-11T03:03:26.321-08:00"},"title":{"type":"text","$t":"How to Hack WiFi (wep\/wpa\/wpa2) in Single Command"},"summary":{"type":"text","$t":"\u0026nbsp;Hack wifi WPA wpa2 wep no clients easy hacking wifi free kali linux wifite tutorial\n\n\u0026nbsp;\n\n\u0026nbsp; \nWiFi indeed is like an oxygen for me without it i am dead and indeed for you too , the reason why you are here is to learn how to crack or hack WiFi easily automatically within few hours or even in few seconds but wait it is only for educational purpose so dont try to implement this method "},"link":[{"rel":"replies","type":"application/atom+xml","href":"https:\/\/sniperhaxx.blogspot.com\/feeds\/992516399569951624\/comments\/default","title":"Post Comments"},{"rel":"replies","type":"text/html","href":"https:\/\/sniperhaxx.blogspot.com\/2015\/01\/how-to-hack-wifi-wepwpawpa2-in-single.html#comment-form","title":"3 Comments"},{"rel":"edit","type":"application/atom+xml","href":"https:\/\/www.blogger.com\/feeds\/3549945082353733982\/posts\/default\/992516399569951624"},{"rel":"self","type":"application/atom+xml","href":"https:\/\/www.blogger.com\/feeds\/3549945082353733982\/posts\/default\/992516399569951624"},{"rel":"alternate","type":"text/html","href":"https:\/\/sniperhaxx.blogspot.com\/2015\/01\/how-to-hack-wifi-wepwpawpa2-in-single.html","title":"How to Hack WiFi (wep\/wpa\/wpa2) in Single Command"}],"author":[{"name":{"$t":"ahmed mehtab"},"uri":{"$t":"http:\/\/www.blogger.com\/profile\/02191953907257374209"},"email":{"$t":"noreply@blogger.com"},"gd$image":{"rel":"http://schemas.google.com/g/2005#thumbnail","width":"16","height":"16","src":"https:\/\/img1.blogblog.com\/img\/b16-rounded.gif"}}],"media$thumbnail":{"xmlns$media":"http://search.yahoo.com/mrss/","url":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEg5_CZd_DeTjUJpGBBMjBQZA_DBCeZ4HZkoolcQzwWXEkz3z3_c6D-GiPP0k0KeLqfb2W_8x4BfIE3mg6miFVgLRuWV-cig3l1hMvoa74NmD9U6EKfYqKHb4GU312aDZLXhBjfk29UddMw\/s72-c\/wifite.png","height":"72","width":"72"},"thr$total":{"$t":"3"}},{"id":{"$t":"tag:blogger.com,1999:blog-3549945082353733982.post-2926428344466710440"},"published":{"$t":"2015-01-02T09:48:00.001-08:00"},"updated":{"$t":"2015-01-13T01:21:13.738-08:00"},"title":{"type":"text","$t":"Arabic HR Software"},"summary":{"type":"text","$t":"Hr software\u0026nbsp;\n\nWhy to waste your time in keeping record in register,s or in hard copy. Time is changed , you prefer to travel on Car rather than animal carts.\n\nWe have a solution for you in which you can manage your work like a boss ! , no need to worry. With hundreds of superb features which you are looking for.\nAnd Also if you want customization in HR software you can order the HR software "},"link":[{"rel":"replies","type":"application/atom+xml","href":"https:\/\/sniperhaxx.blogspot.com\/feeds\/2926428344466710440\/comments\/default","title":"Post Comments"},{"rel":"replies","type":"text/html","href":"https:\/\/sniperhaxx.blogspot.com\/2015\/01\/arabic-hr-software.html#comment-form","title":"2 Comments"},{"rel":"edit","type":"application/atom+xml","href":"https:\/\/www.blogger.com\/feeds\/3549945082353733982\/posts\/default\/2926428344466710440"},{"rel":"self","type":"application/atom+xml","href":"https:\/\/www.blogger.com\/feeds\/3549945082353733982\/posts\/default\/2926428344466710440"},{"rel":"alternate","type":"text/html","href":"https:\/\/sniperhaxx.blogspot.com\/2015\/01\/arabic-hr-software.html","title":"Arabic HR Software"}],"author":[{"name":{"$t":"ahmed mehtab"},"uri":{"$t":"http:\/\/www.blogger.com\/profile\/02191953907257374209"},"email":{"$t":"noreply@blogger.com"},"gd$image":{"rel":"http://schemas.google.com/g/2005#thumbnail","width":"16","height":"16","src":"https:\/\/img1.blogblog.com\/img\/b16-rounded.gif"}}],"thr$total":{"$t":"2"}},{"id":{"$t":"tag:blogger.com,1999:blog-3549945082353733982.post-680266155463431868"},"published":{"$t":"2014-12-12T05:35:00.000-08:00"},"updated":{"$t":"2014-12-12T05:38:09.876-08:00"},"title":{"type":"text","$t":"BotNet For DDOS or stressing Attack"},"summary":{"type":"text","$t":"\n\u003C!-- Ractangular blog --\u003E\n\n\n(adsbygoogle = window.adsbygoogle || []).push({});\n\nDDOS tool xerxes dangerous ddos tool powerfull ddos tool botnet ddos online download ddos tool\u0026nbsp;BotNet For DDOS or stressing Attack\nXERXES ddos tool tutorial ddos tutorial complete guide to take down server\n\n\n\n\u0026nbsp; \u0026nbsp; \u0026nbsp; \u0026nbsp;Yes the world,s most dangerous DDOS botnet which is also responsible for "},"link":[{"rel":"replies","type":"application/atom+xml","href":"https:\/\/sniperhaxx.blogspot.com\/feeds\/680266155463431868\/comments\/default","title":"Post Comments"},{"rel":"replies","type":"text/html","href":"https:\/\/sniperhaxx.blogspot.com\/2014\/12\/botnet-for-ddos-or-stressing-attack.html#comment-form","title":"8 Comments"},{"rel":"edit","type":"application/atom+xml","href":"https:\/\/www.blogger.com\/feeds\/3549945082353733982\/posts\/default\/680266155463431868"},{"rel":"self","type":"application/atom+xml","href":"https:\/\/www.blogger.com\/feeds\/3549945082353733982\/posts\/default\/680266155463431868"},{"rel":"alternate","type":"text/html","href":"https:\/\/sniperhaxx.blogspot.com\/2014\/12\/botnet-for-ddos-or-stressing-attack.html","title":"BotNet For DDOS or stressing Attack"}],"author":[{"name":{"$t":"ahmed mehtab"},"uri":{"$t":"http:\/\/www.blogger.com\/profile\/02191953907257374209"},"email":{"$t":"noreply@blogger.com"},"gd$image":{"rel":"http://schemas.google.com/g/2005#thumbnail","width":"16","height":"16","src":"https:\/\/img1.blogblog.com\/img\/b16-rounded.gif"}}],"thr$total":{"$t":"8"}},{"id":{"$t":"tag:blogger.com,1999:blog-3549945082353733982.post-1439403865872163309"},"published":{"$t":"2014-12-12T05:10:00.001-08:00"},"updated":{"$t":"2014-12-12T05:14:03.535-08:00"},"title":{"type":"text","$t":"DDOS Attacking Technique - Logical Master Method "},"summary":{"type":"text","$t":"\n\n\u003C!-- Ractangular blog --\u003E\n\n\n(adsbygoogle = window.adsbygoogle || []).push({});\n\n\n\n\nWell , every one knows how to dos attack and take the website down but sometime attack becomes logical.\n\nThe same thing happened with me when i was trying to down the web server with my high five botnet under legal circumstances and i was getting blocked by the sevrers firewall. The website was a php wordpress "},"link":[{"rel":"replies","type":"application/atom+xml","href":"https:\/\/sniperhaxx.blogspot.com\/feeds\/1439403865872163309\/comments\/default","title":"Post Comments"},{"rel":"replies","type":"text/html","href":"https:\/\/sniperhaxx.blogspot.com\/2014\/12\/ddos-attacking-technique-logical-master.html#comment-form","title":"3 Comments"},{"rel":"edit","type":"application/atom+xml","href":"https:\/\/www.blogger.com\/feeds\/3549945082353733982\/posts\/default\/1439403865872163309"},{"rel":"self","type":"application/atom+xml","href":"https:\/\/www.blogger.com\/feeds\/3549945082353733982\/posts\/default\/1439403865872163309"},{"rel":"alternate","type":"text/html","href":"https:\/\/sniperhaxx.blogspot.com\/2014\/12\/ddos-attacking-technique-logical-master.html","title":"DDOS Attacking Technique - Logical Master Method "}],"author":[{"name":{"$t":"ahmed mehtab"},"uri":{"$t":"http:\/\/www.blogger.com\/profile\/02191953907257374209"},"email":{"$t":"noreply@blogger.com"},"gd$image":{"rel":"http://schemas.google.com/g/2005#thumbnail","width":"16","height":"16","src":"https:\/\/img1.blogblog.com\/img\/b16-rounded.gif"}}],"media$thumbnail":{"xmlns$media":"http://search.yahoo.com/mrss/","url":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjLoIvgKc1nPfyeiQCf1QpV38uQZmDz53kVOXDabUL4-jVL4drbiRjBqwBvszF540Itwhlc2KFzJCOwLDfY2GuF2AkaW4Lsp0pOUvIkDTnp1PwOmVIguV85bfnoHjOFb1MCVkRkUhleLII\/s72-c\/Screenshot_1.png","height":"72","width":"72"},"thr$total":{"$t":"3"}},{"id":{"$t":"tag:blogger.com,1999:blog-3549945082353733982.post-6818222622334921125"},"published":{"$t":"2014-12-12T03:45:00.001-08:00"},"updated":{"$t":"2014-12-12T04:03:41.058-08:00"},"category":[{"scheme":"http://www.blogger.com/atom/ns#","term":"downloads"}],"title":{"type":"text","$t":"Free Download DroidSheep apk Full Version"},"summary":{"type":"text","$t":"\n\u003C!-- Ractangular blog --\u003E\n\n\n(adsbygoogle = window.adsbygoogle || []).push({});\n\nFree Download DroidSheep apk Full Version\n\n\n\n\n\nDeoidsheep is best for pentesting session hijacking over the wifi network and easy to use.\n\n\nDroidSheep is a simple Android tool for web session hijacking (sidejacking). It listens for HTTP packets sent via a wireless (802.11) network connection and extracts the session "},"link":[{"rel":"replies","type":"application/atom+xml","href":"https:\/\/sniperhaxx.blogspot.com\/feeds\/6818222622334921125\/comments\/default","title":"Post Comments"},{"rel":"replies","type":"text/html","href":"https:\/\/sniperhaxx.blogspot.com\/2014\/12\/free-download-droidsheep-apk-full.html#comment-form","title":"12 Comments"},{"rel":"edit","type":"application/atom+xml","href":"https:\/\/www.blogger.com\/feeds\/3549945082353733982\/posts\/default\/6818222622334921125"},{"rel":"self","type":"application/atom+xml","href":"https:\/\/www.blogger.com\/feeds\/3549945082353733982\/posts\/default\/6818222622334921125"},{"rel":"alternate","type":"text/html","href":"https:\/\/sniperhaxx.blogspot.com\/2014\/12\/free-download-droidsheep-apk-full.html","title":"Free Download DroidSheep apk Full Version"}],"author":[{"name":{"$t":"ahmed mehtab"},"uri":{"$t":"http:\/\/www.blogger.com\/profile\/02191953907257374209"},"email":{"$t":"noreply@blogger.com"},"gd$image":{"rel":"http://schemas.google.com/g/2005#thumbnail","width":"16","height":"16","src":"https:\/\/img1.blogblog.com\/img\/b16-rounded.gif"}}],"thr$total":{"$t":"12"}},{"id":{"$t":"tag:blogger.com,1999:blog-3549945082353733982.post-653862010491405312"},"published":{"$t":"2014-12-12T03:26:00.001-08:00"},"updated":{"$t":"2018-10-06T17:57:38.652-07:00"},"category":[{"scheme":"http://www.blogger.com/atom/ns#","term":"downloads"}],"title":{"type":"text","$t":"Download C99 Shell"},"summary":{"type":"text","$t":"Download C99 Shell\u0026nbsp;Download C99 Shell\u0026nbsp;Download C99 Shell\u0026nbsp;Download C99 Shell\u0026nbsp;Download C99 Shell\u0026nbsp;Download C99 Shell\u0026nbsp;Download C99 Shell\u0026nbsp;Download C99 Shell\u0026nbsp;Download C99 Shell\n\n\nc99 sell.php\n\n\n\nShells are backdoors used by hackers to keep their access on the server and one of the famous shell is c99 sell which is developed by third party coder and can be used "},"link":[{"rel":"replies","type":"application/atom+xml","href":"https:\/\/sniperhaxx.blogspot.com\/feeds\/653862010491405312\/comments\/default","title":"Post Comments"},{"rel":"replies","type":"text/html","href":"https:\/\/sniperhaxx.blogspot.com\/2014\/12\/download-c99-shell.html#comment-form","title":"7 Comments"},{"rel":"edit","type":"application/atom+xml","href":"https:\/\/www.blogger.com\/feeds\/3549945082353733982\/posts\/default\/653862010491405312"},{"rel":"self","type":"application/atom+xml","href":"https:\/\/www.blogger.com\/feeds\/3549945082353733982\/posts\/default\/653862010491405312"},{"rel":"alternate","type":"text/html","href":"https:\/\/sniperhaxx.blogspot.com\/2014\/12\/download-c99-shell.html","title":"Download C99 Shell"}],"author":[{"name":{"$t":"ahmed mehtab"},"uri":{"$t":"http:\/\/www.blogger.com\/profile\/02191953907257374209"},"email":{"$t":"noreply@blogger.com"},"gd$image":{"rel":"http://schemas.google.com/g/2005#thumbnail","width":"16","height":"16","src":"https:\/\/img1.blogblog.com\/img\/b16-rounded.gif"}}],"thr$total":{"$t":"7"}},{"id":{"$t":"tag:blogger.com,1999:blog-3549945082353733982.post-7645858380553449734"},"published":{"$t":"2014-11-27T22:50:00.002-08:00"},"updated":{"$t":"2014-11-27T22:50:22.630-08:00"},"title":{"type":"text","$t":"How To Find Clients on Neighbor Router"},"summary":{"type":"text","$t":"\nWell you are learning Hacking and the first thing which a best and top hacker dose is simply he collects information about its target from A to Z which not only helps him in hacking but also increases the chance to exploit the weakness , once you have the weakness of your target you can hit him right there at its weak point like someone said \" You Miss I Hit \"\n\nIn Many cases you will need to "},"link":[{"rel":"replies","type":"application/atom+xml","href":"https:\/\/sniperhaxx.blogspot.com\/feeds\/7645858380553449734\/comments\/default","title":"Post Comments"},{"rel":"replies","type":"text/html","href":"https:\/\/sniperhaxx.blogspot.com\/2014\/11\/how-to-find-clients-on-neighbor-router.html#comment-form","title":"1 Comments"},{"rel":"edit","type":"application/atom+xml","href":"https:\/\/www.blogger.com\/feeds\/3549945082353733982\/posts\/default\/7645858380553449734"},{"rel":"self","type":"application/atom+xml","href":"https:\/\/www.blogger.com\/feeds\/3549945082353733982\/posts\/default\/7645858380553449734"},{"rel":"alternate","type":"text/html","href":"https:\/\/sniperhaxx.blogspot.com\/2014\/11\/how-to-find-clients-on-neighbor-router.html","title":"How To Find Clients on Neighbor Router"}],"author":[{"name":{"$t":"ahmed mehtab"},"uri":{"$t":"http:\/\/www.blogger.com\/profile\/02191953907257374209"},"email":{"$t":"noreply@blogger.com"},"gd$image":{"rel":"http://schemas.google.com/g/2005#thumbnail","width":"16","height":"16","src":"https:\/\/img1.blogblog.com\/img\/b16-rounded.gif"}}],"media$thumbnail":{"xmlns$media":"http://search.yahoo.com/mrss/","url":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjFn9jubHOhPwytpzwrkvzjPAdC8PBm9kTVtucUwctxeRr6gdnRgqMhNC0wEMY97DdyIYarkQPr7BA1LFBj85r6ME3Kf9agbdxcNNXA83BbftggCrHDvdRWkH38EQG6h_-NxSqAdrzsXIA\/s72-c\/3rd_command.png","height":"72","width":"72"},"thr$total":{"$t":"1"}},{"id":{"$t":"tag:blogger.com,1999:blog-3549945082353733982.post-3618531409390215666"},"published":{"$t":"2014-11-27T11:27:00.002-08:00"},"updated":{"$t":"2014-11-27T11:35:51.841-08:00"},"title":{"type":"text","$t":"How To Spoof MAC Address In Kali Linux "},"summary":{"type":"text","$t":"how to spoof mac address how to spoof mac address in kali Linux ubuntu mac spoofing tutorial mac spoofing command how to spoof mac address 2014 command Linux 2015 ifconfig mac spoofing tut \u0026nbsp; \u0026nbsp;\n\n\n\nThere are many reasons for spoofing a MAC Address and its very easy as limited to few commands.\n\nTo spoof MAC Address on Kali linux you will first make set your interface so for this type\n\n\n"},"link":[{"rel":"replies","type":"application/atom+xml","href":"https:\/\/sniperhaxx.blogspot.com\/feeds\/3618531409390215666\/comments\/default","title":"Post Comments"},{"rel":"replies","type":"text/html","href":"https:\/\/sniperhaxx.blogspot.com\/2014\/11\/how-to-spoof-mac-address-in-kali-linux.html#comment-form","title":"1 Comments"},{"rel":"edit","type":"application/atom+xml","href":"https:\/\/www.blogger.com\/feeds\/3549945082353733982\/posts\/default\/3618531409390215666"},{"rel":"self","type":"application/atom+xml","href":"https:\/\/www.blogger.com\/feeds\/3549945082353733982\/posts\/default\/3618531409390215666"},{"rel":"alternate","type":"text/html","href":"https:\/\/sniperhaxx.blogspot.com\/2014\/11\/how-to-spoof-mac-address-in-kali-linux.html","title":"How To Spoof MAC Address In Kali Linux "}],"author":[{"name":{"$t":"ahmed mehtab"},"uri":{"$t":"http:\/\/www.blogger.com\/profile\/02191953907257374209"},"email":{"$t":"noreply@blogger.com"},"gd$image":{"rel":"http://schemas.google.com/g/2005#thumbnail","width":"16","height":"16","src":"https:\/\/img1.blogblog.com\/img\/b16-rounded.gif"}}],"media$thumbnail":{"xmlns$media":"http://search.yahoo.com/mrss/","url":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjdzJjsZfL0A09jLSK4sJMweasCyUx7ihj0amMOjU80WmUVeFi2h9OY9x34W4fEMPE1DrEEbt3BQCaY0j2YLnolvJKX7k1cNmXSbMU0NY6Gbjt1N1S83dFbO2uUWXi0Cw1eF8VzxryrrFo\/s72-c\/3rd_command.png","height":"72","width":"72"},"thr$total":{"$t":"1"}},{"id":{"$t":"tag:blogger.com,1999:blog-3549945082353733982.post-4551337585565572258"},"published":{"$t":"2014-11-27T08:16:00.001-08:00"},"updated":{"$t":"2014-11-27T08:16:16.264-08:00"},"title":{"type":"text","$t":"How To Connect To A Limited Wifi Connection - Kali Linux "},"summary":{"type":"text","$t":"How To Connect To A Limited Wifi Connection limited wifi connection mac address spoofing tutorial mac address kali linux ifconfig wlan0 down hw ether mac address spoofing limited connectiv\n\n\n\n\n\nEvery Day you found many wifi connections but you have to face different type of situations during the connectivity and today you will learn how you can connect to a conenction which have no security , yes"},"link":[{"rel":"replies","type":"application/atom+xml","href":"https:\/\/sniperhaxx.blogspot.com\/feeds\/4551337585565572258\/comments\/default","title":"Post Comments"},{"rel":"replies","type":"text/html","href":"https:\/\/sniperhaxx.blogspot.com\/2014\/11\/how-to-connect-to-limited-wifi.html#comment-form","title":"3 Comments"},{"rel":"edit","type":"application/atom+xml","href":"https:\/\/www.blogger.com\/feeds\/3549945082353733982\/posts\/default\/4551337585565572258"},{"rel":"self","type":"application/atom+xml","href":"https:\/\/www.blogger.com\/feeds\/3549945082353733982\/posts\/default\/4551337585565572258"},{"rel":"alternate","type":"text/html","href":"https:\/\/sniperhaxx.blogspot.com\/2014\/11\/how-to-connect-to-limited-wifi.html","title":"How To Connect To A Limited Wifi Connection - Kali Linux "}],"author":[{"name":{"$t":"ahmed mehtab"},"uri":{"$t":"http:\/\/www.blogger.com\/profile\/02191953907257374209"},"email":{"$t":"noreply@blogger.com"},"gd$image":{"rel":"http://schemas.google.com/g/2005#thumbnail","width":"16","height":"16","src":"https:\/\/img1.blogblog.com\/img\/b16-rounded.gif"}}],"media$thumbnail":{"xmlns$media":"http://search.yahoo.com/mrss/","url":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjdzJjsZfL0A09jLSK4sJMweasCyUx7ihj0amMOjU80WmUVeFi2h9OY9x34W4fEMPE1DrEEbt3BQCaY0j2YLnolvJKX7k1cNmXSbMU0NY6Gbjt1N1S83dFbO2uUWXi0Cw1eF8VzxryrrFo\/s72-c\/3rd_command.png","height":"72","width":"72"},"thr$total":{"$t":"3"}},{"id":{"$t":"tag:blogger.com,1999:blog-3549945082353733982.post-2261632701296411249"},"published":{"$t":"2014-11-22T23:37:00.003-08:00"},"updated":{"$t":"2014-11-22T23:39:51.962-08:00"},"title":{"type":"text","$t":"WPS transaction failed (code: 0x02) Reaver solution"},"summary":{"type":"text","$t":"WPS transaction failed (code: 0x02) reaver solution wps reaver error kali linux reaver error reaver\u0026nbsp;\nWPS transaction failed (code: 0x02) reaver solution\u0026nbsp;\n\n\n\n\nI have been working on reaver from almost years and i love to share my experience so you can enjoy and learn.\n\nMany of users are e-mailing me because they tried reaver and got some sort of errors like \"WPS transaction failed (code:"},"link":[{"rel":"replies","type":"application/atom+xml","href":"https:\/\/sniperhaxx.blogspot.com\/feeds\/2261632701296411249\/comments\/default","title":"Post Comments"},{"rel":"replies","type":"text/html","href":"https:\/\/sniperhaxx.blogspot.com\/2014\/11\/wps-transaction-failed-code-0x02-reaver.html#comment-form","title":"18 Comments"},{"rel":"edit","type":"application/atom+xml","href":"https:\/\/www.blogger.com\/feeds\/3549945082353733982\/posts\/default\/2261632701296411249"},{"rel":"self","type":"application/atom+xml","href":"https:\/\/www.blogger.com\/feeds\/3549945082353733982\/posts\/default\/2261632701296411249"},{"rel":"alternate","type":"text/html","href":"https:\/\/sniperhaxx.blogspot.com\/2014\/11\/wps-transaction-failed-code-0x02-reaver.html","title":"WPS transaction failed (code: 0x02) Reaver solution"}],"author":[{"name":{"$t":"ahmed mehtab"},"uri":{"$t":"http:\/\/www.blogger.com\/profile\/02191953907257374209"},"email":{"$t":"noreply@blogger.com"},"gd$image":{"rel":"http://schemas.google.com/g/2005#thumbnail","width":"16","height":"16","src":"https:\/\/img1.blogblog.com\/img\/b16-rounded.gif"}}],"thr$total":{"$t":"18"}},{"id":{"$t":"tag:blogger.com,1999:blog-3549945082353733982.post-4074713506542367209"},"published":{"$t":"2014-11-19T06:39:00.000-08:00"},"updated":{"$t":"2014-11-19T06:41:34.822-08:00"},"title":{"type":"text","$t":"Completely Jam the WiFi in your area in a single command "},"summary":{"type":"text","$t":"how to jam the wifi neighbor wifi jamming wifi jamming tutorial kali linux mdk3 tutorial mdk3 mon0 wps enable jam the wifi how i can jam a wifi how to jam a wifi network ap jam the wifi\u0026nbsp;\n\n\n!! WiFi Jammed !!\n\nThis article is relative to my previous article \"How to kick your neighbor from the internet \" but in that article i wrote on how we can take the single user off the internet but now in "},"link":[{"rel":"replies","type":"application/atom+xml","href":"https:\/\/sniperhaxx.blogspot.com\/feeds\/4074713506542367209\/comments\/default","title":"Post Comments"},{"rel":"replies","type":"text/html","href":"https:\/\/sniperhaxx.blogspot.com\/2014\/11\/how-to-jam-wifi-in-your-area-in.html#comment-form","title":"25 Comments"},{"rel":"edit","type":"application/atom+xml","href":"https:\/\/www.blogger.com\/feeds\/3549945082353733982\/posts\/default\/4074713506542367209"},{"rel":"self","type":"application/atom+xml","href":"https:\/\/www.blogger.com\/feeds\/3549945082353733982\/posts\/default\/4074713506542367209"},{"rel":"alternate","type":"text/html","href":"https:\/\/sniperhaxx.blogspot.com\/2014\/11\/how-to-jam-wifi-in-your-area-in.html","title":"Completely Jam the WiFi in your area in a single command "}],"author":[{"name":{"$t":"ahmed mehtab"},"uri":{"$t":"http:\/\/www.blogger.com\/profile\/02191953907257374209"},"email":{"$t":"noreply@blogger.com"},"gd$image":{"rel":"http://schemas.google.com/g/2005#thumbnail","width":"16","height":"16","src":"https:\/\/img1.blogblog.com\/img\/b16-rounded.gif"}}],"thr$total":{"$t":"25"}},{"id":{"$t":"tag:blogger.com,1999:blog-3549945082353733982.post-5691531482545952680"},"published":{"$t":"2014-11-19T02:22:00.002-08:00"},"updated":{"$t":"2014-11-19T02:28:45.142-08:00"},"title":{"type":"text","$t":"How to kick your neighbor from the internet in seconds"},"summary":{"type":"text","$t":"jam a wifi How to kick your neighbour from the internet how to kill wifi wifikill.apk jam wifi stop wifi kali linux mdk3 tutorial full tutorial\n\n\n\nIn my todays article you will learn how you can jam your neighbor,s wifi in seconds.\n\nEver wondered ? you can jam a wifi from your wireless card ? Yes it is very easy and you can kick your neighbor from using the internet even if you are not connected "},"link":[{"rel":"replies","type":"application/atom+xml","href":"https:\/\/sniperhaxx.blogspot.com\/feeds\/5691531482545952680\/comments\/default","title":"Post Comments"},{"rel":"replies","type":"text/html","href":"https:\/\/sniperhaxx.blogspot.com\/2014\/11\/how-to-kick-your-neighbour-from-internet-jam-wifi.html#comment-form","title":"17 Comments"},{"rel":"edit","type":"application/atom+xml","href":"https:\/\/www.blogger.com\/feeds\/3549945082353733982\/posts\/default\/5691531482545952680"},{"rel":"self","type":"application/atom+xml","href":"https:\/\/www.blogger.com\/feeds\/3549945082353733982\/posts\/default\/5691531482545952680"},{"rel":"alternate","type":"text/html","href":"https:\/\/sniperhaxx.blogspot.com\/2014\/11\/how-to-kick-your-neighbour-from-internet-jam-wifi.html","title":"How to kick your neighbor from the internet in seconds"}],"author":[{"name":{"$t":"ahmed mehtab"},"uri":{"$t":"http:\/\/www.blogger.com\/profile\/02191953907257374209"},"email":{"$t":"noreply@blogger.com"},"gd$image":{"rel":"http://schemas.google.com/g/2005#thumbnail","width":"16","height":"16","src":"https:\/\/img1.blogblog.com\/img\/b16-rounded.gif"}}],"thr$total":{"$t":"17"}},{"id":{"$t":"tag:blogger.com,1999:blog-3549945082353733982.post-8529869169805986951"},"published":{"$t":"2014-10-25T04:03:00.003-07:00"},"updated":{"$t":"2015-01-13T01:26:05.045-08:00"},"title":{"type":"text","$t":"Learn Hacking in Pakistan in urdu"},"summary":{"type":"text","$t":"learn hacking in urdu video hacking tutorial exploit in urdu pakistani hackers hindi video tutorials hacking tutorials learn hackking in urdu hacking in urdu course exploit become hacker paistani hack.\n\nNow first time in Pakistan we have did it , peoples in Pakistan who want to learn hacking but due to some reasons they cant and they fail to achieve their aim but now no worries we will teach you "},"link":[{"rel":"replies","type":"application/atom+xml","href":"https:\/\/sniperhaxx.blogspot.com\/feeds\/8529869169805986951\/comments\/default","title":"Post Comments"},{"rel":"replies","type":"text/html","href":"https:\/\/sniperhaxx.blogspot.com\/2014\/10\/learn-hacking-in-pakistan-in-urdu.html#comment-form","title":"13 Comments"},{"rel":"edit","type":"application/atom+xml","href":"https:\/\/www.blogger.com\/feeds\/3549945082353733982\/posts\/default\/8529869169805986951"},{"rel":"self","type":"application/atom+xml","href":"https:\/\/www.blogger.com\/feeds\/3549945082353733982\/posts\/default\/8529869169805986951"},{"rel":"alternate","type":"text/html","href":"https:\/\/sniperhaxx.blogspot.com\/2014\/10\/learn-hacking-in-pakistan-in-urdu.html","title":"Learn Hacking in Pakistan in urdu"}],"author":[{"name":{"$t":"ahmed mehtab"},"uri":{"$t":"http:\/\/www.blogger.com\/profile\/02191953907257374209"},"email":{"$t":"noreply@blogger.com"},"gd$image":{"rel":"http://schemas.google.com/g/2005#thumbnail","width":"16","height":"16","src":"https:\/\/img1.blogblog.com\/img\/b16-rounded.gif"}}],"media$thumbnail":{"xmlns$media":"http://search.yahoo.com/mrss/","url":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEiSOezaCUyMZhHzzGewPY-c3CESaa-pgpbNVF8kwAXZMVo2LYxUQmuel2VMtvgGH8lOHipYtly5uafqWgqWIwcQ50Y6CpYPoArSCCjNs01FM-_lv5gyjfxI5HNonZ4cfZTTBZp4cMhx6A8\/s72-c\/10407979_898918253459120_2550770780927827772_n.jpg","height":"72","width":"72"},"thr$total":{"$t":"13"}},{"id":{"$t":"tag:blogger.com,1999:blog-3549945082353733982.post-4380527815280241336"},"published":{"$t":"2014-10-25T03:02:00.000-07:00"},"updated":{"$t":"2014-11-27T12:34:41.255-08:00"},"title":{"type":"text","$t":"How Organizations Can Prevent Reaver From Hacking Their WIFI"},"summary":{"type":"text","$t":"how to prevent reaver hot to secure wifi from reaver hacking wifi wpa wpa2 bssid prevent wifi attack reaver wifi attack prevent reaver from hacking wifi how to secure wifi reaver attack secure wifi attack\n\n\n\n\u003C!-- Ractangular blog --\u003E\n\n\n\n\n\n\n\n\n(adsbygoogle = window.adsbygoogle || []).push({});\n\nTime to secure the world from black hat hackers being a black and white hat hacker myself i am a combo , "},"link":[{"rel":"replies","type":"application/atom+xml","href":"https:\/\/sniperhaxx.blogspot.com\/feeds\/4380527815280241336\/comments\/default","title":"Post Comments"},{"rel":"replies","type":"text/html","href":"https:\/\/sniperhaxx.blogspot.com\/2014\/10\/how-organizations-can-prevent-reaver.html#comment-form","title":"0 Comments"},{"rel":"edit","type":"application/atom+xml","href":"https:\/\/www.blogger.com\/feeds\/3549945082353733982\/posts\/default\/4380527815280241336"},{"rel":"self","type":"application/atom+xml","href":"https:\/\/www.blogger.com\/feeds\/3549945082353733982\/posts\/default\/4380527815280241336"},{"rel":"alternate","type":"text/html","href":"https:\/\/sniperhaxx.blogspot.com\/2014\/10\/how-organizations-can-prevent-reaver.html","title":"How Organizations Can Prevent Reaver From Hacking Their WIFI"}],"author":[{"name":{"$t":"ahmed mehtab"},"uri":{"$t":"http:\/\/www.blogger.com\/profile\/02191953907257374209"},"email":{"$t":"noreply@blogger.com"},"gd$image":{"rel":"http://schemas.google.com/g/2005#thumbnail","width":"16","height":"16","src":"https:\/\/img1.blogblog.com\/img\/b16-rounded.gif"}}],"thr$total":{"$t":"0"}},{"id":{"$t":"tag:blogger.com,1999:blog-3549945082353733982.post-3533383551326110284"},"published":{"$t":"2014-10-25T01:49:00.001-07:00"},"updated":{"$t":"2014-10-25T01:51:05.662-07:00"},"title":{"type":"text","$t":"How To Hack WPA\/WPA2 WIFI Password using reaver in 1-2 hours"},"summary":{"type":"text","$t":"How to hack WPA\/WPA2 password using reaver in 1-2 hours fastly reaver cracking password wps enabled 0x30 0x03 error reaver fast failed hack wifi password in 2 hours hack wpa \/ wpa2 hack wifi.\n\n\n\n\n\u003C!-- Ractangular blog --\u003E\n\n\n(adsbygoogle = window.adsbygoogle || []).push({});\n\nReaver is great in cracking WPA\/WPA2 Protected passwords and by brute forcing the wps pins on the routers which have wps \/ "},"link":[{"rel":"replies","type":"application/atom+xml","href":"https:\/\/sniperhaxx.blogspot.com\/feeds\/3533383551326110284\/comments\/default","title":"Post Comments"},{"rel":"replies","type":"text/html","href":"https:\/\/sniperhaxx.blogspot.com\/2014\/10\/how-to-hack-wpa2-wifi-password-reaver.html#comment-form","title":"15 Comments"},{"rel":"edit","type":"application/atom+xml","href":"https:\/\/www.blogger.com\/feeds\/3549945082353733982\/posts\/default\/3533383551326110284"},{"rel":"self","type":"application/atom+xml","href":"https:\/\/www.blogger.com\/feeds\/3549945082353733982\/posts\/default\/3533383551326110284"},{"rel":"alternate","type":"text/html","href":"https:\/\/sniperhaxx.blogspot.com\/2014\/10\/how-to-hack-wpa2-wifi-password-reaver.html","title":"How To Hack WPA\/WPA2 WIFI Password using reaver in 1-2 hours"}],"author":[{"name":{"$t":"ahmed mehtab"},"uri":{"$t":"http:\/\/www.blogger.com\/profile\/02191953907257374209"},"email":{"$t":"noreply@blogger.com"},"gd$image":{"rel":"http://schemas.google.com/g/2005#thumbnail","width":"16","height":"16","src":"https:\/\/img1.blogblog.com\/img\/b16-rounded.gif"}}],"thr$total":{"$t":"15"}},{"id":{"$t":"tag:blogger.com,1999:blog-3549945082353733982.post-1496792373051452246"},"published":{"$t":"2014-10-20T08:21:00.002-07:00"},"updated":{"$t":"2014-10-20T08:26:20.411-07:00"},"title":{"type":"text","$t":"DNS Map Tutorial - Burtforcing sub domains"},"summary":{"type":"text","$t":"DNS Map is a great tool for finding sub domains of any website by bruteforcing dns map tutorial full kali linux dns hijacking map tutorial\n\n\n\n\nIn many cases you need to find sub domains of websites , dns map is a great tool for this purpose.\n\nDNS MAP comes pre loaded in kali linux and backtrack OS for pentesting while its also a user friendly tool and easily can be used by anyone.\ndns map "},"link":[{"rel":"replies","type":"application/atom+xml","href":"https:\/\/sniperhaxx.blogspot.com\/feeds\/1496792373051452246\/comments\/default","title":"Post Comments"},{"rel":"replies","type":"text/html","href":"https:\/\/sniperhaxx.blogspot.com\/2014\/10\/dns-map-tutorial-burtforcing-sub-domains.html#comment-form","title":"3 Comments"},{"rel":"edit","type":"application/atom+xml","href":"https:\/\/www.blogger.com\/feeds\/3549945082353733982\/posts\/default\/1496792373051452246"},{"rel":"self","type":"application/atom+xml","href":"https:\/\/www.blogger.com\/feeds\/3549945082353733982\/posts\/default\/1496792373051452246"},{"rel":"alternate","type":"text/html","href":"https:\/\/sniperhaxx.blogspot.com\/2014\/10\/dns-map-tutorial-burtforcing-sub-domains.html","title":"DNS Map Tutorial - Burtforcing sub domains"}],"author":[{"name":{"$t":"ahmed mehtab"},"uri":{"$t":"http:\/\/www.blogger.com\/profile\/02191953907257374209"},"email":{"$t":"noreply@blogger.com"},"gd$image":{"rel":"http://schemas.google.com/g/2005#thumbnail","width":"16","height":"16","src":"https:\/\/img1.blogblog.com\/img\/b16-rounded.gif"}}],"media$thumbnail":{"xmlns$media":"http://search.yahoo.com/mrss/","url":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgY-JSLftyBSpEPphdkuARTVRWY7MEaSpCoIDCufOqR4EEZz7JlDuOYO2hbx0w-qrjvKFpTznNeFkqYo_lc-Vh0GNgYlWSg4u58BkCk6Yg_8PZ0lYJG0gWcX5qFtTggk8a-3BA9le_Y62M\/s72-c\/dnsmap+1.jpg","height":"72","width":"72"},"thr$total":{"$t":"3"}},{"id":{"$t":"tag:blogger.com,1999:blog-3549945082353733982.post-2027404850064262380"},"published":{"$t":"2014-10-13T06:44:00.001-07:00"},"updated":{"$t":"2014-10-13T06:54:27.990-07:00"},"title":{"type":"text","$t":"Facebook Page New Admin Restriction Bypass"},"summary":{"type":"text","$t":"Facebook admin page lock bypassing technique hack facebook page restriction bypass facebook page hacking technique new admin lock account facebook bypassing\u0026nbsp;\n\nWarning :- This Article is based on the social media Facebook and it is just to show the concept of how an attacker can use such techniques to bypass the Facebook restrictions for adding new admin from anonymous location and i am not "},"link":[{"rel":"replies","type":"application/atom+xml","href":"https:\/\/sniperhaxx.blogspot.com\/feeds\/2027404850064262380\/comments\/default","title":"Post Comments"},{"rel":"replies","type":"text/html","href":"https:\/\/sniperhaxx.blogspot.com\/2014\/10\/bypass-facebook-page-new-admin.html#comment-form","title":"6 Comments"},{"rel":"edit","type":"application/atom+xml","href":"https:\/\/www.blogger.com\/feeds\/3549945082353733982\/posts\/default\/2027404850064262380"},{"rel":"self","type":"application/atom+xml","href":"https:\/\/www.blogger.com\/feeds\/3549945082353733982\/posts\/default\/2027404850064262380"},{"rel":"alternate","type":"text/html","href":"https:\/\/sniperhaxx.blogspot.com\/2014\/10\/bypass-facebook-page-new-admin.html","title":"Facebook Page New Admin Restriction Bypass"}],"author":[{"name":{"$t":"ahmed mehtab"},"uri":{"$t":"http:\/\/www.blogger.com\/profile\/02191953907257374209"},"email":{"$t":"noreply@blogger.com"},"gd$image":{"rel":"http://schemas.google.com/g/2005#thumbnail","width":"16","height":"16","src":"https:\/\/img1.blogblog.com\/img\/b16-rounded.gif"}}],"thr$total":{"$t":"6"}},{"id":{"$t":"tag:blogger.com,1999:blog-3549945082353733982.post-1403992667132752083"},"published":{"$t":"2014-10-09T09:10:00.000-07:00"},"updated":{"$t":"2014-10-09T09:20:07.171-07:00"},"title":{"type":"text","$t":"SMS Spoofing Tutorial"},"summary":{"type":"text","$t":"sms spoofing free sms spoofing tutorial tamper data sms spoofing how to spoof sms free sms send sms from any number sms spoofing tutorial free private 0day sms spoofing tutorial for free sms send\n\n\n\nHow To Spoof SMS for Free\n\n\n\nI love Social Engineering and today i am going to share my idea that how i spoof sms for free using a simple technique.\n\n\n\nLets Start\u0026nbsp;\n\n\n\nWhat You Need ?\u0026nbsp;\n\n\n"},"link":[{"rel":"replies","type":"application/atom+xml","href":"https:\/\/sniperhaxx.blogspot.com\/feeds\/1403992667132752083\/comments\/default","title":"Post Comments"},{"rel":"replies","type":"text/html","href":"https:\/\/sniperhaxx.blogspot.com\/2014\/10\/sms-spoofing-tutorial.html#comment-form","title":"21 Comments"},{"rel":"edit","type":"application/atom+xml","href":"https:\/\/www.blogger.com\/feeds\/3549945082353733982\/posts\/default\/1403992667132752083"},{"rel":"self","type":"application/atom+xml","href":"https:\/\/www.blogger.com\/feeds\/3549945082353733982\/posts\/default\/1403992667132752083"},{"rel":"alternate","type":"text/html","href":"https:\/\/sniperhaxx.blogspot.com\/2014\/10\/sms-spoofing-tutorial.html","title":"SMS Spoofing Tutorial"}],"author":[{"name":{"$t":"ahmed mehtab"},"uri":{"$t":"http:\/\/www.blogger.com\/profile\/02191953907257374209"},"email":{"$t":"noreply@blogger.com"},"gd$image":{"rel":"http://schemas.google.com/g/2005#thumbnail","width":"16","height":"16","src":"https:\/\/img1.blogblog.com\/img\/b16-rounded.gif"}}],"media$thumbnail":{"xmlns$media":"http://search.yahoo.com/mrss/","url":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEg7kCRIuUJeIE1i6UYFdJ9uTAlf5N9YTPbdj7ZOuLKzA1I_lD2wx7y7IjTtAR4HWe0iWtZ0aFbpjZ8PuDCCPe9wGTkGSfYNXHwVSsw7SarsH3oM2c9wORNkamQN-xdNE1X9M3kbQ2nd7IE\/s72-c\/1122.PNG","height":"72","width":"72"},"thr$total":{"$t":"21"}},{"id":{"$t":"tag:blogger.com,1999:blog-3549945082353733982.post-6201245988642602551"},"published":{"$t":"2014-10-09T08:17:00.001-07:00"},"updated":{"$t":"2014-10-09T08:18:09.073-07:00"},"title":{"type":"text","$t":"How to find WPS Enabled Routers - Kali Linux"},"summary":{"type":"text","$t":"wps enabled router find wps enable dsl modem wps enable reaver hacking tutorial wifi wps enabled router push button reaver hacking password hack wifi hacking tutorial find wps how to find wps wifi\n\n\n\nHow Could You Find WPS Enabled Routers ?\u0026nbsp;\n\nSeriously its very easy to find wps enabled routers but after i posted my tutorial on how to hack wpa\/wpa2 protected wifi many peoples messaged me for "},"link":[{"rel":"replies","type":"application/atom+xml","href":"https:\/\/sniperhaxx.blogspot.com\/feeds\/6201245988642602551\/comments\/default","title":"Post Comments"},{"rel":"replies","type":"text/html","href":"https:\/\/sniperhaxx.blogspot.com\/2014\/10\/how-to-find-wps-enabled-routers-kali.html#comment-form","title":"3 Comments"},{"rel":"edit","type":"application/atom+xml","href":"https:\/\/www.blogger.com\/feeds\/3549945082353733982\/posts\/default\/6201245988642602551"},{"rel":"self","type":"application/atom+xml","href":"https:\/\/www.blogger.com\/feeds\/3549945082353733982\/posts\/default\/6201245988642602551"},{"rel":"alternate","type":"text/html","href":"https:\/\/sniperhaxx.blogspot.com\/2014\/10\/how-to-find-wps-enabled-routers-kali.html","title":"How to find WPS Enabled Routers - Kali Linux"}],"author":[{"name":{"$t":"ahmed mehtab"},"uri":{"$t":"http:\/\/www.blogger.com\/profile\/02191953907257374209"},"email":{"$t":"noreply@blogger.com"},"gd$image":{"rel":"http://schemas.google.com/g/2005#thumbnail","width":"16","height":"16","src":"https:\/\/img1.blogblog.com\/img\/b16-rounded.gif"}}],"thr$total":{"$t":"3"}},{"id":{"$t":"tag:blogger.com,1999:blog-3549945082353733982.post-1017979132651672147"},"published":{"$t":"2014-10-03T04:54:00.001-07:00"},"updated":{"$t":"2014-10-03T04:54:55.528-07:00"},"title":{"type":"text","$t":"Government Of Pakistan Can Open Your Facebook ID "},"summary":{"type":"text","$t":"\npakistani government can open your facebook id hack facebook pakistan fake profile report fia nr3c report fake profile on facebook hacked FIA cyber crime Pakistan report\u0026nbsp;\n\n\n\n\u003C!-- Ractangular blog --\u003E\n\n\n(adsbygoogle = window.adsbygoogle || []).push({});\n\nAs we know criminals now a days are very active in Pakistan and they are very sharp they dont use the local way to communicate with each "},"link":[{"rel":"replies","type":"application/atom+xml","href":"https:\/\/sniperhaxx.blogspot.com\/feeds\/1017979132651672147\/comments\/default","title":"Post Comments"},{"rel":"replies","type":"text/html","href":"https:\/\/sniperhaxx.blogspot.com\/2014\/10\/government-of-pakistan-can-open-your.html#comment-form","title":"5 Comments"},{"rel":"edit","type":"application/atom+xml","href":"https:\/\/www.blogger.com\/feeds\/3549945082353733982\/posts\/default\/1017979132651672147"},{"rel":"self","type":"application/atom+xml","href":"https:\/\/www.blogger.com\/feeds\/3549945082353733982\/posts\/default\/1017979132651672147"},{"rel":"alternate","type":"text/html","href":"https:\/\/sniperhaxx.blogspot.com\/2014\/10\/government-of-pakistan-can-open-your.html","title":"Government Of Pakistan Can Open Your Facebook ID "}],"author":[{"name":{"$t":"ahmed mehtab"},"uri":{"$t":"http:\/\/www.blogger.com\/profile\/02191953907257374209"},"email":{"$t":"noreply@blogger.com"},"gd$image":{"rel":"http://schemas.google.com/g/2005#thumbnail","width":"16","height":"16","src":"https:\/\/img1.blogblog.com\/img\/b16-rounded.gif"}}],"media$thumbnail":{"xmlns$media":"http://search.yahoo.com/mrss/","url":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEj9tp56Nc9Q553DyOEs5dh4pGZZpsmCmWS2C6tiEIEro84c65HZLEkgOcSj_-p0X0tyehJaqpMuBBcK8vZQrU32OEVNau-PR7mUNwnsZs-To-JC2KqALPDCPRQmrNTKBDx-MaX114TEYdI\/s72-c\/frcJBWC.png","height":"72","width":"72"},"thr$total":{"$t":"5"}},{"id":{"$t":"tag:blogger.com,1999:blog-3549945082353733982.post-788997174829811899"},"published":{"$t":"2014-10-02T21:31:00.003-07:00"},"updated":{"$t":"2014-10-02T21:36:13.040-07:00"},"title":{"type":"text","$t":"Infect Web Files With Malicious BackDoors"},"summary":{"type":"text","$t":"\nInfect web files with malicious php backdoor back connect net cat php uploader bypass backdoor infection how to infect web files with weevely \n\n\n\nbackdoors\n\nKeeping access of the web-server even after its patch is good practice and many times your php shell or backdoor could be deleted because of a patch or any other reason.\n\n\n\nToday you will learn that\u0026nbsp; HOW YOU CAN INFECT WEB PAGES OR "},"link":[{"rel":"replies","type":"application/atom+xml","href":"https:\/\/sniperhaxx.blogspot.com\/feeds\/788997174829811899\/comments\/default","title":"Post Comments"},{"rel":"replies","type":"text/html","href":"https:\/\/sniperhaxx.blogspot.com\/2014\/10\/infect-web-files-with-malicious.html#comment-form","title":"0 Comments"},{"rel":"edit","type":"application/atom+xml","href":"https:\/\/www.blogger.com\/feeds\/3549945082353733982\/posts\/default\/788997174829811899"},{"rel":"self","type":"application/atom+xml","href":"https:\/\/www.blogger.com\/feeds\/3549945082353733982\/posts\/default\/788997174829811899"},{"rel":"alternate","type":"text/html","href":"https:\/\/sniperhaxx.blogspot.com\/2014\/10\/infect-web-files-with-malicious.html","title":"Infect Web Files With Malicious BackDoors"}],"author":[{"name":{"$t":"ahmed mehtab"},"uri":{"$t":"http:\/\/www.blogger.com\/profile\/02191953907257374209"},"email":{"$t":"noreply@blogger.com"},"gd$image":{"rel":"http://schemas.google.com/g/2005#thumbnail","width":"16","height":"16","src":"https:\/\/img1.blogblog.com\/img\/b16-rounded.gif"}}],"thr$total":{"$t":"0"}},{"id":{"$t":"tag:blogger.com,1999:blog-3549945082353733982.post-6894864327164628495"},"published":{"$t":"2014-10-02T20:41:00.002-07:00"},"updated":{"$t":"2014-10-02T21:00:48.158-07:00"},"title":{"type":"text","$t":"Pakistani Hacker Ranked on the top at HackerOne"},"summary":{"type":"text","$t":"Pakistani Hacker Ranked on top 1st hacker Pakistani white hat hacker rafay baloch shameer amir hackerone top news hacking news pakistan hacking\n\n\n\n\n\nYet one after another great news for Pakistan. The Pakistani hackers are shining on the top by competing the international community of hackers on Hackerone. Recently in Past Pakistani famous white hat security researcher Mr Rafay Baloch found one "},"link":[{"rel":"replies","type":"application/atom+xml","href":"https:\/\/sniperhaxx.blogspot.com\/feeds\/6894864327164628495\/comments\/default","title":"Post Comments"},{"rel":"replies","type":"text/html","href":"https:\/\/sniperhaxx.blogspot.com\/2014\/10\/pakistani-hacker-ranked-on-top-at.html#comment-form","title":"1 Comments"},{"rel":"edit","type":"application/atom+xml","href":"https:\/\/www.blogger.com\/feeds\/3549945082353733982\/posts\/default\/6894864327164628495"},{"rel":"self","type":"application/atom+xml","href":"https:\/\/www.blogger.com\/feeds\/3549945082353733982\/posts\/default\/6894864327164628495"},{"rel":"alternate","type":"text/html","href":"https:\/\/sniperhaxx.blogspot.com\/2014\/10\/pakistani-hacker-ranked-on-top-at.html","title":"Pakistani Hacker Ranked on the top at HackerOne"}],"author":[{"name":{"$t":"ahmed mehtab"},"uri":{"$t":"http:\/\/www.blogger.com\/profile\/02191953907257374209"},"email":{"$t":"noreply@blogger.com"},"gd$image":{"rel":"http://schemas.google.com/g/2005#thumbnail","width":"16","height":"16","src":"https:\/\/img1.blogblog.com\/img\/b16-rounded.gif"}}],"media$thumbnail":{"xmlns$media":"http://search.yahoo.com/mrss/","url":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEipTiCiOFaH48I4KuJYmzjPTI84KaHU0gIPp8zWv463FVw92I9wCrVyROxhi_IWLEq_5eyfV-LPbErQkUQVI4anYLdpSoMb2R3CHYKbDR4ENlA0FICyPye2dMMBRICW8iVjrOyBytVvO9s\/s72-c\/1525534_10202408626004501_1450654243_n.jpg","height":"72","width":"72"},"thr$total":{"$t":"1"}},{"id":{"$t":"tag:blogger.com,1999:blog-3549945082353733982.post-8355113927419637871"},"published":{"$t":"2014-10-02T03:56:00.001-07:00"},"updated":{"$t":"2015-02-28T02:16:28.248-08:00"},"title":{"type":"text","$t":"Top 15 Android Hacking Apps 2014"},"summary":{"type":"text","$t":"Android hacking apps adnroid hacking application top 15 top 10 android hacking applications top ten android hacking apps turn faceniff wifikill apk download android hacking apps\nTheir are Many Hacking Apps for Android over the internet. Peoples are using\u0026nbsp;Android Phones\u0026nbsp;as a portable Hacking machine. This is the main reason that Android Phones are BAN in some companies so no one can take"},"link":[{"rel":"replies","type":"application/atom+xml","href":"https:\/\/sniperhaxx.blogspot.com\/feeds\/8355113927419637871\/comments\/default","title":"Post Comments"},{"rel":"replies","type":"text/html","href":"https:\/\/sniperhaxx.blogspot.com\/2014\/10\/top-15-android-hacking-apps-top10-2014-2015.html#comment-form","title":"219 Comments"},{"rel":"edit","type":"application/atom+xml","href":"https:\/\/www.blogger.com\/feeds\/3549945082353733982\/posts\/default\/8355113927419637871"},{"rel":"self","type":"application/atom+xml","href":"https:\/\/www.blogger.com\/feeds\/3549945082353733982\/posts\/default\/8355113927419637871"},{"rel":"alternate","type":"text/html","href":"https:\/\/sniperhaxx.blogspot.com\/2014\/10\/top-15-android-hacking-apps-top10-2014-2015.html","title":"Top 15 Android Hacking Apps 2014"}],"author":[{"name":{"$t":"ahmed mehtab"},"uri":{"$t":"http:\/\/www.blogger.com\/profile\/02191953907257374209"},"email":{"$t":"noreply@blogger.com"},"gd$image":{"rel":"http://schemas.google.com/g/2005#thumbnail","width":"16","height":"16","src":"https:\/\/img1.blogblog.com\/img\/b16-rounded.gif"}}],"media$thumbnail":{"xmlns$media":"http://search.yahoo.com/mrss/","url":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgFcnhLrGiYeApSO3on5HDHNtVhLsJEQjWAkwnbn9PDcaR37wn-7BxLcSFECtG2o6W6YITjBsPfgeSNcy-1Z2VyTgaU_CwjTXmQG9DqDqeqod1BiNWQWHfoklJ_YT6hah6epRUcmvKNeb8\/s72-c\/faceniff_901.jpg","height":"72","width":"72"},"thr$total":{"$t":"219"}},{"id":{"$t":"tag:blogger.com,1999:blog-3549945082353733982.post-5370206426616024500"},"published":{"$t":"2014-09-30T08:47:00.000-07:00"},"updated":{"$t":"2014-10-25T03:25:53.800-07:00"},"title":{"type":"text","$t":"Hack WPA\/WPA2 WIFI Passwords in 3 Steps"},"summary":{"type":"text","$t":"Reaver Hacking Wifi tutotial how to hack wifi wpa protected password 2014 working new wps hacking hack wifi wpa2 password kali linux\n\n\n\nWPA wifi hacking\n\nToday you will learn cracking of a WPA \/ WPA2 Protected Wifi Password which has WPS ( push Button ) enabled on it.\n\nWhat is Reaver ?\u0026nbsp;\nReaver is a Linux based software which bruteforce the wps pins on the router which has wps \/ Push Button "},"link":[{"rel":"replies","type":"application/atom+xml","href":"https:\/\/sniperhaxx.blogspot.com\/feeds\/5370206426616024500\/comments\/default","title":"Post Comments"},{"rel":"replies","type":"text/html","href":"https:\/\/sniperhaxx.blogspot.com\/2014\/09\/hack-wpa-wifi-password-crack-wifi.html#comment-form","title":"21 Comments"},{"rel":"edit","type":"application/atom+xml","href":"https:\/\/www.blogger.com\/feeds\/3549945082353733982\/posts\/default\/5370206426616024500"},{"rel":"self","type":"application/atom+xml","href":"https:\/\/www.blogger.com\/feeds\/3549945082353733982\/posts\/default\/5370206426616024500"},{"rel":"alternate","type":"text/html","href":"https:\/\/sniperhaxx.blogspot.com\/2014\/09\/hack-wpa-wifi-password-crack-wifi.html","title":"Hack WPA\/WPA2 WIFI Passwords in 3 Steps"}],"author":[{"name":{"$t":"ahmed mehtab"},"uri":{"$t":"http:\/\/www.blogger.com\/profile\/02191953907257374209"},"email":{"$t":"noreply@blogger.com"},"gd$image":{"rel":"http://schemas.google.com/g/2005#thumbnail","width":"16","height":"16","src":"https:\/\/img1.blogblog.com\/img\/b16-rounded.gif"}}],"media$thumbnail":{"xmlns$media":"http://search.yahoo.com/mrss/","url":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEi1co9EIA7WKbiAVTwGh8YWEoRYc0ilUbRqH-LjfhW1o5dOmkpQAVwAHj5aIHosEHs1k7ibtJDWtGcM3iQVII9NrxOFf9xSSLgFpGCQvUjRJJUlD9JErSfeX51cE-LAN_HfpNLVXbHMaLc\/s72-c\/wifi-securite-hacking-piratage-499x487.jpg","height":"72","width":"72"},"thr$total":{"$t":"21"}},{"id":{"$t":"tag:blogger.com,1999:blog-3549945082353733982.post-3551300054973810992"},"published":{"$t":"2014-09-30T06:56:00.002-07:00"},"updated":{"$t":"2014-09-30T06:56:34.484-07:00"},"title":{"type":"text","$t":"Free Internet and GPRS Tricks 2014"},"summary":{"type":"text","$t":"Free GPRS Internet trick for airtel,moblink,zong,jazz,bsnl,2014 working trick free internet access ways to bypass firewall for free internet gprs wordwide free gprs hack internet hack free droidvpn proxy gprs trick\n\u0026nbsp;\u0026nbsp; Caution :- Please make sure you have 0 balance on your mobile phone\nToday i am back with some great tricks which you can use to access free internet and no matters what "},"link":[{"rel":"replies","type":"application/atom+xml","href":"https:\/\/sniperhaxx.blogspot.com\/feeds\/3551300054973810992\/comments\/default","title":"Post Comments"},{"rel":"replies","type":"text/html","href":"https:\/\/sniperhaxx.blogspot.com\/2014\/09\/free-internet-and-gprs-tricks-2014.html#comment-form","title":"5 Comments"},{"rel":"edit","type":"application/atom+xml","href":"https:\/\/www.blogger.com\/feeds\/3549945082353733982\/posts\/default\/3551300054973810992"},{"rel":"self","type":"application/atom+xml","href":"https:\/\/www.blogger.com\/feeds\/3549945082353733982\/posts\/default\/3551300054973810992"},{"rel":"alternate","type":"text/html","href":"https:\/\/sniperhaxx.blogspot.com\/2014\/09\/free-internet-and-gprs-tricks-2014.html","title":"Free Internet and GPRS Tricks 2014"}],"author":[{"name":{"$t":"ahmed mehtab"},"uri":{"$t":"http:\/\/www.blogger.com\/profile\/02191953907257374209"},"email":{"$t":"noreply@blogger.com"},"gd$image":{"rel":"http://schemas.google.com/g/2005#thumbnail","width":"16","height":"16","src":"https:\/\/img1.blogblog.com\/img\/b16-rounded.gif"}}],"media$thumbnail":{"xmlns$media":"http://search.yahoo.com/mrss/","url":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgnVM0jyuIEoSXnl9n5SAMCHxdQtkS0BzegPVeherxtL86f5bTjvNoTIJYzhviO_weaAZDPQrutWq-EcW8MlUjH3AmmazkvY9eKHy1IpwG6NSzTZoDuQoQgUWA8-lQmKF8I7m8-aWsKC8w\/s72-c\/android-proxy-6pack.png","height":"72","width":"72"},"thr$total":{"$t":"5"}},{"id":{"$t":"tag:blogger.com,1999:blog-3549945082353733982.post-195562192572080585"},"published":{"$t":"2014-09-27T08:51:00.000-07:00"},"updated":{"$t":"2014-09-27T09:29:48.888-07:00"},"title":{"type":"text","$t":"Facebook Likes Click Jacking Tutorial + Script"},"summary":{"type":"text","$t":"facebook likes clickjacking click jacking script tutorial facebook clickjacking script click jacking how to increase facebook likes hack free trick facebook likes jacking free tutorial hacking\u0026nbsp;\n\n\n\nfacebook likes click jacking\n\n\nToday i am going to share a trick from which you can increase your face book fan page likes like hell fire. our todays topic is on how you can increase your Facebook "},"link":[{"rel":"replies","type":"application/atom+xml","href":"https:\/\/sniperhaxx.blogspot.com\/feeds\/195562192572080585\/comments\/default","title":"Post Comments"},{"rel":"replies","type":"text/html","href":"https:\/\/sniperhaxx.blogspot.com\/2014\/09\/facebook-likes-clickjacking-script-tutorial-click-jacking.html#comment-form","title":"30 Comments"},{"rel":"edit","type":"application/atom+xml","href":"https:\/\/www.blogger.com\/feeds\/3549945082353733982\/posts\/default\/195562192572080585"},{"rel":"self","type":"application/atom+xml","href":"https:\/\/www.blogger.com\/feeds\/3549945082353733982\/posts\/default\/195562192572080585"},{"rel":"alternate","type":"text/html","href":"https:\/\/sniperhaxx.blogspot.com\/2014\/09\/facebook-likes-clickjacking-script-tutorial-click-jacking.html","title":"Facebook Likes Click Jacking Tutorial + Script"}],"author":[{"name":{"$t":"ahmed mehtab"},"uri":{"$t":"http:\/\/www.blogger.com\/profile\/02191953907257374209"},"email":{"$t":"noreply@blogger.com"},"gd$image":{"rel":"http://schemas.google.com/g/2005#thumbnail","width":"16","height":"16","src":"https:\/\/img1.blogblog.com\/img\/b16-rounded.gif"}}],"media$thumbnail":{"xmlns$media":"http://search.yahoo.com/mrss/","url":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEganM8lEJBDBK-kxkD1FFncsOMcZpYMIGod5DDnAe76Z4E0JaWV_iKIN9cpoZGHYm4N0pcBGbkEJsnd7ZfFqb20yAObSX2I-sNAzCRWDIZ7dfnf7dB60NYnqw2zik6A00zAfoz-1kncDxk\/s72-c\/facebook-like-nail1.jpg","height":"72","width":"72"},"thr$total":{"$t":"30"}},{"id":{"$t":"tag:blogger.com,1999:blog-3549945082353733982.post-6594863367331558441"},"published":{"$t":"2014-09-26T08:30:00.000-07:00"},"updated":{"$t":"2015-12-24T06:51:03.353-08:00"},"title":{"type":"text","$t":"Top Ten (RAT) Remote Administration Tools "},"summary":{"type":"text","$t":"top ten remote administration rat tools darkcomet bozok rat cyber gate crack jrat jspy black shades rat download top ten rat software tools no port forward free rat free remote admin tool free full download\n\n\n\n\n\nThe Top Ten Remote Administration RAT Software's which are wild now a days because of their Stability and other great features.\n\n10 # Cyber Gate\u0026nbsp;\n\n\n\n\nCyber Gate\n\ntop ten remote "},"link":[{"rel":"replies","type":"application/atom+xml","href":"https:\/\/sniperhaxx.blogspot.com\/feeds\/6594863367331558441\/comments\/default","title":"Post Comments"},{"rel":"replies","type":"text/html","href":"https:\/\/sniperhaxx.blogspot.com\/2014\/09\/top-ten-ratremote-administration-tools.html#comment-form","title":"123 Comments"},{"rel":"edit","type":"application/atom+xml","href":"https:\/\/www.blogger.com\/feeds\/3549945082353733982\/posts\/default\/6594863367331558441"},{"rel":"self","type":"application/atom+xml","href":"https:\/\/www.blogger.com\/feeds\/3549945082353733982\/posts\/default\/6594863367331558441"},{"rel":"alternate","type":"text/html","href":"https:\/\/sniperhaxx.blogspot.com\/2014\/09\/top-ten-ratremote-administration-tools.html","title":"Top Ten (RAT) Remote Administration Tools "}],"author":[{"name":{"$t":"ahmed mehtab"},"uri":{"$t":"http:\/\/www.blogger.com\/profile\/02191953907257374209"},"email":{"$t":"noreply@blogger.com"},"gd$image":{"rel":"http://schemas.google.com/g/2005#thumbnail","width":"16","height":"16","src":"https:\/\/img1.blogblog.com\/img\/b16-rounded.gif"}}],"media$thumbnail":{"xmlns$media":"http://search.yahoo.com/mrss/","url":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgbaNX0cnBYfuFCjPGLBR3H9MhLyv4lsQrmZJs3yU38BJ3ATai0_W3bAECLG8a-qd02HG6cF42PvUUdgJsHjstWxPDL-G2KH_gygSpTDgjFOv3Z9klxHt_DntCCR8J7YxT0kbYqbO97L-E\/s72-c\/Capture.PNG","height":"72","width":"72"},"thr$total":{"$t":"123"}},{"id":{"$t":"tag:blogger.com,1999:blog-3549945082353733982.post-6796546733512357334"},"published":{"$t":"2014-09-26T07:04:00.003-07:00"},"updated":{"$t":"2015-12-24T06:52:17.773-08:00"},"title":{"type":"text","$t":"Setup DarkComet Full Tutorial + Port Forwarding Solution"},"summary":{"type":"text","$t":"Setup Darkcomet port forwarding without portforwarding full tutorial hacking how to portforward darkcomet tutorial full complete tutorial darkcomet noip dns\n\nDownload Darkcomet :\u0026nbsp;http:\/\/sniperhaxx.blogspot.com\/2015\/12\/download-darkcomet-v-51-beta-2015.html\nToday We Will Learn :-\n\n\nHow Can You Hack A Computer ?\nWhat is DNS ? And Its DNS Use In RAT ( Remote Administration Tool )\u0026nbsp;\nWhat Is "},"link":[{"rel":"replies","type":"application/atom+xml","href":"https:\/\/sniperhaxx.blogspot.com\/feeds\/6796546733512357334\/comments\/default","title":"Post Comments"},{"rel":"replies","type":"text/html","href":"https:\/\/sniperhaxx.blogspot.com\/2014\/09\/setup-darkcomet-full-tutorial-port.html#comment-form","title":"77 Comments"},{"rel":"edit","type":"application/atom+xml","href":"https:\/\/www.blogger.com\/feeds\/3549945082353733982\/posts\/default\/6796546733512357334"},{"rel":"self","type":"application/atom+xml","href":"https:\/\/www.blogger.com\/feeds\/3549945082353733982\/posts\/default\/6796546733512357334"},{"rel":"alternate","type":"text/html","href":"https:\/\/sniperhaxx.blogspot.com\/2014\/09\/setup-darkcomet-full-tutorial-port.html","title":"Setup DarkComet Full Tutorial + Port Forwarding Solution"}],"author":[{"name":{"$t":"ahmed mehtab"},"uri":{"$t":"http:\/\/www.blogger.com\/profile\/02191953907257374209"},"email":{"$t":"noreply@blogger.com"},"gd$image":{"rel":"http://schemas.google.com/g/2005#thumbnail","width":"16","height":"16","src":"https:\/\/img1.blogblog.com\/img\/b16-rounded.gif"}}],"media$thumbnail":{"xmlns$media":"http://search.yahoo.com/mrss/","url":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgy4KfDETsoAtFMSnWd8x0HfGCWms9plzokEHf-Mm95i7y91sA1EF_gtloRBahLZLNk20y8DeXj3YBmMGflai7c8Su7STJy1XxQGmNWmp11hr14FFTTm5HcNePFO9ZZv4FazATuZlINVIQ\/s72-c\/Untitled.png","height":"72","width":"72"},"thr$total":{"$t":"77"}},{"id":{"$t":"tag:blogger.com,1999:blog-3549945082353733982.post-902428593336474574"},"published":{"$t":"2014-09-19T04:13:00.001-07:00"},"updated":{"$t":"2014-09-19T05:28:15.816-07:00"},"title":{"type":"text","$t":"scan your wordpress website before someone hack it "},"summary":{"type":"text","$t":"how to \u0026nbsp;scan wordpress website hack wordpress website wordpress 0day exploit wordpress wpscan hacking website 2014 timthumb exploit scan wordpress website free wordpress online scanner free scan\nYes scan your wordpress website before some one hack your website and now a days wordpress is the most targeted cms in the world and the widely used cms because of its great futures and pro SEO "},"link":[{"rel":"replies","type":"application/atom+xml","href":"https:\/\/sniperhaxx.blogspot.com\/feeds\/902428593336474574\/comments\/default","title":"Post Comments"},{"rel":"replies","type":"text/html","href":"https:\/\/sniperhaxx.blogspot.com\/2014\/09\/exploit-wordpress-scan-wordpress-wpscan.html#comment-form","title":"5 Comments"},{"rel":"edit","type":"application/atom+xml","href":"https:\/\/www.blogger.com\/feeds\/3549945082353733982\/posts\/default\/902428593336474574"},{"rel":"self","type":"application/atom+xml","href":"https:\/\/www.blogger.com\/feeds\/3549945082353733982\/posts\/default\/902428593336474574"},{"rel":"alternate","type":"text/html","href":"https:\/\/sniperhaxx.blogspot.com\/2014\/09\/exploit-wordpress-scan-wordpress-wpscan.html","title":"scan your wordpress website before someone hack it "}],"author":[{"name":{"$t":"ahmed mehtab"},"uri":{"$t":"http:\/\/www.blogger.com\/profile\/02191953907257374209"},"email":{"$t":"noreply@blogger.com"},"gd$image":{"rel":"http://schemas.google.com/g/2005#thumbnail","width":"16","height":"16","src":"https:\/\/img1.blogblog.com\/img\/b16-rounded.gif"}}],"thr$total":{"$t":"5"}},{"id":{"$t":"tag:blogger.com,1999:blog-3549945082353733982.post-4819843523799794886"},"published":{"$t":"2014-09-18T09:25:00.002-07:00"},"updated":{"$t":"2014-09-18T09:25:21.717-07:00"},"title":{"type":"text","$t":"Trace and Catch The Person Who Hacked Your PC via RAT "},"summary":{"type":"text","$t":"Trace and Catch The Person Who Hacked Your PC via RAT\u0026nbsp;\u0026nbsp;rat darkcomet rat setup portforwarding hacked webcam led hacked pc hacked virus in pc trace hacker hacking track.\nToday i will show you the simple concept that how you can trace the fingerprints of that person who has rat ( remotely accessed ) your pc and has turned your life into hell.\nTheir are many ways of tracing that person but"},"link":[{"rel":"replies","type":"application/atom+xml","href":"https:\/\/sniperhaxx.blogspot.com\/feeds\/4819843523799794886\/comments\/default","title":"Post Comments"},{"rel":"replies","type":"text/html","href":"https:\/\/sniperhaxx.blogspot.com\/2014\/09\/trace-and-catch-person-who-hacked-your.html#comment-form","title":"4 Comments"},{"rel":"edit","type":"application/atom+xml","href":"https:\/\/www.blogger.com\/feeds\/3549945082353733982\/posts\/default\/4819843523799794886"},{"rel":"self","type":"application/atom+xml","href":"https:\/\/www.blogger.com\/feeds\/3549945082353733982\/posts\/default\/4819843523799794886"},{"rel":"alternate","type":"text/html","href":"https:\/\/sniperhaxx.blogspot.com\/2014\/09\/trace-and-catch-person-who-hacked-your.html","title":"Trace and Catch The Person Who Hacked Your PC via RAT "}],"author":[{"name":{"$t":"ahmed mehtab"},"uri":{"$t":"http:\/\/www.blogger.com\/profile\/02191953907257374209"},"email":{"$t":"noreply@blogger.com"},"gd$image":{"rel":"http://schemas.google.com/g/2005#thumbnail","width":"16","height":"16","src":"https:\/\/img1.blogblog.com\/img\/b16-rounded.gif"}}],"media$thumbnail":{"xmlns$media":"http://search.yahoo.com/mrss/","url":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhh2KULpOYSLJpLjZLBhcwBz3kUbSrYZqg3Ho4EMeaYs7FmmVzP53DhGw3Hh-ASwFEBhrKnQOTA4OOcpKpUzW9Pic64Z6CvAVezJn7OQUKVsBY-xvg6G0b7t3F-zbAZv_S3KeyayJkA-_w\/s72-c\/33.PNG","height":"72","width":"72"},"thr$total":{"$t":"4"}},{"id":{"$t":"tag:blogger.com,1999:blog-3549945082353733982.post-9202489213606993693"},"published":{"$t":"2014-09-14T08:19:00.003-07:00"},"updated":{"$t":"2014-09-14T09:23:21.056-07:00"},"title":{"type":"text","$t":"How To Setup Remote Administration Tool RAT Complete Tutorial"},"summary":{"type":"text","$t":"How To Setup Remote Administration Tool (RAT) \u0026nbsp;Complete Tutorial with port forwarding guide\n\nToday We Will Learn :-\n\n\nHow Can You Hack A Computer ?\nWhat is DNS ? And Its DNS Use In RAT ( Remote Administration Tool )\u0026nbsp;\nWhat Is UNPN \u0026nbsp;?\nHow to Setup UNPN for RATS ?\nHow To Setup DarkComet ?\nHow to Port Forward TCP\/UDP ?\nSetup Rat Without Port forwarding \u0026nbsp;\nList of the Top Ten Rats\n\n"},"link":[{"rel":"replies","type":"application/atom+xml","href":"https:\/\/sniperhaxx.blogspot.com\/feeds\/9202489213606993693\/comments\/default","title":"Post Comments"},{"rel":"replies","type":"text/html","href":"https:\/\/sniperhaxx.blogspot.com\/2014\/09\/how-to-setup-remote-administration-tool.html#comment-form","title":"12 Comments"},{"rel":"edit","type":"application/atom+xml","href":"https:\/\/www.blogger.com\/feeds\/3549945082353733982\/posts\/default\/9202489213606993693"},{"rel":"self","type":"application/atom+xml","href":"https:\/\/www.blogger.com\/feeds\/3549945082353733982\/posts\/default\/9202489213606993693"},{"rel":"alternate","type":"text/html","href":"https:\/\/sniperhaxx.blogspot.com\/2014\/09\/how-to-setup-remote-administration-tool.html","title":"How To Setup Remote Administration Tool RAT Complete Tutorial"}],"author":[{"name":{"$t":"ahmed mehtab"},"uri":{"$t":"http:\/\/www.blogger.com\/profile\/02191953907257374209"},"email":{"$t":"noreply@blogger.com"},"gd$image":{"rel":"http://schemas.google.com/g/2005#thumbnail","width":"16","height":"16","src":"https:\/\/img1.blogblog.com\/img\/b16-rounded.gif"}}],"media$thumbnail":{"xmlns$media":"http://search.yahoo.com/mrss/","url":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgy4KfDETsoAtFMSnWd8x0HfGCWms9plzokEHf-Mm95i7y91sA1EF_gtloRBahLZLNk20y8DeXj3YBmMGflai7c8Su7STJy1XxQGmNWmp11hr14FFTTm5HcNePFO9ZZv4FazATuZlINVIQ\/s72-c\/Untitled.png","height":"72","width":"72"},"thr$total":{"$t":"12"}},{"id":{"$t":"tag:blogger.com,1999:blog-3549945082353733982.post-2561515271813892587"},"published":{"$t":"2014-09-13T08:07:00.001-07:00"},"updated":{"$t":"2014-10-18T08:52:17.584-07:00"},"title":{"type":"text","$t":"Bypass the Uploaders to upload shell \/ virus "},"summary":{"type":"text","$t":"Bypassing bypass uploaders shell bypass to upload shell bypass bypass restricted file upload php shell asp shell upload bypass uploading shell bypass 404 symlink bypass.\nToday i want to share some techniques which i use to bypass the uploaders to upload shell i hope you will find this article informative.\n\nHackers always try to find a way inside to exploit and upload their shell to the server or "},"link":[{"rel":"replies","type":"application/atom+xml","href":"https:\/\/sniperhaxx.blogspot.com\/feeds\/2561515271813892587\/comments\/default","title":"Post Comments"},{"rel":"replies","type":"text/html","href":"https:\/\/sniperhaxx.blogspot.com\/2014\/09\/bypass-uploaders-to-upload-shell-virus.html#comment-form","title":"11 Comments"},{"rel":"edit","type":"application/atom+xml","href":"https:\/\/www.blogger.com\/feeds\/3549945082353733982\/posts\/default\/2561515271813892587"},{"rel":"self","type":"application/atom+xml","href":"https:\/\/www.blogger.com\/feeds\/3549945082353733982\/posts\/default\/2561515271813892587"},{"rel":"alternate","type":"text/html","href":"https:\/\/sniperhaxx.blogspot.com\/2014\/09\/bypass-uploaders-to-upload-shell-virus.html","title":"Bypass the Uploaders to upload shell \/ virus "}],"author":[{"name":{"$t":"ahmed mehtab"},"uri":{"$t":"http:\/\/www.blogger.com\/profile\/02191953907257374209"},"email":{"$t":"noreply@blogger.com"},"gd$image":{"rel":"http://schemas.google.com/g/2005#thumbnail","width":"16","height":"16","src":"https:\/\/img1.blogblog.com\/img\/b16-rounded.gif"}}],"thr$total":{"$t":"11"}},{"id":{"$t":"tag:blogger.com,1999:blog-3549945082353733982.post-1779300039864340198"},"published":{"$t":"2014-09-12T07:34:00.000-07:00"},"updated":{"$t":"2014-09-19T03:20:13.107-07:00"},"title":{"type":"text","$t":"Most Dangerous DDOS Attacking tool in the world"},"summary":{"type":"text","$t":"\n\nDDOS tool xerxes dangerous ddos tool powerfull ddos tool botnet ddos online download ddos tool\u0026nbsp;\nXERXES ddos tool tutorial ddos tutorial complete guide to take down server\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\nMost Dangerous DDOS Attacking tool in the world\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\nMost Dangerous DDOS attacking BotNet Tool in the world\n\n\u0026nbsp; \u0026nbsp; \u0026nbsp; \u0026nbsp;Yes the world,s most dangerous DDOS botnet "},"link":[{"rel":"replies","type":"application/atom+xml","href":"https:\/\/sniperhaxx.blogspot.com\/feeds\/1779300039864340198\/comments\/default","title":"Post Comments"},{"rel":"replies","type":"text/html","href":"https:\/\/sniperhaxx.blogspot.com\/2014\/09\/most-dangerous-ddos-attacking-tool-in.html#comment-form","title":"19 Comments"},{"rel":"edit","type":"application/atom+xml","href":"https:\/\/www.blogger.com\/feeds\/3549945082353733982\/posts\/default\/1779300039864340198"},{"rel":"self","type":"application/atom+xml","href":"https:\/\/www.blogger.com\/feeds\/3549945082353733982\/posts\/default\/1779300039864340198"},{"rel":"alternate","type":"text/html","href":"https:\/\/sniperhaxx.blogspot.com\/2014\/09\/most-dangerous-ddos-attacking-tool-in.html","title":"Most Dangerous DDOS Attacking tool in the world"}],"author":[{"name":{"$t":"ahmed mehtab"},"uri":{"$t":"http:\/\/www.blogger.com\/profile\/02191953907257374209"},"email":{"$t":"noreply@blogger.com"},"gd$image":{"rel":"http://schemas.google.com/g/2005#thumbnail","width":"16","height":"16","src":"https:\/\/img1.blogblog.com\/img\/b16-rounded.gif"}}],"thr$total":{"$t":"19"}},{"id":{"$t":"tag:blogger.com,1999:blog-3549945082353733982.post-1121861618558165906"},"published":{"$t":"2014-09-12T03:16:00.005-07:00"},"updated":{"$t":"2014-09-12T03:56:23.209-07:00"},"title":{"type":"text","$t":"How A Hacker Hijacked the blogger subdomains"},"summary":{"type":"text","$t":"It is a bit old method but necessary to understand if you are learning about DNS hijacking and In Past a Pakistani Famous BlackHat hacker \" Shadow008 \" was hijacking the subdomains of blogger blogs and everyone was shocked to see how he is doing this but after a mean while he published an article about how he hijacked the blogger sub domains on his blog.\n\n\u0026nbsp; \u0026nbsp; \u0026nbsp; \u0026nbsp; \u0026nbsp; \u0026nbsp;"},"link":[{"rel":"replies","type":"application/atom+xml","href":"https:\/\/sniperhaxx.blogspot.com\/feeds\/1121861618558165906\/comments\/default","title":"Post Comments"},{"rel":"replies","type":"text/html","href":"https:\/\/sniperhaxx.blogspot.com\/2014\/09\/how-hacker-hijacked-blogger-subdomains.html#comment-form","title":"10 Comments"},{"rel":"edit","type":"application/atom+xml","href":"https:\/\/www.blogger.com\/feeds\/3549945082353733982\/posts\/default\/1121861618558165906"},{"rel":"self","type":"application/atom+xml","href":"https:\/\/www.blogger.com\/feeds\/3549945082353733982\/posts\/default\/1121861618558165906"},{"rel":"alternate","type":"text/html","href":"https:\/\/sniperhaxx.blogspot.com\/2014\/09\/how-hacker-hijacked-blogger-subdomains.html","title":"How A Hacker Hijacked the blogger subdomains"}],"author":[{"name":{"$t":"ahmed mehtab"},"uri":{"$t":"http:\/\/www.blogger.com\/profile\/02191953907257374209"},"email":{"$t":"noreply@blogger.com"},"gd$image":{"rel":"http://schemas.google.com/g/2005#thumbnail","width":"16","height":"16","src":"https:\/\/img1.blogblog.com\/img\/b16-rounded.gif"}}],"thr$total":{"$t":"10"}},{"id":{"$t":"tag:blogger.com,1999:blog-3549945082353733982.post-490046591591160302"},"published":{"$t":"2014-09-06T02:06:00.001-07:00"},"updated":{"$t":"2014-09-06T02:06:34.134-07:00"},"title":{"type":"text","$t":"Online Fastest Admin Panel Finder"},"summary":{"type":"text","$t":"\n\n\nMany of my friends were asking me to built an online Admin Finder for them so guys here is an online admin finder which is very fast and i hope that you will like it.\n\n\nhttp:\/\/websiteadminfinder.tk\n"},"link":[{"rel":"replies","type":"application/atom+xml","href":"https:\/\/sniperhaxx.blogspot.com\/feeds\/490046591591160302\/comments\/default","title":"Post Comments"},{"rel":"replies","type":"text/html","href":"https:\/\/sniperhaxx.blogspot.com\/2014\/09\/online-fastest-admin-panel-finder.html#comment-form","title":"4 Comments"},{"rel":"edit","type":"application/atom+xml","href":"https:\/\/www.blogger.com\/feeds\/3549945082353733982\/posts\/default\/490046591591160302"},{"rel":"self","type":"application/atom+xml","href":"https:\/\/www.blogger.com\/feeds\/3549945082353733982\/posts\/default\/490046591591160302"},{"rel":"alternate","type":"text/html","href":"https:\/\/sniperhaxx.blogspot.com\/2014\/09\/online-fastest-admin-panel-finder.html","title":"Online Fastest Admin Panel Finder"}],"author":[{"name":{"$t":"ahmed mehtab"},"uri":{"$t":"http:\/\/www.blogger.com\/profile\/02191953907257374209"},"email":{"$t":"noreply@blogger.com"},"gd$image":{"rel":"http://schemas.google.com/g/2005#thumbnail","width":"16","height":"16","src":"https:\/\/img1.blogblog.com\/img\/b16-rounded.gif"}}],"media$thumbnail":{"xmlns$media":"http://search.yahoo.com/mrss/","url":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEj06Ygxg9L3M4ZBQybpXKu_pASd-p0UM9XhD9JwsJ1rzlckj-6aUcvDJe4ImXi-QkPkkc_Wi4rhbWIm87m8AQuxfnYmtSNr7i2ZybI0xSSceitSlYLsK2N3dKO0TrYK8ZK8mNL7gPCvXog\/s72-c\/Capture.PNG","height":"72","width":"72"},"thr$total":{"$t":"4"}},{"id":{"$t":"tag:blogger.com,1999:blog-3549945082353733982.post-3430218098001789414"},"published":{"$t":"2014-09-04T09:27:00.001-07:00"},"updated":{"$t":"2014-10-12T11:48:45.984-07:00"},"title":{"type":"text","$t":"Fresh 5000 SQLi Vulnerable sites List for Hacking latest 2014"},"summary":{"type":"text","$t":"\n\nFresh List of Sqli Vulnerable websites list sql exploit havij hacking fresh sqli market shop sqli list exploits\nshop?id= inurl shop id= checkout?id= sqli\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\u003C!-- Ractangular blog --\u003E\n\nThe list of all those website,s is published not because to pertest but to inform the web owners about the vulnerability so they can patch it and i am not responsible for any of your reaction "},"link":[{"rel":"replies","type":"application/atom+xml","href":"https:\/\/sniperhaxx.blogspot.com\/feeds\/3430218098001789414\/comments\/default","title":"Post Comments"},{"rel":"replies","type":"text/html","href":"https:\/\/sniperhaxx.blogspot.com\/2014\/09\/5000-fresh-sqli-vulnerable-websites.html#comment-form","title":"24 Comments"},{"rel":"edit","type":"application/atom+xml","href":"https:\/\/www.blogger.com\/feeds\/3549945082353733982\/posts\/default\/3430218098001789414"},{"rel":"self","type":"application/atom+xml","href":"https:\/\/www.blogger.com\/feeds\/3549945082353733982\/posts\/default\/3430218098001789414"},{"rel":"alternate","type":"text/html","href":"https:\/\/sniperhaxx.blogspot.com\/2014\/09\/5000-fresh-sqli-vulnerable-websites.html","title":"Fresh 5000 SQLi Vulnerable sites List for Hacking latest 2014"}],"author":[{"name":{"$t":"ahmed mehtab"},"uri":{"$t":"http:\/\/www.blogger.com\/profile\/02191953907257374209"},"email":{"$t":"noreply@blogger.com"},"gd$image":{"rel":"http://schemas.google.com/g/2005#thumbnail","width":"16","height":"16","src":"https:\/\/img1.blogblog.com\/img\/b16-rounded.gif"}}],"media$thumbnail":{"xmlns$media":"http://search.yahoo.com/mrss/","url":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEi3ZGpiyfAYV2k4PnE41ULZ2CH7ort5RjR_mTwmY_Og-PE9j_iWZlfV_lRFOC329Z8rMbWcglKQO0obObi-R3XqvXosUTww47cO6GfxkJGeFcrM8_R9r0b7vqsJD1bm3NbET-_Sje-8FRs\/s72-c\/matrix-mundo-widescreen-original-834379.jpg","height":"72","width":"72"},"thr$total":{"$t":"24"}},{"id":{"$t":"tag:blogger.com,1999:blog-3549945082353733982.post-3871737075093385132"},"published":{"$t":"2014-09-03T11:33:00.002-07:00"},"updated":{"$t":"2014-09-30T02:43:02.638-07:00"},"category":[{"scheme":"http://www.blogger.com/atom/ns#","term":"Free Internet Trick"}],"title":{"type":"text","$t":"10 Free GPRS \/ Internet Tricks working world wide on any network"},"summary":{"type":"text","$t":"Free GPRS Internet trick for airtel,moblink,zong,jazz,bsnl,2014 working trick free internet access ways to bypass firewall for free internet gprs wordwide free gprs hack internet hack free droidvpn proxy gprs trick\n\u0026nbsp;\u0026nbsp; Caution :- Please make sure you have 0 balance on your mobile phone\n\n\nToday i am back with some great tricks which you can use to access free internet and no matters what "},"link":[{"rel":"replies","type":"application/atom+xml","href":"https:\/\/sniperhaxx.blogspot.com\/feeds\/3871737075093385132\/comments\/default","title":"Post Comments"},{"rel":"replies","type":"text/html","href":"https:\/\/sniperhaxx.blogspot.com\/2014\/09\/free-gprs-internet-trick-working-world.html#comment-form","title":"84 Comments"},{"rel":"edit","type":"application/atom+xml","href":"https:\/\/www.blogger.com\/feeds\/3549945082353733982\/posts\/default\/3871737075093385132"},{"rel":"self","type":"application/atom+xml","href":"https:\/\/www.blogger.com\/feeds\/3549945082353733982\/posts\/default\/3871737075093385132"},{"rel":"alternate","type":"text/html","href":"https:\/\/sniperhaxx.blogspot.com\/2014\/09\/free-gprs-internet-trick-working-world.html","title":"10 Free GPRS \/ Internet Tricks working world wide on any network"}],"author":[{"name":{"$t":"ahmed mehtab"},"uri":{"$t":"http:\/\/www.blogger.com\/profile\/02191953907257374209"},"email":{"$t":"noreply@blogger.com"},"gd$image":{"rel":"http://schemas.google.com/g/2005#thumbnail","width":"16","height":"16","src":"https:\/\/img1.blogblog.com\/img\/b16-rounded.gif"}}],"media$thumbnail":{"xmlns$media":"http://search.yahoo.com/mrss/","url":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgnVM0jyuIEoSXnl9n5SAMCHxdQtkS0BzegPVeherxtL86f5bTjvNoTIJYzhviO_weaAZDPQrutWq-EcW8MlUjH3AmmazkvY9eKHy1IpwG6NSzTZoDuQoQgUWA8-lQmKF8I7m8-aWsKC8w\/s72-c\/android-proxy-6pack.png","height":"72","width":"72"},"thr$total":{"$t":"84"}},{"id":{"$t":"tag:blogger.com,1999:blog-3549945082353733982.post-6869362362928933722"},"published":{"$t":"2014-04-26T10:35:00.001-07:00"},"updated":{"$t":"2014-09-16T01:33:15.179-07:00"},"title":{"type":"text","$t":"J-Rat 3.4.1 Clean Version Download Latest Version of J-Rat "},"summary":{"type":"text","$t":"This is the J-Rat Clean Version Given Officaly by J-rat Team\n\u0026nbsp;This Version is almost undetected by Every Anti Virus Except 2 or 3 AV,s\n\nWarning : Do Not Scan Any File of J-Rat or J-rat Server on Virustotal or virscan type of websites use any other third party website because Virustotal type of websites share our\/your server with the anti virus companies and thats the reason your server get "},"link":[{"rel":"replies","type":"application/atom+xml","href":"https:\/\/sniperhaxx.blogspot.com\/feeds\/6869362362928933722\/comments\/default","title":"Post Comments"},{"rel":"replies","type":"text/html","href":"https:\/\/sniperhaxx.blogspot.com\/2014\/04\/j-rat-341-clean-version-download-latest.html#comment-form","title":"3 Comments"},{"rel":"edit","type":"application/atom+xml","href":"https:\/\/www.blogger.com\/feeds\/3549945082353733982\/posts\/default\/6869362362928933722"},{"rel":"self","type":"application/atom+xml","href":"https:\/\/www.blogger.com\/feeds\/3549945082353733982\/posts\/default\/6869362362928933722"},{"rel":"alternate","type":"text/html","href":"https:\/\/sniperhaxx.blogspot.com\/2014\/04\/j-rat-341-clean-version-download-latest.html","title":"J-Rat 3.4.1 Clean Version Download Latest Version of J-Rat "}],"author":[{"name":{"$t":"ahmed mehtab"},"uri":{"$t":"http:\/\/www.blogger.com\/profile\/02191953907257374209"},"email":{"$t":"noreply@blogger.com"},"gd$image":{"rel":"http://schemas.google.com/g/2005#thumbnail","width":"16","height":"16","src":"https:\/\/img1.blogblog.com\/img\/b16-rounded.gif"}}],"thr$total":{"$t":"3"}},{"id":{"$t":"tag:blogger.com,1999:blog-3549945082353733982.post-6177103941580765518"},"published":{"$t":"2013-11-12T09:27:00.003-08:00"},"updated":{"$t":"2014-09-16T01:35:12.912-07:00"},"title":{"type":"text","$t":"How To Infect Web Files (php) with Backdoors and malwares and uploaders etc "},"summary":{"type":"text","$t":"\n\nTutorial \u0026nbsp;By \u0026nbsp;Sniper haxXx\n\n\n\nSponsored by\u0026nbsp;\n\n\n\nwww.timesofhacking.com\n\n\n\n\u0026nbsp; \u0026nbsp; \u0026nbsp; \u0026nbsp; \u0026nbsp; \u0026nbsp; \u0026nbsp; \u0026nbsp; \u0026nbsp; \u0026nbsp; \u0026nbsp; \u0026nbsp; \u0026nbsp; \u0026nbsp; Voice of the IT\n\n\n\n\n\n\n\n\n\n\nToday We will Learn on How to infect files like , php , asp etc\n\nI will teach you \" infecting an invisible file uploader , infecting RFI , Infecting \u0026nbsp;remote eval, Infecting Eval , "},"link":[{"rel":"replies","type":"application/atom+xml","href":"https:\/\/sniperhaxx.blogspot.com\/feeds\/6177103941580765518\/comments\/default","title":"Post Comments"},{"rel":"replies","type":"text/html","href":"https:\/\/sniperhaxx.blogspot.com\/2013\/11\/tutorial-haxxx-sponsored-by-www.html#comment-form","title":"1 Comments"},{"rel":"edit","type":"application/atom+xml","href":"https:\/\/www.blogger.com\/feeds\/3549945082353733982\/posts\/default\/6177103941580765518"},{"rel":"self","type":"application/atom+xml","href":"https:\/\/www.blogger.com\/feeds\/3549945082353733982\/posts\/default\/6177103941580765518"},{"rel":"alternate","type":"text/html","href":"https:\/\/sniperhaxx.blogspot.com\/2013\/11\/tutorial-haxxx-sponsored-by-www.html","title":"How To Infect Web Files (php) with Backdoors and malwares and uploaders etc "}],"author":[{"name":{"$t":"Unknown"},"email":{"$t":"noreply@blogger.com"},"gd$image":{"rel":"http://schemas.google.com/g/2005#thumbnail","width":"16","height":"16","src":"https:\/\/img1.blogblog.com\/img\/b16-rounded.gif"}}],"thr$total":{"$t":"1"}},{"id":{"$t":"tag:blogger.com,1999:blog-3549945082353733982.post-9114849229708223684"},"published":{"$t":"2013-10-17T01:52:00.002-07:00"},"updated":{"$t":"2013-10-17T01:52:57.213-07:00"},"title":{"type":"text","$t":"Dexter Malware Smashes South Africa Credit Cards and sets Record"},"summary":{"type":"text","$t":"\nHeadLine:South Africa has been hit by one of the biggest cyber-fraud attacks in its history, according to the news more then 1 million\u0026nbsp;amount\u0026nbsp;has been compromised by 1 malware named DEXTER which sets record of hacking credit cards\u0026nbsp;\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\nThe payment card systems of thousands of shops, restaurants and hotels had been compromised, said the Payment Association of "},"link":[{"rel":"replies","type":"application/atom+xml","href":"https:\/\/sniperhaxx.blogspot.com\/feeds\/9114849229708223684\/comments\/default","title":"Post Comments"},{"rel":"replies","type":"text/html","href":"https:\/\/sniperhaxx.blogspot.com\/2013\/10\/dexter-malware-smashes-south-africa.html#comment-form","title":"1 Comments"},{"rel":"edit","type":"application/atom+xml","href":"https:\/\/www.blogger.com\/feeds\/3549945082353733982\/posts\/default\/9114849229708223684"},{"rel":"self","type":"application/atom+xml","href":"https:\/\/www.blogger.com\/feeds\/3549945082353733982\/posts\/default\/9114849229708223684"},{"rel":"alternate","type":"text/html","href":"https:\/\/sniperhaxx.blogspot.com\/2013\/10\/dexter-malware-smashes-south-africa.html","title":"Dexter Malware Smashes South Africa Credit Cards and sets Record"}],"author":[{"name":{"$t":"Unknown"},"email":{"$t":"noreply@blogger.com"},"gd$image":{"rel":"http://schemas.google.com/g/2005#thumbnail","width":"16","height":"16","src":"https:\/\/img1.blogblog.com\/img\/b16-rounded.gif"}}],"thr$total":{"$t":"1"}},{"id":{"$t":"tag:blogger.com,1999:blog-3549945082353733982.post-5260200615148097405"},"published":{"$t":"2013-10-16T04:15:00.000-07:00"},"updated":{"$t":"2013-10-16T04:15:55.751-07:00"},"title":{"type":"text","$t":"Breaking News: Brazil to Request Russia for permission to question Edward Snowden"},"summary":{"type":"text","$t":"\nHead LINE:Brazil today wants tobe secured from the NSA Spy program and wants to ask some deep questions from the NSA leaker Edward Snowden in Deep.\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\nBrazil’s Federal Police and a Senate investigative panel said Tuesday they want to question National Security Agency leaker Edward Snowden to learn more about the spying program that targeted Latin America’s biggest country.\n\n"},"link":[{"rel":"replies","type":"application/atom+xml","href":"https:\/\/sniperhaxx.blogspot.com\/feeds\/5260200615148097405\/comments\/default","title":"Post Comments"},{"rel":"replies","type":"text/html","href":"https:\/\/sniperhaxx.blogspot.com\/2013\/10\/breaking-news-brazil-to-request-russia.html#comment-form","title":"0 Comments"},{"rel":"edit","type":"application/atom+xml","href":"https:\/\/www.blogger.com\/feeds\/3549945082353733982\/posts\/default\/5260200615148097405"},{"rel":"self","type":"application/atom+xml","href":"https:\/\/www.blogger.com\/feeds\/3549945082353733982\/posts\/default\/5260200615148097405"},{"rel":"alternate","type":"text/html","href":"https:\/\/sniperhaxx.blogspot.com\/2013\/10\/breaking-news-brazil-to-request-russia.html","title":"Breaking News: Brazil to Request Russia for permission to question Edward Snowden"}],"author":[{"name":{"$t":"Unknown"},"email":{"$t":"noreply@blogger.com"},"gd$image":{"rel":"http://schemas.google.com/g/2005#thumbnail","width":"16","height":"16","src":"https:\/\/img1.blogblog.com\/img\/b16-rounded.gif"}}],"thr$total":{"$t":"0"}},{"id":{"$t":"tag:blogger.com,1999:blog-3549945082353733982.post-7686921190626033261"},"published":{"$t":"2013-10-16T03:59:00.003-07:00"},"updated":{"$t":"2013-10-16T04:00:52.296-07:00"},"title":{"type":"text","$t":" Anonymous Smashes Poland’s Ministry of Economy by Leaking Sensitive information "},"summary":{"type":"text","$t":"\nHeadLine:\u0026nbsp;Hackers of Anonymous have leaked a large number of files allegedly stolen from the systems of Poland’s Ministry of Economy. More precisely, the data appears to come from the servers of the Trade and Investment Promotion Sections of Polish Embassies and Consulates (trade.gov.pl)\n\n\n\nThe hacktivists claim to have obtained information on all of the organization’s global offices.\n\n“"},"link":[{"rel":"replies","type":"application/atom+xml","href":"https:\/\/sniperhaxx.blogspot.com\/feeds\/7686921190626033261\/comments\/default","title":"Post Comments"},{"rel":"replies","type":"text/html","href":"https:\/\/sniperhaxx.blogspot.com\/2013\/10\/anonymous-smashes-polands-ministry-of.html#comment-form","title":"0 Comments"},{"rel":"edit","type":"application/atom+xml","href":"https:\/\/www.blogger.com\/feeds\/3549945082353733982\/posts\/default\/7686921190626033261"},{"rel":"self","type":"application/atom+xml","href":"https:\/\/www.blogger.com\/feeds\/3549945082353733982\/posts\/default\/7686921190626033261"},{"rel":"alternate","type":"text/html","href":"https:\/\/sniperhaxx.blogspot.com\/2013\/10\/anonymous-smashes-polands-ministry-of.html","title":" Anonymous Smashes Poland’s Ministry of Economy by Leaking Sensitive information "}],"author":[{"name":{"$t":"Unknown"},"email":{"$t":"noreply@blogger.com"},"gd$image":{"rel":"http://schemas.google.com/g/2005#thumbnail","width":"16","height":"16","src":"https:\/\/img1.blogblog.com\/img\/b16-rounded.gif"}}],"thr$total":{"$t":"0"}},{"id":{"$t":"tag:blogger.com,1999:blog-3549945082353733982.post-6438953292350273199"},"published":{"$t":"2013-10-16T03:45:00.003-07:00"},"updated":{"$t":"2013-10-16T03:45:33.703-07:00"},"title":{"type":"text","$t":"Man Sentenced for 5 Months for hacking sodahead.com "},"summary":{"type":"text","$t":"\n\n\n\n38-year-old Michael Pullen of Dry Didge, Kentucky, has been sentenced to five months in prison and two years of probation after hacking into several accounts on the social networking website SodaHead.com.\n\nPullen didn’t cause any damage. Instead, he hacked into the accounts of those who posted homophobic and racist comments and replaced their posts with something less offensive,\u0026nbsp;"},"link":[{"rel":"replies","type":"application/atom+xml","href":"https:\/\/sniperhaxx.blogspot.com\/feeds\/6438953292350273199\/comments\/default","title":"Post Comments"},{"rel":"replies","type":"text/html","href":"https:\/\/sniperhaxx.blogspot.com\/2013\/10\/man-sentenced-for-5-months-for-hacking.html#comment-form","title":"0 Comments"},{"rel":"edit","type":"application/atom+xml","href":"https:\/\/www.blogger.com\/feeds\/3549945082353733982\/posts\/default\/6438953292350273199"},{"rel":"self","type":"application/atom+xml","href":"https:\/\/www.blogger.com\/feeds\/3549945082353733982\/posts\/default\/6438953292350273199"},{"rel":"alternate","type":"text/html","href":"https:\/\/sniperhaxx.blogspot.com\/2013\/10\/man-sentenced-for-5-months-for-hacking.html","title":"Man Sentenced for 5 Months for hacking sodahead.com "}],"author":[{"name":{"$t":"Unknown"},"email":{"$t":"noreply@blogger.com"},"gd$image":{"rel":"http://schemas.google.com/g/2005#thumbnail","width":"16","height":"16","src":"https:\/\/img1.blogblog.com\/img\/b16-rounded.gif"}}],"thr$total":{"$t":"0"}},{"id":{"$t":"tag:blogger.com,1999:blog-3549945082353733982.post-5766743620052258883"},"published":{"$t":"2013-10-11T01:24:00.001-07:00"},"updated":{"$t":"2013-10-11T01:24:42.954-07:00"},"title":{"type":"text","$t":"Cybrain Web Developers Hacked by Sniper haxXx"},"summary":{"type":"text","$t":"\nIndian famous Webdevelopers Cybrain IT Experts got hacked by Sniper haxXx .\n\n.#\/\u0026nbsp;http:\/\/www.cybersolutionindia.com\/\n\n.#\/\u0026nbsp;http:\/\/www.zone-h.org\/archive\/notifier=Sniper%20haxXx\u0026nbsp; mirror\n\nWebsite database is also in our DB prison :) \/...~ its a protest for Kashmir and we will fight till we last. and we have also targeted your customers :) and also grabed their database.\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n"},"link":[{"rel":"replies","type":"application/atom+xml","href":"https:\/\/sniperhaxx.blogspot.com\/feeds\/5766743620052258883\/comments\/default","title":"Post Comments"},{"rel":"replies","type":"text/html","href":"https:\/\/sniperhaxx.blogspot.com\/2013\/10\/cybrain-web-developers-hacked-by-sniper.html#comment-form","title":"3 Comments"},{"rel":"edit","type":"application/atom+xml","href":"https:\/\/www.blogger.com\/feeds\/3549945082353733982\/posts\/default\/5766743620052258883"},{"rel":"self","type":"application/atom+xml","href":"https:\/\/www.blogger.com\/feeds\/3549945082353733982\/posts\/default\/5766743620052258883"},{"rel":"alternate","type":"text/html","href":"https:\/\/sniperhaxx.blogspot.com\/2013\/10\/cybrain-web-developers-hacked-by-sniper.html","title":"Cybrain Web Developers Hacked by Sniper haxXx"}],"author":[{"name":{"$t":"Unknown"},"email":{"$t":"noreply@blogger.com"},"gd$image":{"rel":"http://schemas.google.com/g/2005#thumbnail","width":"16","height":"16","src":"https:\/\/img1.blogblog.com\/img\/b16-rounded.gif"}}],"media$thumbnail":{"xmlns$media":"http://search.yahoo.com/mrss/","url":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEiCegsyIQQKCKzsAKE7xndtLCysZnJ9rKtTta821W1NeJE-4_TimZ-d3WUY1ubqpdVFA5Oc6Lz1mPvxxOCdHo-5y3dI_lmuuAy0nogDXPcq5PTFM-w0NOZJXTuFaM6j-DFM9bDFpN0ljBMZ\/s72-c\/Capture.PNG","height":"72","width":"72"},"thr$total":{"$t":"3"}},{"id":{"$t":"tag:blogger.com,1999:blog-3549945082353733982.post-1106757168576524383"},"published":{"$t":"2013-10-08T03:47:00.001-07:00"},"updated":{"$t":"2013-10-08T03:47:15.998-07:00"},"title":{"type":"text","$t":"AVG , AVIRA , Whats APP Hacked by Palestinian Hackers - Exclusive "},"summary":{"type":"text","$t":"\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\nhttp:\/\/www.avg.com\/\/\nhttp:\/\/avira.com\/\nhttp:\/\/whatsapp.com\/\n\nToday a Great News to share with you a hackers called them self KDSM TEAM from Palestin Hacked AVG anti virus website , AVIRA anti virus Website , and Whats App , the reason for hacking their website was just to give message to world that the land they called Israel is not israel its Palestine which is a truth. i dont "},"link":[{"rel":"replies","type":"application/atom+xml","href":"https:\/\/sniperhaxx.blogspot.com\/feeds\/1106757168576524383\/comments\/default","title":"Post Comments"},{"rel":"replies","type":"text/html","href":"https:\/\/sniperhaxx.blogspot.com\/2013\/10\/avg-avira-whats-app-hacked-by.html#comment-form","title":"0 Comments"},{"rel":"edit","type":"application/atom+xml","href":"https:\/\/www.blogger.com\/feeds\/3549945082353733982\/posts\/default\/1106757168576524383"},{"rel":"self","type":"application/atom+xml","href":"https:\/\/www.blogger.com\/feeds\/3549945082353733982\/posts\/default\/1106757168576524383"},{"rel":"alternate","type":"text/html","href":"https:\/\/sniperhaxx.blogspot.com\/2013\/10\/avg-avira-whats-app-hacked-by.html","title":"AVG , AVIRA , Whats APP Hacked by Palestinian Hackers - Exclusive "}],"author":[{"name":{"$t":"Unknown"},"email":{"$t":"noreply@blogger.com"},"gd$image":{"rel":"http://schemas.google.com/g/2005#thumbnail","width":"16","height":"16","src":"https:\/\/img1.blogblog.com\/img\/b16-rounded.gif"}}],"media$thumbnail":{"xmlns$media":"http://search.yahoo.com/mrss/","url":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEiRx-wDfrzAlZHDkmjLNugU33XW3vCkVKgMKGAVRDYMJtJufKFks6PBPyi3gC5oUhVo6E2kT7C8akCDvnpESQ4hYmvTPbrN1zycZjK_6bLythC2_SWJVBsoarbr6dxMhPS5xwitNOWO-NeO\/s72-c\/Capture.PNG","height":"72","width":"72"},"thr$total":{"$t":"0"}},{"id":{"$t":"tag:blogger.com,1999:blog-3549945082353733982.post-962580774255191980"},"published":{"$t":"2013-10-04T03:13:00.000-07:00"},"updated":{"$t":"2013-10-04T03:13:17.460-07:00"},"title":{"type":"text","$t":"Adobe hacked, 3 million accounts compromised ( credit cards etc)"},"summary":{"type":"text","$t":"\n\n\n\nAdobe announced on Thursday that it has been the target of a major security breach in which sensitive and personal data about millions of its customers have been put at risk.\n\nBrad Arkin, senior director of security for Adobe products and services,\u0026nbsp;explained in a blog post\u0026nbsp;that the attack concerns both customer information and illegal access to source codes for \"numerous Adobe "},"link":[{"rel":"replies","type":"application/atom+xml","href":"https:\/\/sniperhaxx.blogspot.com\/feeds\/962580774255191980\/comments\/default","title":"Post Comments"},{"rel":"replies","type":"text/html","href":"https:\/\/sniperhaxx.blogspot.com\/2013\/10\/adobe-hacked-3-million-accounts.html#comment-form","title":"0 Comments"},{"rel":"edit","type":"application/atom+xml","href":"https:\/\/www.blogger.com\/feeds\/3549945082353733982\/posts\/default\/962580774255191980"},{"rel":"self","type":"application/atom+xml","href":"https:\/\/www.blogger.com\/feeds\/3549945082353733982\/posts\/default\/962580774255191980"},{"rel":"alternate","type":"text/html","href":"https:\/\/sniperhaxx.blogspot.com\/2013\/10\/adobe-hacked-3-million-accounts.html","title":"Adobe hacked, 3 million accounts compromised ( credit cards etc)"}],"author":[{"name":{"$t":"Unknown"},"email":{"$t":"noreply@blogger.com"},"gd$image":{"rel":"http://schemas.google.com/g/2005#thumbnail","width":"16","height":"16","src":"https:\/\/img1.blogblog.com\/img\/b16-rounded.gif"}}],"thr$total":{"$t":"0"}},{"id":{"$t":"tag:blogger.com,1999:blog-3549945082353733982.post-6080403958257641110"},"published":{"$t":"2013-09-26T09:41:00.003-07:00"},"updated":{"$t":"2014-09-26T07:12:05.566-07:00"},"title":{"type":"text","$t":"Setup AndroRat - RAT For Android devices "},"summary":{"type":"text","$t":"\nAndroRAT - Android Remote Administration Tool Setup Tutorial\n\nPrerequisites\n\nAndroid Developer Tools [here]\n\n\u003C!-- blog_custom_1 --\u003E\n\n\n(adsbygoogle = window.adsbygoogle || []).push({});\n\nJava Runtime Environment [here]\nAndroRAT Source [here]\nI recommend you have some previous experience with PC RATs before getting into this. I recommend following this first\nkeep your phone plugged into your PC "},"link":[{"rel":"replies","type":"application/atom+xml","href":"https:\/\/sniperhaxx.blogspot.com\/feeds\/6080403958257641110\/comments\/default","title":"Post Comments"},{"rel":"replies","type":"text/html","href":"https:\/\/sniperhaxx.blogspot.com\/2013\/09\/setup-androrat-rat-for-android-devices.html#comment-form","title":"10 Comments"},{"rel":"edit","type":"application/atom+xml","href":"https:\/\/www.blogger.com\/feeds\/3549945082353733982\/posts\/default\/6080403958257641110"},{"rel":"self","type":"application/atom+xml","href":"https:\/\/www.blogger.com\/feeds\/3549945082353733982\/posts\/default\/6080403958257641110"},{"rel":"alternate","type":"text/html","href":"https:\/\/sniperhaxx.blogspot.com\/2013\/09\/setup-androrat-rat-for-android-devices.html","title":"Setup AndroRat - RAT For Android devices "}],"author":[{"name":{"$t":"Unknown"},"email":{"$t":"noreply@blogger.com"},"gd$image":{"rel":"http://schemas.google.com/g/2005#thumbnail","width":"16","height":"16","src":"https:\/\/img1.blogblog.com\/img\/b16-rounded.gif"}}],"thr$total":{"$t":"10"}},{"id":{"$t":"tag:blogger.com,1999:blog-3549945082353733982.post-6828186263050511646"},"published":{"$t":"2013-09-11T23:56:00.001-07:00"},"updated":{"$t":"2013-09-12T00:01:48.308-07:00"},"title":{"type":"text","$t":"NASA offical website hacked by #BMPoC - breaking news "},"summary":{"type":"text","$t":"\n\ntoday earlier NSA website was hacked by\u0026nbsp;#BMPoC\n\n\n\n\n\nthe mesage posted by hackers on site was \"\u0026nbsp;We are:\u0026nbsp;Cyclone - MMxM - UT0P|4\n\n\nGreats:\u0026nbsp;Xploiter Hacker - Invectus - DIeG0\n\n\n\n\n\n\n\nStop spy on us.\n\nThe Brazilian population do not support your attitude!\n\nThe Illuminati are now visibly acting!\n\nObama heartless!\n\nInhumane! you have no family? the point in the entire global "},"link":[{"rel":"replies","type":"application/atom+xml","href":"https:\/\/sniperhaxx.blogspot.com\/feeds\/6828186263050511646\/comments\/default","title":"Post Comments"},{"rel":"replies","type":"text/html","href":"https:\/\/sniperhaxx.blogspot.com\/2013\/09\/nasa-offical-website-hacked-by-bmpoc.html#comment-form","title":"0 Comments"},{"rel":"edit","type":"application/atom+xml","href":"https:\/\/www.blogger.com\/feeds\/3549945082353733982\/posts\/default\/6828186263050511646"},{"rel":"self","type":"application/atom+xml","href":"https:\/\/www.blogger.com\/feeds\/3549945082353733982\/posts\/default\/6828186263050511646"},{"rel":"alternate","type":"text/html","href":"https:\/\/sniperhaxx.blogspot.com\/2013\/09\/nasa-offical-website-hacked-by-bmpoc.html","title":"NASA offical website hacked by #BMPoC - breaking news "}],"author":[{"name":{"$t":"Unknown"},"email":{"$t":"noreply@blogger.com"},"gd$image":{"rel":"http://schemas.google.com/g/2005#thumbnail","width":"16","height":"16","src":"https:\/\/img1.blogblog.com\/img\/b16-rounded.gif"}}],"media$thumbnail":{"xmlns$media":"http://search.yahoo.com/mrss/","url":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjZoCOyJpLRK2RKXDmpjUJF6jjYh26Jw0oiC8LRAgOgNYp1nflCKvUyFCj3Jh0eYibXMdZ8uLs5K-FiKe5KQ3bv5wkUWq1GkEory9njXGgjPlRsUhg25Z0SyT67VfQaoYp4muZHH35afYS9\/s72-c\/s.PNG","height":"72","width":"72"},"thr$total":{"$t":"0"}},{"id":{"$t":"tag:blogger.com,1999:blog-3549945082353733982.post-6245897414904125852"},"published":{"$t":"2013-09-11T07:13:00.001-07:00"},"updated":{"$t":"2013-09-11T07:13:44.565-07:00"},"title":{"type":"text","$t":"Andhra Pradesh state CIvil supplies cooperation LTD hacked by Sniper haxXx"},"summary":{"type":"text","$t":"\n\nAs i Told you that i will keep dumping indian sites till we dont get our occupied kashmir and haydrabad area we were in peace but now you ahve taken pangaa with us so keep burning your own asses black nasty indians . gay peoples\u0026nbsp;\n\n\n\n\n\n\n\n"},"link":[{"rel":"replies","type":"application/atom+xml","href":"https:\/\/sniperhaxx.blogspot.com\/feeds\/6245897414904125852\/comments\/default","title":"Post Comments"},{"rel":"replies","type":"text/html","href":"https:\/\/sniperhaxx.blogspot.com\/2013\/09\/andhra-pradesh-state-civil-supplies.html#comment-form","title":"0 Comments"},{"rel":"edit","type":"application/atom+xml","href":"https:\/\/www.blogger.com\/feeds\/3549945082353733982\/posts\/default\/6245897414904125852"},{"rel":"self","type":"application/atom+xml","href":"https:\/\/www.blogger.com\/feeds\/3549945082353733982\/posts\/default\/6245897414904125852"},{"rel":"alternate","type":"text/html","href":"https:\/\/sniperhaxx.blogspot.com\/2013\/09\/andhra-pradesh-state-civil-supplies.html","title":"Andhra Pradesh state CIvil supplies cooperation LTD hacked by Sniper haxXx"}],"author":[{"name":{"$t":"Unknown"},"email":{"$t":"noreply@blogger.com"},"gd$image":{"rel":"http://schemas.google.com/g/2005#thumbnail","width":"16","height":"16","src":"https:\/\/img1.blogblog.com\/img\/b16-rounded.gif"}}],"media$thumbnail":{"xmlns$media":"http://search.yahoo.com/mrss/","url":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjyyYpy9MXco1By65JsomKkvjnNTla6TQ4TGw33asJuMShoiMP8U9noarSs_wn2k41DHDBFCl9jbBhJ0Mxgrmpnnb2LcsfLkc04vPNhcpsUd3vE-0DyNRsFKk591XiAmcnNlux5mQ10HYRH\/s72-c\/Capture.PNG","height":"72","width":"72"},"thr$total":{"$t":"0"}},{"id":{"$t":"tag:blogger.com,1999:blog-3549945082353733982.post-534001424535126169"},"published":{"$t":"2013-09-02T08:48:00.001-07:00"},"updated":{"$t":"2014-09-14T09:44:42.780-07:00"},"title":{"type":"text","$t":"making your own google dorks for hacking - understanding dorks "},"summary":{"type":"text","$t":"\n\u0026nbsp;hi Sniper haxXx there i was going to make video tutorial with urdu voice but my micro phone got pissed so i maked article on it now how can you make dorks ? its very easy\n\ni will tell you those google dorks which are commonly used by Hackers in daily life.\nremember one thing that when ever you want to twin two dorks like if you want to join another dork with dork then you will use \u0026amp; "},"link":[{"rel":"replies","type":"application/atom+xml","href":"https:\/\/sniperhaxx.blogspot.com\/feeds\/534001424535126169\/comments\/default","title":"Post Comments"},{"rel":"replies","type":"text/html","href":"https:\/\/sniperhaxx.blogspot.com\/2013\/09\/making-your-own-google-dorks-for.html#comment-form","title":"18 Comments"},{"rel":"edit","type":"application/atom+xml","href":"https:\/\/www.blogger.com\/feeds\/3549945082353733982\/posts\/default\/534001424535126169"},{"rel":"self","type":"application/atom+xml","href":"https:\/\/www.blogger.com\/feeds\/3549945082353733982\/posts\/default\/534001424535126169"},{"rel":"alternate","type":"text/html","href":"https:\/\/sniperhaxx.blogspot.com\/2013\/09\/making-your-own-google-dorks-for.html","title":"making your own google dorks for hacking - understanding dorks "}],"author":[{"name":{"$t":"Unknown"},"email":{"$t":"noreply@blogger.com"},"gd$image":{"rel":"http://schemas.google.com/g/2005#thumbnail","width":"16","height":"16","src":"https:\/\/img1.blogblog.com\/img\/b16-rounded.gif"}}],"media$thumbnail":{"xmlns$media":"http://search.yahoo.com/mrss/","url":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjRWHqnsB9Ij-gTE7OzcexfHHJ8BThZSGwgpWTV39mOIOoF69K9Fxg884KpLD0_Zf911XfR23JfV1bfI20HMrCFoyvFNFMLiJdRpr0RrrfuptNK6MFNDOaJusAAhPXkYaYv_-zCs332w4KB\/s72-c\/1.PNG","height":"72","width":"72"},"thr$total":{"$t":"18"}},{"id":{"$t":"tag:blogger.com,1999:blog-3549945082353733982.post-3626004619388138167"},"published":{"$t":"2013-08-27T00:46:00.000-07:00"},"updated":{"$t":"2014-06-15T09:36:28.416-07:00"},"title":{"type":"text","$t":"How Khalil Hacked Zuckerberg’s page - the process"},"summary":{"type":"text","$t":"\n\n\n\n\nIt is very and very simple but only Allah has chosen Khalil to find this bug :) .. May Allah give him long life..\n\n1.goto your wall and write any message on status box but dont post.\n\n2.open inspect element and you will see your id number there like in pic\n\n\n\n\nNow replace this id with any other person id and then post your message and it will be posted on his\/her wall but this bug is now "},"link":[{"rel":"replies","type":"application/atom+xml","href":"https:\/\/sniperhaxx.blogspot.com\/feeds\/3626004619388138167\/comments\/default","title":"Post Comments"},{"rel":"replies","type":"text/html","href":"https:\/\/sniperhaxx.blogspot.com\/2013\/08\/how-khalil-hacked-zuckerbergs-page.html#comment-form","title":"3 Comments"},{"rel":"edit","type":"application/atom+xml","href":"https:\/\/www.blogger.com\/feeds\/3549945082353733982\/posts\/default\/3626004619388138167"},{"rel":"self","type":"application/atom+xml","href":"https:\/\/www.blogger.com\/feeds\/3549945082353733982\/posts\/default\/3626004619388138167"},{"rel":"alternate","type":"text/html","href":"https:\/\/sniperhaxx.blogspot.com\/2013\/08\/how-khalil-hacked-zuckerbergs-page.html","title":"How Khalil Hacked Zuckerberg’s page - the process"}],"author":[{"name":{"$t":"Unknown"},"email":{"$t":"noreply@blogger.com"},"gd$image":{"rel":"http://schemas.google.com/g/2005#thumbnail","width":"16","height":"16","src":"https:\/\/img1.blogblog.com\/img\/b16-rounded.gif"}}],"media$thumbnail":{"xmlns$media":"http://search.yahoo.com/mrss/","url":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEg1cMmJRGrWfivWsdw0gtrDSiBQp96VMo-K8VUxmHesA4iX_SHjDj33xu8QZENJmWISzkSWaUz4pUip0wW5SFXddoUFboFCXSzAzHXwxeSeSQNtCW-p8rXwz8pYcaqIOts8tQzThuZbW-Zh\/s72-c\/b.PNG","height":"72","width":"72"},"thr$total":{"$t":"3"}},{"id":{"$t":"tag:blogger.com,1999:blog-3549945082353733982.post-1575916171058498762"},"published":{"$t":"2013-08-23T23:01:00.000-07:00"},"updated":{"$t":"2013-08-23T23:01:04.778-07:00"},"title":{"type":"text","$t":"Iran Will Teach Complete Drone Hijacking To Students"},"summary":{"type":"text","$t":"\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\nIran is planning to add lessons on hunting enemy drones to its high-school curriculum.The move is part of the country's strategy to deal with the US pilotless drone programme.\"This year, we will witness changes in the contents, teachers and teaching hours of the defensive preparedness lesson,\" said senior army official Brigadier General Ali Fazli, adding that the new "},"link":[{"rel":"replies","type":"application/atom+xml","href":"https:\/\/sniperhaxx.blogspot.com\/feeds\/1575916171058498762\/comments\/default","title":"Post Comments"},{"rel":"replies","type":"text/html","href":"https:\/\/sniperhaxx.blogspot.com\/2013\/08\/iran-will-teach-complete-drone.html#comment-form","title":"0 Comments"},{"rel":"edit","type":"application/atom+xml","href":"https:\/\/www.blogger.com\/feeds\/3549945082353733982\/posts\/default\/1575916171058498762"},{"rel":"self","type":"application/atom+xml","href":"https:\/\/www.blogger.com\/feeds\/3549945082353733982\/posts\/default\/1575916171058498762"},{"rel":"alternate","type":"text/html","href":"https:\/\/sniperhaxx.blogspot.com\/2013\/08\/iran-will-teach-complete-drone.html","title":"Iran Will Teach Complete Drone Hijacking To Students"}],"author":[{"name":{"$t":"Unknown"},"email":{"$t":"noreply@blogger.com"},"gd$image":{"rel":"http://schemas.google.com/g/2005#thumbnail","width":"16","height":"16","src":"https:\/\/img1.blogblog.com\/img\/b16-rounded.gif"}}],"media$thumbnail":{"xmlns$media":"http://search.yahoo.com/mrss/","url":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjZ3BFATvK8Je2PULVzzEz-QUINnxr-dh34CcEMxLflPlbuspuAFD-u46B_EefF20BTsJllnUW1gd_hxfSTRyupm7rTJyfhWxPNj0D-612LZWZzI90Msx1zZc9l9KNVj6L41xyGqSRMQwvS\/s72-c\/Capture.PNG","height":"72","width":"72"},"thr$total":{"$t":"0"}},{"id":{"$t":"tag:blogger.com,1999:blog-3549945082353733982.post-5109233161798357818"},"published":{"$t":"2013-08-22T09:34:00.002-07:00"},"updated":{"$t":"2014-09-16T01:36:48.568-07:00"},"title":{"type":"text","$t":"How To Make Your Shell Undetectable By Uploaders and Types of Uploaders "},"summary":{"type":"text","$t":"\n\n\nToday Almost Every Hacker Use shell to gain full access to the website or server as security is going to be patched day to day and hacktivism must also be upgraded today our topic is how can we make our shell undetectable by shell detecting scripts which dont allow us to upload our shell on the server.\n\nTheir are two mostly 3 types of shell scanning scripts now a days\n\n1) The script which "},"link":[{"rel":"replies","type":"application/atom+xml","href":"https:\/\/sniperhaxx.blogspot.com\/feeds\/5109233161798357818\/comments\/default","title":"Post Comments"},{"rel":"replies","type":"text/html","href":"https:\/\/sniperhaxx.blogspot.com\/2013\/08\/how-to-make-your-shell-undetectable-by.html#comment-form","title":"0 Comments"},{"rel":"edit","type":"application/atom+xml","href":"https:\/\/www.blogger.com\/feeds\/3549945082353733982\/posts\/default\/5109233161798357818"},{"rel":"self","type":"application/atom+xml","href":"https:\/\/www.blogger.com\/feeds\/3549945082353733982\/posts\/default\/5109233161798357818"},{"rel":"alternate","type":"text/html","href":"https:\/\/sniperhaxx.blogspot.com\/2013\/08\/how-to-make-your-shell-undetectable-by.html","title":"How To Make Your Shell Undetectable By Uploaders and Types of Uploaders "}],"author":[{"name":{"$t":"Unknown"},"email":{"$t":"noreply@blogger.com"},"gd$image":{"rel":"http://schemas.google.com/g/2005#thumbnail","width":"16","height":"16","src":"https:\/\/img1.blogblog.com\/img\/b16-rounded.gif"}}],"media$thumbnail":{"xmlns$media":"http://search.yahoo.com/mrss/","url":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgp-f_Z7vrD99p-dx37-juhY0DCbPx7vRBqwf_6PNj1myRGMN2jn9aF5xGYL9DH6V9B9pX12OW2hZPosJQniICywoz6u3Oc3WZ8UG7n9nfAOocTrWATaF05MtT-Q9ApnVbh3QmpoHM4PwRz\/s72-c\/Hacker_Detected.jpeg","height":"72","width":"72"},"thr$total":{"$t":"0"}},{"id":{"$t":"tag:blogger.com,1999:blog-3549945082353733982.post-7509612704280324766"},"published":{"$t":"2013-08-12T00:47:00.001-07:00"},"updated":{"$t":"2013-08-12T00:54:36.668-07:00"},"title":{"type":"text","$t":"550 indian sites down by H4$N4!N H4XOR in 1 day"},"summary":{"type":"text","$t":"\n\n\nHell yea 550 Sites hacked by only 1 hacker from Pakistan in 1day name H4$N4!N H4XOR :) we appreciate \u0026nbsp;you dear.\non the other hand in his interview to us he also mentioned that 15aug will be the destructive day for indian cyber space. this war is now heat up due to LOC firing on Pakistani soldier from indian busterds we hope for more and more teams join the war oon 15 august.\n\nThe sites "},"link":[{"rel":"replies","type":"application/atom+xml","href":"https:\/\/sniperhaxx.blogspot.com\/feeds\/7509612704280324766\/comments\/default","title":"Post Comments"},{"rel":"replies","type":"text/html","href":"https:\/\/sniperhaxx.blogspot.com\/2013\/08\/hell-yea-550-sites-hacked-by-only-1.html#comment-form","title":"1 Comments"},{"rel":"edit","type":"application/atom+xml","href":"https:\/\/www.blogger.com\/feeds\/3549945082353733982\/posts\/default\/7509612704280324766"},{"rel":"self","type":"application/atom+xml","href":"https:\/\/www.blogger.com\/feeds\/3549945082353733982\/posts\/default\/7509612704280324766"},{"rel":"alternate","type":"text/html","href":"https:\/\/sniperhaxx.blogspot.com\/2013\/08\/hell-yea-550-sites-hacked-by-only-1.html","title":"550 indian sites down by H4$N4!N H4XOR in 1 day"}],"author":[{"name":{"$t":"Unknown"},"email":{"$t":"noreply@blogger.com"},"gd$image":{"rel":"http://schemas.google.com/g/2005#thumbnail","width":"16","height":"16","src":"https:\/\/img1.blogblog.com\/img\/b16-rounded.gif"}}],"media$thumbnail":{"xmlns$media":"http://search.yahoo.com/mrss/","url":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjI5_2WwBkfwXzA-dJr8kH_Uw6LG_yhjjrxkMrD_-8MWuEr1_qpc3yBAOZWYZUzwiZoYQ2-oDA756NX1sxUa2-xoKfh0sWSNQB2A4i87S01JWEwlJpJ4mbaTeHjSvYKx4kVsNwk4Hs5guQ8\/s72-c\/zx.PNG","height":"72","width":"72"},"thr$total":{"$t":"1"}},{"id":{"$t":"tag:blogger.com,1999:blog-3549945082353733982.post-141288851497918810"},"published":{"$t":"2013-08-07T21:17:00.000-07:00"},"updated":{"$t":"2014-10-02T01:56:27.597-07:00"},"title":{"type":"text","$t":"Democratic senator says That Obama Is Going To Close NSA Spying Programs Due to Snowden !"},"summary":{"type":"text","$t":"\n\n\n\nIn the wake of NSA leaker Edward Snowden’s recent revelations, the Obama administration may be willing to backtrack on some of its more notorious surveillance policies, Sen. Ron Wyden (D-Oregon) told reporters.\n\nThe long-time member of the Senate Intelligence Committee said Thursday that privacy and civil liberties advocates could be on the verge of “making a comeback” due to the blowback "},"link":[{"rel":"replies","type":"application/atom+xml","href":"https:\/\/sniperhaxx.blogspot.com\/feeds\/141288851497918810\/comments\/default","title":"Post Comments"},{"rel":"replies","type":"text/html","href":"https:\/\/sniperhaxx.blogspot.com\/2013\/08\/democratic-senator-says-that-obama-is.html#comment-form","title":"0 Comments"},{"rel":"edit","type":"application/atom+xml","href":"https:\/\/www.blogger.com\/feeds\/3549945082353733982\/posts\/default\/141288851497918810"},{"rel":"self","type":"application/atom+xml","href":"https:\/\/www.blogger.com\/feeds\/3549945082353733982\/posts\/default\/141288851497918810"},{"rel":"alternate","type":"text/html","href":"https:\/\/sniperhaxx.blogspot.com\/2013\/08\/democratic-senator-says-that-obama-is.html","title":"Democratic senator says That Obama Is Going To Close NSA Spying Programs Due to Snowden !"}],"author":[{"name":{"$t":"Unknown"},"email":{"$t":"noreply@blogger.com"},"gd$image":{"rel":"http://schemas.google.com/g/2005#thumbnail","width":"16","height":"16","src":"https:\/\/img1.blogblog.com\/img\/b16-rounded.gif"}}],"thr$total":{"$t":"0"}},{"id":{"$t":"tag:blogger.com,1999:blog-3549945082353733982.post-1022832833640932829"},"published":{"$t":"2013-08-04T07:09:00.002-07:00"},"updated":{"$t":"2013-08-04T07:09:41.999-07:00"},"title":{"type":"text","$t":"The Way How Syrian Electronic Army Hacked The Onion "},"summary":{"type":"text","$t":"\n\n\n\nRemember how we all thought it was weird that the rebel organization Syrian Electronic Army targeted satirical news outlet\u0026nbsp;The Onion\u0026nbsp;after successfully hacking\u0026nbsp;actual, usually reliable news sources\u0026nbsp;on Twitter? No matter how odd the choice was, here’s the truth according to The Onion: The hack attack penetrated the publication with at least three methods of phishing attacks"},"link":[{"rel":"replies","type":"application/atom+xml","href":"https:\/\/sniperhaxx.blogspot.com\/feeds\/1022832833640932829\/comments\/default","title":"Post Comments"},{"rel":"replies","type":"text/html","href":"https:\/\/sniperhaxx.blogspot.com\/2013\/08\/the-way-how-syrian-electronic-army.html#comment-form","title":"0 Comments"},{"rel":"edit","type":"application/atom+xml","href":"https:\/\/www.blogger.com\/feeds\/3549945082353733982\/posts\/default\/1022832833640932829"},{"rel":"self","type":"application/atom+xml","href":"https:\/\/www.blogger.com\/feeds\/3549945082353733982\/posts\/default\/1022832833640932829"},{"rel":"alternate","type":"text/html","href":"https:\/\/sniperhaxx.blogspot.com\/2013\/08\/the-way-how-syrian-electronic-army.html","title":"The Way How Syrian Electronic Army Hacked The Onion "}],"author":[{"name":{"$t":"Unknown"},"email":{"$t":"noreply@blogger.com"},"gd$image":{"rel":"http://schemas.google.com/g/2005#thumbnail","width":"16","height":"16","src":"https:\/\/img1.blogblog.com\/img\/b16-rounded.gif"}}],"thr$total":{"$t":"0"}},{"id":{"$t":"tag:blogger.com,1999:blog-3549945082353733982.post-3234121832456709669"},"published":{"$t":"2013-07-30T09:41:00.000-07:00"},"updated":{"$t":"2013-07-30T09:41:04.898-07:00"},"title":{"type":"text","$t":"WordPress Plugin Sql injection Vulnerability founded by Sniper haxXx"},"summary":{"type":"text","$t":"\n\nPlugin name : slidedeck lens upload Plugin\u0026nbsp;\n\nexploit : sql syntax error\n\n\n\nPath :\u0026nbsp;plugins\/slidedeck2-personal\/classes\/slidedeck-lens-upload.php\n\n\n\nGoogle dork : inurl:plugins\/slidedeck2-personal\/classes\/slidedeck-lens-upload.php\n\n\n\nFounder: Sniper haxXx\n\n\n\n"},"link":[{"rel":"replies","type":"application/atom+xml","href":"https:\/\/sniperhaxx.blogspot.com\/feeds\/3234121832456709669\/comments\/default","title":"Post Comments"},{"rel":"replies","type":"text/html","href":"https:\/\/sniperhaxx.blogspot.com\/2013\/07\/wordpress-plugin-sql-injection.html#comment-form","title":"0 Comments"},{"rel":"edit","type":"application/atom+xml","href":"https:\/\/www.blogger.com\/feeds\/3549945082353733982\/posts\/default\/3234121832456709669"},{"rel":"self","type":"application/atom+xml","href":"https:\/\/www.blogger.com\/feeds\/3549945082353733982\/posts\/default\/3234121832456709669"},{"rel":"alternate","type":"text/html","href":"https:\/\/sniperhaxx.blogspot.com\/2013\/07\/wordpress-plugin-sql-injection.html","title":"WordPress Plugin Sql injection Vulnerability founded by Sniper haxXx"}],"author":[{"name":{"$t":"Unknown"},"email":{"$t":"noreply@blogger.com"},"gd$image":{"rel":"http://schemas.google.com/g/2005#thumbnail","width":"16","height":"16","src":"https:\/\/img1.blogblog.com\/img\/b16-rounded.gif"}}],"thr$total":{"$t":"0"}},{"id":{"$t":"tag:blogger.com,1999:blog-3549945082353733982.post-8196471286776515720"},"published":{"$t":"2013-07-26T15:00:00.006-07:00"},"updated":{"$t":"2013-07-26T15:00:50.789-07:00"},"title":{"type":"text","$t":"Hackers convince bank to send $15000 wire transfer with the help of Hacked Gmail account "},"summary":{"type":"text","$t":"\n\n\n\n\n\nIt is time to enable the Google two-step authentication feature.\u0026nbsp; If the website is providing you additional security feature, it is always good to use that feature.\u0026nbsp; This news will help you to understand the risk of ignoring the additional security feature.Cybercriminals hacked the Gmail account of a Dubai based Indian expatriate Anil Abraham and used the account to convince bank"},"link":[{"rel":"replies","type":"application/atom+xml","href":"https:\/\/sniperhaxx.blogspot.com\/feeds\/8196471286776515720\/comments\/default","title":"Post Comments"},{"rel":"replies","type":"text/html","href":"https:\/\/sniperhaxx.blogspot.com\/2013\/07\/hackers-convince-bank-to-send-15000.html#comment-form","title":"1 Comments"},{"rel":"edit","type":"application/atom+xml","href":"https:\/\/www.blogger.com\/feeds\/3549945082353733982\/posts\/default\/8196471286776515720"},{"rel":"self","type":"application/atom+xml","href":"https:\/\/www.blogger.com\/feeds\/3549945082353733982\/posts\/default\/8196471286776515720"},{"rel":"alternate","type":"text/html","href":"https:\/\/sniperhaxx.blogspot.com\/2013\/07\/hackers-convince-bank-to-send-15000.html","title":"Hackers convince bank to send $15000 wire transfer with the help of Hacked Gmail account "}],"author":[{"name":{"$t":"Unknown"},"email":{"$t":"noreply@blogger.com"},"gd$image":{"rel":"http://schemas.google.com/g/2005#thumbnail","width":"16","height":"16","src":"https:\/\/img1.blogblog.com\/img\/b16-rounded.gif"}}],"media$thumbnail":{"xmlns$media":"http://search.yahoo.com/mrss/","url":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjaTa6PtttXbCWKsoDGEawyEoAR41SGOv0SpCZRoaFUmp9D21OmhVbUKcP29gPwB-UMeMJBElnhseROPfbuSir8GbZPAfPMeQ0ILR4in9JBUvFKtGv1oZFhXKXDfD1Pu56aXfbb8UdPikw\/s72-c\/hacked-gmail-account-bank-transfer.jpg","height":"72","width":"72"},"thr$total":{"$t":"1"}},{"id":{"$t":"tag:blogger.com,1999:blog-3549945082353733982.post-8412991389157393777"},"published":{"$t":"2013-07-26T14:59:00.002-07:00"},"updated":{"$t":"2013-07-26T14:59:15.147-07:00"},"title":{"type":"text","$t":"Exclusive : Viber Support page hacked by Syrian Electronic Army"},"summary":{"type":"text","$t":"\nViber is the latest App developer organization who fall victim to the Syrian Electronic Army's hacking attack.\u0026nbsp; Today, the Syrian Electronic Army(SEA) hacked into Viber Support Page and left the site defaced.\"The Israeli-based 'Viber' is spying and tracking you . We weren't able to hack all Viber systems, but most of it is designed for spying and tracking.\" Hackers said in the defaceemnt.\n\n"},"link":[{"rel":"replies","type":"application/atom+xml","href":"https:\/\/sniperhaxx.blogspot.com\/feeds\/8412991389157393777\/comments\/default","title":"Post Comments"},{"rel":"replies","type":"text/html","href":"https:\/\/sniperhaxx.blogspot.com\/2013\/07\/exclusive-viber-support-page-hacked-by.html#comment-form","title":"0 Comments"},{"rel":"edit","type":"application/atom+xml","href":"https:\/\/www.blogger.com\/feeds\/3549945082353733982\/posts\/default\/8412991389157393777"},{"rel":"self","type":"application/atom+xml","href":"https:\/\/www.blogger.com\/feeds\/3549945082353733982\/posts\/default\/8412991389157393777"},{"rel":"alternate","type":"text/html","href":"https:\/\/sniperhaxx.blogspot.com\/2013\/07\/exclusive-viber-support-page-hacked-by.html","title":"Exclusive : Viber Support page hacked by Syrian Electronic Army"}],"author":[{"name":{"$t":"Unknown"},"email":{"$t":"noreply@blogger.com"},"gd$image":{"rel":"http://schemas.google.com/g/2005#thumbnail","width":"16","height":"16","src":"https:\/\/img1.blogblog.com\/img\/b16-rounded.gif"}}],"media$thumbnail":{"xmlns$media":"http://search.yahoo.com/mrss/","url":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEiO95rW7VmzXkbgN4kEep4hNOeWo8Ffu_X1cGZP58CNyP3HZLln1AQbuHIEr6vQmETWldXMK8uDgYHn9KpV64C7MqdnW-0zJX3cT9nnALb1UcN_l3iT7ixU3hfzkdI3MyZLIVmHEsr60vQ\/s72-c\/Syrian-Electronic-army-defaced-viber.jpg","height":"72","width":"72"},"thr$total":{"$t":"0"}},{"id":{"$t":"tag:blogger.com,1999:blog-3549945082353733982.post-8628171883276307688"},"published":{"$t":"2013-07-26T14:57:00.005-07:00"},"updated":{"$t":"2013-07-26T14:57:47.608-07:00"},"title":{"type":"text","$t":"Syrian Electronic Army hacked into Daily Dot website and deleted the article about them"},"summary":{"type":"text","$t":"\nSyrian Electronic Army hacked into Dailt Dot website and removed the article about them \"Syrian Electronic Army attacks the mesaaging app Tango.me\".The attack comes after hacker sent a warning to remove a picture in that article \" Dear @dailydot, please remove the attached picture in this article www.dailydot.com\/news\/syrian-electronic-army-tango-me or we will do something you will not like it\"\n"},"link":[{"rel":"replies","type":"application/atom+xml","href":"https:\/\/sniperhaxx.blogspot.com\/feeds\/8628171883276307688\/comments\/default","title":"Post Comments"},{"rel":"replies","type":"text/html","href":"https:\/\/sniperhaxx.blogspot.com\/2013\/07\/syrian-electronic-army-hacked-into.html#comment-form","title":"0 Comments"},{"rel":"edit","type":"application/atom+xml","href":"https:\/\/www.blogger.com\/feeds\/3549945082353733982\/posts\/default\/8628171883276307688"},{"rel":"self","type":"application/atom+xml","href":"https:\/\/www.blogger.com\/feeds\/3549945082353733982\/posts\/default\/8628171883276307688"},{"rel":"alternate","type":"text/html","href":"https:\/\/sniperhaxx.blogspot.com\/2013\/07\/syrian-electronic-army-hacked-into.html","title":"Syrian Electronic Army hacked into Daily Dot website and deleted the article about them"}],"author":[{"name":{"$t":"Unknown"},"email":{"$t":"noreply@blogger.com"},"gd$image":{"rel":"http://schemas.google.com/g/2005#thumbnail","width":"16","height":"16","src":"https:\/\/img1.blogblog.com\/img\/b16-rounded.gif"}}],"media$thumbnail":{"xmlns$media":"http://search.yahoo.com/mrss/","url":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjkJvFPfi0_bz5Os5ORzyXGrWrFZe2Ks8TtLLM5YRzgTtG-3ZdBUxGNh_wPQw0tTnzgzMejhU6T-EWakFakfhSh0B3nerwAc4YxcIGBnaVCJResh0j7AirK_lBbi-majmA-w3MRQLToPdw\/s72-c\/BP1qLpWCMAAZtaW.png","height":"72","width":"72"},"thr$total":{"$t":"0"}},{"id":{"$t":"tag:blogger.com,1999:blog-3549945082353733982.post-3979134618297849344"},"published":{"$t":"2013-07-26T14:45:00.002-07:00"},"updated":{"$t":"2013-07-26T14:45:44.849-07:00"},"title":{"type":"text","$t":"Istanbul Ataturk Airport got Smashed by Hackers - very major cyber attack "},"summary":{"type":"text","$t":"\nThe passport control system at Istanbul Ataturk Airport International departure terminal was under cyber attack on Friday,\u0026nbsp;while another airport in the Turkish largest city was also affected.\n\n\n\nPassengers stood in lines for hours and plane departures were delayed, because cyberattack shutdown passport control systems at two facilities. Later Authorities has restored the systems.\n\n\n\nFew\u0026"},"link":[{"rel":"replies","type":"application/atom+xml","href":"https:\/\/sniperhaxx.blogspot.com\/feeds\/3979134618297849344\/comments\/default","title":"Post Comments"},{"rel":"replies","type":"text/html","href":"https:\/\/sniperhaxx.blogspot.com\/2013\/07\/istanbul-ataturk-airport-got-smashed-by.html#comment-form","title":"0 Comments"},{"rel":"edit","type":"application/atom+xml","href":"https:\/\/www.blogger.com\/feeds\/3549945082353733982\/posts\/default\/3979134618297849344"},{"rel":"self","type":"application/atom+xml","href":"https:\/\/www.blogger.com\/feeds\/3549945082353733982\/posts\/default\/3979134618297849344"},{"rel":"alternate","type":"text/html","href":"https:\/\/sniperhaxx.blogspot.com\/2013\/07\/istanbul-ataturk-airport-got-smashed-by.html","title":"Istanbul Ataturk Airport got Smashed by Hackers - very major cyber attack "}],"author":[{"name":{"$t":"Unknown"},"email":{"$t":"noreply@blogger.com"},"gd$image":{"rel":"http://schemas.google.com/g/2005#thumbnail","width":"16","height":"16","src":"https:\/\/img1.blogblog.com\/img\/b16-rounded.gif"}}],"media$thumbnail":{"xmlns$media":"http://search.yahoo.com/mrss/","url":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgcR94oDPt0_CTaKexUtXAIxPQ_fxLfM89uQtuNat5NScuOGUauEabILzVoJBvetmvibW7zCASN-nL4adnVeoszDIILazVgCTZ72z72OKe3I0IvhCS3Y06lalNRjbGtBipwLPyntLQjoi6k\/s72-c\/Cyber+attack+hit+Istanbul+Airport+passport+control+system.jpg","height":"72","width":"72"},"thr$total":{"$t":"0"}},{"id":{"$t":"tag:blogger.com,1999:blog-3549945082353733982.post-2961035073797795412"},"published":{"$t":"2013-07-26T14:34:00.000-07:00"},"updated":{"$t":"2013-07-26T14:34:01.033-07:00"},"title":{"type":"text","$t":"Will Russia give snowden to US - Russian President give message to US in clear words"},"summary":{"type":"text","$t":"\n\n\n\n\n\n\n\nA spokesman for President Vladimir Putin says, “Russia has never extradited anyone, and will not extradite,”.\u0026nbsp;Moscow security agency FSB is in talks with the FBI over\u0026nbsp;Snowden, but the whistleblower will not be extradited to the US.\n\n\n\nThe Russian immigration ministry granted Snowden a document this week that would allow him to leave the transit area of the Moscow airport, where "},"link":[{"rel":"replies","type":"application/atom+xml","href":"https:\/\/sniperhaxx.blogspot.com\/feeds\/2961035073797795412\/comments\/default","title":"Post Comments"},{"rel":"replies","type":"text/html","href":"https:\/\/sniperhaxx.blogspot.com\/2013\/07\/will-russia-give-snowden-to-us-russian.html#comment-form","title":"0 Comments"},{"rel":"edit","type":"application/atom+xml","href":"https:\/\/www.blogger.com\/feeds\/3549945082353733982\/posts\/default\/2961035073797795412"},{"rel":"self","type":"application/atom+xml","href":"https:\/\/www.blogger.com\/feeds\/3549945082353733982\/posts\/default\/2961035073797795412"},{"rel":"alternate","type":"text/html","href":"https:\/\/sniperhaxx.blogspot.com\/2013\/07\/will-russia-give-snowden-to-us-russian.html","title":"Will Russia give snowden to US - Russian President give message to US in clear words"}],"author":[{"name":{"$t":"Unknown"},"email":{"$t":"noreply@blogger.com"},"gd$image":{"rel":"http://schemas.google.com/g/2005#thumbnail","width":"16","height":"16","src":"https:\/\/img1.blogblog.com\/img\/b16-rounded.gif"}}],"media$thumbnail":{"xmlns$media":"http://search.yahoo.com/mrss/","url":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhkHR3qjiGiguExZWEBtLnNhK7LMVPrA_0hpNEDs3lH8NNpuWXEyV6GN5htYk2rxwfxFmmXA2fQLiqrdSFlOOPLT1TO-Sxvc-4S4kOq7nPRXpxqzaLtEQb1oz0GXGxVLVXIfvMWpqtw401S\/s72-c\/Russia+has+never+extradited+anyone+and+will+not+extradite+Snowden+to+US.jpg","height":"72","width":"72"},"thr$total":{"$t":"0"}},{"id":{"$t":"tag:blogger.com,1999:blog-3549945082353733982.post-7552347374292912940"},"published":{"$t":"2013-07-17T16:27:00.001-07:00"},"updated":{"$t":"2013-07-17T16:27:15.106-07:00"},"title":{"type":"text","$t":"Pakistan Declared Cyber Attack Against India on 15th august "},"summary":{"type":"text","$t":"\n\n\n\n\nPakistani Hackers has declared a Cyber War against india on 15th of August which is actually their independence day. Pakistani hackers says that they will attack on many important indian government and other sites and will cause the destruction on indian cyber space. Pakistan always want peace but if anyone hack their country website or abuse it Pakistani hackers never forgive them. i give "},"link":[{"rel":"replies","type":"application/atom+xml","href":"https:\/\/sniperhaxx.blogspot.com\/feeds\/7552347374292912940\/comments\/default","title":"Post Comments"},{"rel":"replies","type":"text/html","href":"https:\/\/sniperhaxx.blogspot.com\/2013\/07\/pakistan-declared-cyber-attack-against.html#comment-form","title":"0 Comments"},{"rel":"edit","type":"application/atom+xml","href":"https:\/\/www.blogger.com\/feeds\/3549945082353733982\/posts\/default\/7552347374292912940"},{"rel":"self","type":"application/atom+xml","href":"https:\/\/www.blogger.com\/feeds\/3549945082353733982\/posts\/default\/7552347374292912940"},{"rel":"alternate","type":"text/html","href":"https:\/\/sniperhaxx.blogspot.com\/2013\/07\/pakistan-declared-cyber-attack-against.html","title":"Pakistan Declared Cyber Attack Against India on 15th august "}],"author":[{"name":{"$t":"Unknown"},"email":{"$t":"noreply@blogger.com"},"gd$image":{"rel":"http://schemas.google.com/g/2005#thumbnail","width":"16","height":"16","src":"https:\/\/img1.blogblog.com\/img\/b16-rounded.gif"}}],"media$thumbnail":{"xmlns$media":"http://search.yahoo.com/mrss/","url":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgYJ2JJKZoiJRLw5EYtlJ6oMkAKgzQd5jfk8uoSZkiDLFUn1h5OfKQhc7lLCoxD8ml8kDW_-_nH5K5Pg1cXTa5hr8xuKCBz5c8cgSxVWYory984VZj-h641KR7pOXeaEs8jnqCnQgdfa8w0\/s72-c\/Capture.PNG","height":"72","width":"72"},"thr$total":{"$t":"0"}},{"id":{"$t":"tag:blogger.com,1999:blog-3549945082353733982.post-3738809398302449318"},"published":{"$t":"2013-07-02T10:56:00.001-07:00"},"updated":{"$t":"2013-07-02T10:56:25.498-07:00"},"title":{"type":"text","$t":"CNN's Political Ticker website hacked, Fake News article posted"},"summary":{"type":"text","$t":"\n\n\n\n\n\nHackers breached CNN's Political Ticker blog(politicalticker.blogs.cnn.com) and manged to post false news story titled \"Anonymous Bitcoin operator Btc-e.com goes out of business\". The fake news was posted on Friday.\n\nThe news article claimed that \"the Supreme Court of California issued a ruling on winding up of Btc-e Co.\".\n\n\n\"Under the lawsuit, the company is not a member of any "},"link":[{"rel":"replies","type":"application/atom+xml","href":"https:\/\/sniperhaxx.blogspot.com\/feeds\/3738809398302449318\/comments\/default","title":"Post Comments"},{"rel":"replies","type":"text/html","href":"https:\/\/sniperhaxx.blogspot.com\/2013\/07\/cnns-political-ticker-website-hacked.html#comment-form","title":"2 Comments"},{"rel":"edit","type":"application/atom+xml","href":"https:\/\/www.blogger.com\/feeds\/3549945082353733982\/posts\/default\/3738809398302449318"},{"rel":"self","type":"application/atom+xml","href":"https:\/\/www.blogger.com\/feeds\/3549945082353733982\/posts\/default\/3738809398302449318"},{"rel":"alternate","type":"text/html","href":"https:\/\/sniperhaxx.blogspot.com\/2013\/07\/cnns-political-ticker-website-hacked.html","title":"CNN's Political Ticker website hacked, Fake News article posted"}],"author":[{"name":{"$t":"Unknown"},"email":{"$t":"noreply@blogger.com"},"gd$image":{"rel":"http://schemas.google.com/g/2005#thumbnail","width":"16","height":"16","src":"https:\/\/img1.blogblog.com\/img\/b16-rounded.gif"}}],"thr$total":{"$t":"2"}},{"id":{"$t":"tag:blogger.com,1999:blog-3549945082353733982.post-5257048042691020233"},"published":{"$t":"2013-07-02T01:50:00.002-07:00"},"updated":{"$t":"2013-07-02T01:50:29.987-07:00"},"title":{"type":"text","$t":"Message for peace deal given to Afghan cyber army from Pak Cyber Mafia (Sniper haxXx)"},"summary":{"type":"text","$t":"\n\n\n\n\n\n\nRecent days a team of hackers from afghanistan hacked Pakisttani sites . then Pakistani hacker from Pak Cyber Mafia hacked afghan advertisement site regarding this message :-Sniper HaxXx was here with rdx\u0026nbsp;We have a message for afghan cyber army\u0026nbsp;we have noticed that from your side attacks are not being stoped\u0026nbsp;We are first Muslims and then our nations pride so we must not "},"link":[{"rel":"replies","type":"application/atom+xml","href":"https:\/\/sniperhaxx.blogspot.com\/feeds\/5257048042691020233\/comments\/default","title":"Post Comments"},{"rel":"replies","type":"text/html","href":"https:\/\/sniperhaxx.blogspot.com\/2013\/07\/message-for-peace-deal-given-to-afghan.html#comment-form","title":"2 Comments"},{"rel":"edit","type":"application/atom+xml","href":"https:\/\/www.blogger.com\/feeds\/3549945082353733982\/posts\/default\/5257048042691020233"},{"rel":"self","type":"application/atom+xml","href":"https:\/\/www.blogger.com\/feeds\/3549945082353733982\/posts\/default\/5257048042691020233"},{"rel":"alternate","type":"text/html","href":"https:\/\/sniperhaxx.blogspot.com\/2013\/07\/message-for-peace-deal-given-to-afghan.html","title":"Message for peace deal given to Afghan cyber army from Pak Cyber Mafia (Sniper haxXx)"}],"author":[{"name":{"$t":"Unknown"},"email":{"$t":"noreply@blogger.com"},"gd$image":{"rel":"http://schemas.google.com/g/2005#thumbnail","width":"16","height":"16","src":"https:\/\/img1.blogblog.com\/img\/b16-rounded.gif"}}],"media$thumbnail":{"xmlns$media":"http://search.yahoo.com/mrss/","url":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgZytopgCuv5pYXipzHBXQe7NxVfcPuskIDYrkfG14WAnZlBahoe3NNGLnPQTxmBTXNRRaub3HAPUccJb5N2VywzaTXaiVsD9r4Ea3mXw4hMBpm0HBwfaymzXTF6kUNPJ3ovAqV57Ff4iJU\/s72-c\/Capture.PNG","height":"72","width":"72"},"thr$total":{"$t":"2"}},{"id":{"$t":"tag:blogger.com,1999:blog-3549945082353733982.post-733456713155761670"},"published":{"$t":"2013-06-29T23:38:00.001-07:00"},"updated":{"$t":"2013-06-29T23:38:23.916-07:00"},"title":{"type":"text","$t":"Facebook implementing Advanced HTTPS to minimize NSA Interception"},"summary":{"type":"text","$t":"\nFor years the National Security Agency\n has successfully shielded its surveillance programs from any real \npublic scrutiny. There have been a lot of news stories about NSA \nsurveillance programs following the leaks of secret documents by Edward Snowden.\n\n\n\n\nWe have learned that the NSA is collecting millions of Americans’ phone \nrecords on a daily basis, that it operates a program called PRISM "},"link":[{"rel":"replies","type":"application/atom+xml","href":"https:\/\/sniperhaxx.blogspot.com\/feeds\/733456713155761670\/comments\/default","title":"Post Comments"},{"rel":"replies","type":"text/html","href":"https:\/\/sniperhaxx.blogspot.com\/2013\/06\/facebook-implementing-advanced-https-to.html#comment-form","title":"0 Comments"},{"rel":"edit","type":"application/atom+xml","href":"https:\/\/www.blogger.com\/feeds\/3549945082353733982\/posts\/default\/733456713155761670"},{"rel":"self","type":"application/atom+xml","href":"https:\/\/www.blogger.com\/feeds\/3549945082353733982\/posts\/default\/733456713155761670"},{"rel":"alternate","type":"text/html","href":"https:\/\/sniperhaxx.blogspot.com\/2013\/06\/facebook-implementing-advanced-https-to.html","title":"Facebook implementing Advanced HTTPS to minimize NSA Interception"}],"author":[{"name":{"$t":"Unknown"},"email":{"$t":"noreply@blogger.com"},"gd$image":{"rel":"http://schemas.google.com/g/2005#thumbnail","width":"16","height":"16","src":"https:\/\/img1.blogblog.com\/img\/b16-rounded.gif"}}],"media$thumbnail":{"xmlns$media":"http://search.yahoo.com/mrss/","url":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhmXX_xl1fpsVF4Mb0QchTfmebMSwrHkjFe6yDtBF3sp1dkBIXK3fAGlxe-vDK2rrJ1hdPmRxt5FkPjZxl6FYuOSLDxWPwAeI3oFK1aRbhK9FfBDmRhvdIwg2ogBKifERyxVI6UTmuTV808\/s72-c\/Facebook+implementing+Advanced+HTTPS+to+block+NSA+Interception.png","height":"72","width":"72"},"thr$total":{"$t":"0"}},{"id":{"$t":"tag:blogger.com,1999:blog-3549945082353733982.post-5074422117002171270"},"published":{"$t":"2013-06-29T04:12:00.000-07:00"},"updated":{"$t":"2013-06-29T04:12:04.731-07:00"},"title":{"type":"text","$t":"Stellar Wind Surveillance program under Obama administration"},"summary":{"type":"text","$t":"\n\n\u0026nbsp;\n\n\n\n\u0026nbsp;\n\nAccording to secret documents obtained by the Guardian,\u0026nbsp;Obama administration permitted the National Security Agency to surveillance\u0026nbsp;the Emails and\u0026nbsp;Internet metadata\u0026nbsp;of all Americans.\n\n\n\nThis secret warrant less surveillance program, collectively known by the NSA code name Stellar Wind, was launched in the end of 2001, to handover the data to the United "},"link":[{"rel":"replies","type":"application/atom+xml","href":"https:\/\/sniperhaxx.blogspot.com\/feeds\/5074422117002171270\/comments\/default","title":"Post Comments"},{"rel":"replies","type":"text/html","href":"https:\/\/sniperhaxx.blogspot.com\/2013\/06\/stellar-wind-surveillance-program-from.html#comment-form","title":"1 Comments"},{"rel":"edit","type":"application/atom+xml","href":"https:\/\/www.blogger.com\/feeds\/3549945082353733982\/posts\/default\/5074422117002171270"},{"rel":"self","type":"application/atom+xml","href":"https:\/\/www.blogger.com\/feeds\/3549945082353733982\/posts\/default\/5074422117002171270"},{"rel":"alternate","type":"text/html","href":"https:\/\/sniperhaxx.blogspot.com\/2013\/06\/stellar-wind-surveillance-program-from.html","title":"Stellar Wind Surveillance program under Obama administration"}],"author":[{"name":{"$t":"Unknown"},"email":{"$t":"noreply@blogger.com"},"gd$image":{"rel":"http://schemas.google.com/g/2005#thumbnail","width":"16","height":"16","src":"https:\/\/img1.blogblog.com\/img\/b16-rounded.gif"}}],"media$thumbnail":{"xmlns$media":"http://search.yahoo.com/mrss/","url":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjFLvyujoNpgwZPqi_VVsC9ApMeMw1Th50x2k07LgQTBlUFYBBanb3XsRvjJiIeaBqDOzHR2WnW1I6QtD2QsatodGAjoga_1pmE-KEdqeu__rAwehC-6Cob8pioM4klN7irZ_7elAiLXl74\/s72-c\/Stellar+Wind+Surveillance+program+from+George+W.+Bush+till+Obama+administration.jpg","height":"72","width":"72"},"thr$total":{"$t":"1"}},{"id":{"$t":"tag:blogger.com,1999:blog-3549945082353733982.post-2073201654566679995"},"published":{"$t":"2013-06-28T00:47:00.004-07:00"},"updated":{"$t":"2013-06-28T00:48:38.911-07:00"},"title":{"type":"text","$t":"Opera Internal network hacked, Thousands of users hit with malicious updates"},"summary":{"type":"text","$t":"\nHackers breached the Opera Internal network infrastructure and managed to compromise expired Opera code signing certificate. The cybercriminals used the certificate to sing their malware and distributed the malicious software to thousands of Opera users through automated update function. The malware is currently detected by half of the antivirus engines used by the virus total scanner.\u0026nbsp; "},"link":[{"rel":"replies","type":"application/atom+xml","href":"https:\/\/sniperhaxx.blogspot.com\/feeds\/2073201654566679995\/comments\/default","title":"Post Comments"},{"rel":"replies","type":"text/html","href":"https:\/\/sniperhaxx.blogspot.com\/2013\/06\/opera-internal-network-hacked-thousands.html#comment-form","title":"0 Comments"},{"rel":"edit","type":"application/atom+xml","href":"https:\/\/www.blogger.com\/feeds\/3549945082353733982\/posts\/default\/2073201654566679995"},{"rel":"self","type":"application/atom+xml","href":"https:\/\/www.blogger.com\/feeds\/3549945082353733982\/posts\/default\/2073201654566679995"},{"rel":"alternate","type":"text/html","href":"https:\/\/sniperhaxx.blogspot.com\/2013\/06\/opera-internal-network-hacked-thousands.html","title":"Opera Internal network hacked, Thousands of users hit with malicious updates"}],"author":[{"name":{"$t":"Unknown"},"email":{"$t":"noreply@blogger.com"},"gd$image":{"rel":"http://schemas.google.com/g/2005#thumbnail","width":"16","height":"16","src":"https:\/\/img1.blogblog.com\/img\/b16-rounded.gif"}}],"media$thumbnail":{"xmlns$media":"http://search.yahoo.com/mrss/","url":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEi4GQHUv3vtEnjv_v9H5yPABzJWv-YSDyVuqqi1-xoIofPU2I79D_KdhDDLBYnXYtKUXgSmIfuCSymUFGVFYjqhR1TZJTOZo32mXPVWvLRdLsYOobJEtjTqyX39TVmAkjpeMjLN3zffpZE\/s72-c\/opera-network-hacked-malware-zeus-trojan.jpg","height":"72","width":"72"},"thr$total":{"$t":"0"}},{"id":{"$t":"tag:blogger.com,1999:blog-3549945082353733982.post-998297524000945102"},"published":{"$t":"2013-06-23T20:44:00.001-07:00"},"updated":{"$t":"2013-06-23T20:44:25.039-07:00"},"title":{"type":"text","$t":"Hacker who exploits Windows 8.1 will get $100,000"},"summary":{"type":"text","$t":"\n\n\nMicrosoft finally launched a security bug Bounty Programs, is now willing to pay researchers for reporting certain type of vulnerabilities and exploitation techniques, according to official blog post. Security researcher who is able to bypass the upcoming Windows 8.1 preview version will get up to $100K USD Researcher who give \"Defensive ideas that accompany a qualifying Mitigation Bypass "},"link":[{"rel":"replies","type":"application/atom+xml","href":"https:\/\/sniperhaxx.blogspot.com\/feeds\/998297524000945102\/comments\/default","title":"Post Comments"},{"rel":"replies","type":"text/html","href":"https:\/\/sniperhaxx.blogspot.com\/2013\/06\/hacker-who-exploits-windows-81-will-get.html#comment-form","title":"0 Comments"},{"rel":"edit","type":"application/atom+xml","href":"https:\/\/www.blogger.com\/feeds\/3549945082353733982\/posts\/default\/998297524000945102"},{"rel":"self","type":"application/atom+xml","href":"https:\/\/www.blogger.com\/feeds\/3549945082353733982\/posts\/default\/998297524000945102"},{"rel":"alternate","type":"text/html","href":"https:\/\/sniperhaxx.blogspot.com\/2013\/06\/hacker-who-exploits-windows-81-will-get.html","title":"Hacker who exploits Windows 8.1 will get $100,000"}],"author":[{"name":{"$t":"Unknown"},"email":{"$t":"noreply@blogger.com"},"gd$image":{"rel":"http://schemas.google.com/g/2005#thumbnail","width":"16","height":"16","src":"https:\/\/img1.blogblog.com\/img\/b16-rounded.gif"}}],"media$thumbnail":{"xmlns$media":"http://search.yahoo.com/mrss/","url":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhImdJU1AHZWl2Ues6-j4qP3jZAuCjjtoabczNXykCG-okjr1KUNcXaIVDtw7SYfxMwCKScWhC_zjksZN8kuuvXyV-MQRqMQliNaeWMrbJfR8YNZeM_IcS3hiNCVZOwgQkqxyvhx3rrAtQ\/s72-c\/Bug-hunting-microsoft.jpg","height":"72","width":"72"},"thr$total":{"$t":"0"}},{"id":{"$t":"tag:blogger.com,1999:blog-3549945082353733982.post-2661857752888974917"},"published":{"$t":"2013-06-21T20:28:00.001-07:00"},"updated":{"$t":"2013-06-21T20:29:49.720-07:00"},"category":[{"scheme":"http://www.blogger.com/atom/ns#","term":"anonymous"},{"scheme":"http://www.blogger.com/atom/ns#","term":"crime"},{"scheme":"http://www.blogger.com/atom/ns#","term":"hackers"},{"scheme":"http://www.blogger.com/atom/ns#","term":"hacking"},{"scheme":"http://www.blogger.com/atom/ns#","term":"leakes"},{"scheme":"http://www.blogger.com/atom/ns#","term":"NSA"},{"scheme":"http://www.blogger.com/atom/ns#","term":"nsa prism"},{"scheme":"http://www.blogger.com/atom/ns#","term":"prism"},{"scheme":"http://www.blogger.com/atom/ns#","term":"prism of nsa"},{"scheme":"http://www.blogger.com/atom/ns#","term":"reports on twitter"},{"scheme":"http://www.blogger.com/atom/ns#","term":"twitter"}],"title":{"type":"text","$t":"Anonymous Leaks Documents \u0026 E-mails Used by NSA for PRISM"},"summary":{"type":"text","$t":"\n\u0026nbsp; \u0026nbsp; \u0026nbsp; \u0026nbsp; \u0026nbsp; \u0026nbsp; \u0026nbsp; \u0026nbsp; \u0026nbsp; \u0026nbsp; \u0026nbsp; \u0026nbsp; \u0026nbsp; \u0026nbsp; \u0026nbsp; \u0026nbsp; \u0026nbsp; \u0026nbsp; \u0026nbsp;\nOver the past week there has been huge tension building about the\u0026nbsp;NSA\u0026nbsp;\u0026nbsp;and the way it gets\u0026nbsp;Intel.\n\nIts come to light from main stream media that the\u0026nbsp;NSA\u0026nbsp;is said to be working along side some of the worlds biggest social networking "},"link":[{"rel":"replies","type":"application/atom+xml","href":"https:\/\/sniperhaxx.blogspot.com\/feeds\/2661857752888974917\/comments\/default","title":"Post Comments"},{"rel":"replies","type":"text/html","href":"https:\/\/sniperhaxx.blogspot.com\/2013\/06\/anonymous-leaks-documents-e-mails-used.html#comment-form","title":"1 Comments"},{"rel":"edit","type":"application/atom+xml","href":"https:\/\/www.blogger.com\/feeds\/3549945082353733982\/posts\/default\/2661857752888974917"},{"rel":"self","type":"application/atom+xml","href":"https:\/\/www.blogger.com\/feeds\/3549945082353733982\/posts\/default\/2661857752888974917"},{"rel":"alternate","type":"text/html","href":"https:\/\/sniperhaxx.blogspot.com\/2013\/06\/anonymous-leaks-documents-e-mails-used.html","title":"Anonymous Leaks Documents \u0026 E-mails Used by NSA for PRISM"}],"author":[{"name":{"$t":"Unknown"},"email":{"$t":"noreply@blogger.com"},"gd$image":{"rel":"http://schemas.google.com/g/2005#thumbnail","width":"16","height":"16","src":"https:\/\/img1.blogblog.com\/img\/b16-rounded.gif"}}],"thr$total":{"$t":"1"}},{"id":{"$t":"tag:blogger.com,1999:blog-3549945082353733982.post-7389443934518151257"},"published":{"$t":"2013-06-20T23:33:00.002-07:00"},"updated":{"$t":"2013-06-20T23:33:38.941-07:00"},"title":{"type":"text","$t":"Arab Bank of syria vlunerable to Sql injection Exposed by Sniper haxXx"},"summary":{"type":"text","$t":"\nwell my duty is to secure the muslims Omaha not to damage any thing of Muslims and i am sharing this jusst for the patch\n\nhttp:\/\/www.arabbank-syria.com\/index.php?show=etm\u0026amp;lang1=en\n"},"link":[{"rel":"replies","type":"application/atom+xml","href":"https:\/\/sniperhaxx.blogspot.com\/feeds\/7389443934518151257\/comments\/default","title":"Post Comments"},{"rel":"replies","type":"text/html","href":"https:\/\/sniperhaxx.blogspot.com\/2013\/06\/arab-bank-of-syria-vlunerable-to-sql.html#comment-form","title":"0 Comments"},{"rel":"edit","type":"application/atom+xml","href":"https:\/\/www.blogger.com\/feeds\/3549945082353733982\/posts\/default\/7389443934518151257"},{"rel":"self","type":"application/atom+xml","href":"https:\/\/www.blogger.com\/feeds\/3549945082353733982\/posts\/default\/7389443934518151257"},{"rel":"alternate","type":"text/html","href":"https:\/\/sniperhaxx.blogspot.com\/2013\/06\/arab-bank-of-syria-vlunerable-to-sql.html","title":"Arab Bank of syria vlunerable to Sql injection Exposed by Sniper haxXx"}],"author":[{"name":{"$t":"Unknown"},"email":{"$t":"noreply@blogger.com"},"gd$image":{"rel":"http://schemas.google.com/g/2005#thumbnail","width":"16","height":"16","src":"https:\/\/img1.blogblog.com\/img\/b16-rounded.gif"}}],"thr$total":{"$t":"0"}},{"id":{"$t":"tag:blogger.com,1999:blog-3549945082353733982.post-7375930975289853357"},"published":{"$t":"2013-06-20T23:31:00.000-07:00"},"updated":{"$t":"2014-09-14T09:26:17.306-07:00"},"category":[{"scheme":"http://www.blogger.com/atom/ns#","term":"lists"},{"scheme":"http://www.blogger.com/atom/ns#","term":"sql"},{"scheme":"http://www.blogger.com/atom/ns#","term":"sql injection"},{"scheme":"http://www.blogger.com/atom/ns#","term":"sql vulnerable"},{"scheme":"http://www.blogger.com/atom/ns#","term":"sqli list"}],"title":{"type":"text","$t":"Fresh list of Sql vulnerable sites list exposed by Sniper haxXx "},"summary":{"type":"text","$t":"\n\nFresh list of Sql vulnerable sites list exposed by Sniper haxXx\n\n\nhttp:\/\/shopperszone.co.in\/shop\/checkout.php?id=109\n\n\n\nhttp:\/\/tabletworld.co.in\/order.php?pid=8\n\n\n\nhttp:\/\/www.logicaltrade.co.in\/order.php?ProductId=3\n\n\n\nhttp:\/\/www.chinatoys.com.pk\/website\/buy.php?cat=2\u0026amp;id=51\u0026amp;price=0\n\n\n\nhttp:\/\/www.ampsrc.com\/gallery\/cat.asp?iCat=60\n\n\n\nhttp:\/\/www.2dnjbrigade.org\/photos\/cat.asp?iCat=42\n\n\n\n"},"link":[{"rel":"replies","type":"application/atom+xml","href":"https:\/\/sniperhaxx.blogspot.com\/feeds\/7375930975289853357\/comments\/default","title":"Post Comments"},{"rel":"replies","type":"text/html","href":"https:\/\/sniperhaxx.blogspot.com\/2013\/06\/fresh-list-of-sql-vulnerable-sites-list.html#comment-form","title":"30 Comments"},{"rel":"edit","type":"application/atom+xml","href":"https:\/\/www.blogger.com\/feeds\/3549945082353733982\/posts\/default\/7375930975289853357"},{"rel":"self","type":"application/atom+xml","href":"https:\/\/www.blogger.com\/feeds\/3549945082353733982\/posts\/default\/7375930975289853357"},{"rel":"alternate","type":"text/html","href":"https:\/\/sniperhaxx.blogspot.com\/2013\/06\/fresh-list-of-sql-vulnerable-sites-list.html","title":"Fresh list of Sql vulnerable sites list exposed by Sniper haxXx "}],"author":[{"name":{"$t":"Unknown"},"email":{"$t":"noreply@blogger.com"},"gd$image":{"rel":"http://schemas.google.com/g/2005#thumbnail","width":"16","height":"16","src":"https:\/\/img1.blogblog.com\/img\/b16-rounded.gif"}}],"thr$total":{"$t":"30"}},{"id":{"$t":"tag:blogger.com,1999:blog-3549945082353733982.post-5208621565586399587"},"published":{"$t":"2013-06-20T21:35:00.002-07:00"},"updated":{"$t":"2013-06-20T21:37:17.566-07:00"},"title":{"type":"text","$t":"Disclosing Security vulnerabilities in India"},"summary":{"type":"text","$t":"\n\nSecurity Researchers usually disclose vulnerabilities openly on the internet like full disclosure. But most often the researchers dont realise it is illegal and can be punished by law under IT act and other IPC section and it can have fatal consequences. When a researcher detects a vulnerability, he often reports to the company but most often the companies dont reply to his message. If the "},"link":[{"rel":"replies","type":"application/atom+xml","href":"https:\/\/sniperhaxx.blogspot.com\/feeds\/5208621565586399587\/comments\/default","title":"Post Comments"},{"rel":"replies","type":"text/html","href":"https:\/\/sniperhaxx.blogspot.com\/2013\/06\/disclosing-security-vulnerabilities-in.html#comment-form","title":"2 Comments"},{"rel":"edit","type":"application/atom+xml","href":"https:\/\/www.blogger.com\/feeds\/3549945082353733982\/posts\/default\/5208621565586399587"},{"rel":"self","type":"application/atom+xml","href":"https:\/\/www.blogger.com\/feeds\/3549945082353733982\/posts\/default\/5208621565586399587"},{"rel":"alternate","type":"text/html","href":"https:\/\/sniperhaxx.blogspot.com\/2013\/06\/disclosing-security-vulnerabilities-in.html","title":"Disclosing Security vulnerabilities in India"}],"author":[{"name":{"$t":"Unknown"},"email":{"$t":"noreply@blogger.com"},"gd$image":{"rel":"http://schemas.google.com/g/2005#thumbnail","width":"16","height":"16","src":"https:\/\/img1.blogblog.com\/img\/b16-rounded.gif"}}],"media$thumbnail":{"xmlns$media":"http://search.yahoo.com/mrss/","url":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgD5UCGo2RGzb1LzBCcaFG-XqfkgfzZewxzJYyQb-UiKJ_JrdyyGD3Yqn3VN_zQsUb0GRygwJ01iTsN1AngSTf-i8cKQp6nNAi6OVqDUFkyFLGp-v3tH3wik0_9yHG9m6pS3SKrQ9MKZck\/s72-c\/disclosing-security-vulnerability-india.jpg","height":"72","width":"72"},"thr$total":{"$t":"2"}},{"id":{"$t":"tag:blogger.com,1999:blog-3549945082353733982.post-5291610108007769601"},"published":{"$t":"2013-06-14T00:20:00.001-07:00"},"updated":{"$t":"2013-06-14T00:20:19.147-07:00"},"title":{"type":"text","$t":"SQl Error in MSN offical website exposed by Sniper haxXx for patch"},"summary":{"type":"text","$t":"\nWell i contacted MSN security team and then they replay me message that this can not harm their website what ever we know that this is harmful . If any other team member from MSN security team is reading this please Patch it.\n\n\nThree sql syntax eroors are\n\n\n\n\n\n\n1 )\u0026nbsp;http:\/\/news.ca.msn.com\/ontario\/london\/events\/london-bridal-expo-9\n\n2 )\u0026nbsp;http:\/\/news.ca.msn.com\/ontario\/london\/events\/"},"link":[{"rel":"replies","type":"application/atom+xml","href":"https:\/\/sniperhaxx.blogspot.com\/feeds\/5291610108007769601\/comments\/default","title":"Post Comments"},{"rel":"replies","type":"text/html","href":"https:\/\/sniperhaxx.blogspot.com\/2013\/06\/sql-error-in-msn-offical-website.html#comment-form","title":"7 Comments"},{"rel":"edit","type":"application/atom+xml","href":"https:\/\/www.blogger.com\/feeds\/3549945082353733982\/posts\/default\/5291610108007769601"},{"rel":"self","type":"application/atom+xml","href":"https:\/\/www.blogger.com\/feeds\/3549945082353733982\/posts\/default\/5291610108007769601"},{"rel":"alternate","type":"text/html","href":"https:\/\/sniperhaxx.blogspot.com\/2013\/06\/sql-error-in-msn-offical-website.html","title":"SQl Error in MSN offical website exposed by Sniper haxXx for patch"}],"author":[{"name":{"$t":"Unknown"},"email":{"$t":"noreply@blogger.com"},"gd$image":{"rel":"http://schemas.google.com/g/2005#thumbnail","width":"16","height":"16","src":"https:\/\/img1.blogblog.com\/img\/b16-rounded.gif"}}],"thr$total":{"$t":"7"}},{"id":{"$t":"tag:blogger.com,1999:blog-3549945082353733982.post-1976838465162059718"},"published":{"$t":"2013-06-13T23:26:00.001-07:00"},"updated":{"$t":"2013-06-14T00:20:52.201-07:00"},"title":{"type":"text","$t":"Pakistani Hacking Heros of their times can not be forgeted in the future"},"summary":{"type":"text","$t":"\n\n\nPakistan is a country who was , is , and will be the fastest growing country in the field of information technology.\u0026nbsp;\nPakistan is a country who invented the first PC VIRUS in the world and maked thousands of IT related records \u0026nbsp;like Youngest\u0026nbsp;Microsoft\u0026nbsp;specialist. As\u0026nbsp;time passes by and Pakistan started its development in the field of Hacking. Some Heros and teams which "},"link":[{"rel":"replies","type":"application/atom+xml","href":"https:\/\/sniperhaxx.blogspot.com\/feeds\/1976838465162059718\/comments\/default","title":"Post Comments"},{"rel":"replies","type":"text/html","href":"https:\/\/sniperhaxx.blogspot.com\/2013\/06\/pakistani-hacking-heros-of-their-times.html#comment-form","title":"4 Comments"},{"rel":"edit","type":"application/atom+xml","href":"https:\/\/www.blogger.com\/feeds\/3549945082353733982\/posts\/default\/1976838465162059718"},{"rel":"self","type":"application/atom+xml","href":"https:\/\/www.blogger.com\/feeds\/3549945082353733982\/posts\/default\/1976838465162059718"},{"rel":"alternate","type":"text/html","href":"https:\/\/sniperhaxx.blogspot.com\/2013\/06\/pakistani-hacking-heros-of-their-times.html","title":"Pakistani Hacking Heros of their times can not be forgeted in the future"}],"author":[{"name":{"$t":"Unknown"},"email":{"$t":"noreply@blogger.com"},"gd$image":{"rel":"http://schemas.google.com/g/2005#thumbnail","width":"16","height":"16","src":"https:\/\/img1.blogblog.com\/img\/b16-rounded.gif"}}],"thr$total":{"$t":"4"}},{"id":{"$t":"tag:blogger.com,1999:blog-3549945082353733982.post-6633470363577248058"},"published":{"$t":"2013-05-20T23:25:00.000-07:00"},"updated":{"$t":"2014-10-12T11:48:55.987-07:00"},"title":{"type":"text","$t":"SQLI Vulnerable Websites fresh List ( indian ) "},"summary":{"type":"text","$t":"\nindian SQLI Vulnerable Websites List shop sql sqli fresh list vulnerable sites list LFI RFI list sqli vulnerable sites list 2014 2015 fresh sqli shop?id=\u0026nbsp;\n\n\n\n\nThe list of all those website,s is published not because to pertest but to inform the web owners about the vulnerability so they can patch it and i am not responsible for any of your reaction caused from reading my article\u0026nbsp;\n"},"link":[{"rel":"replies","type":"application/atom+xml","href":"https:\/\/sniperhaxx.blogspot.com\/feeds\/6633470363577248058\/comments\/default","title":"Post Comments"},{"rel":"replies","type":"text/html","href":"https:\/\/sniperhaxx.blogspot.com\/2013\/05\/indian-sqli-educational-websites-fresh.html#comment-form","title":"4 Comments"},{"rel":"edit","type":"application/atom+xml","href":"https:\/\/www.blogger.com\/feeds\/3549945082353733982\/posts\/default\/6633470363577248058"},{"rel":"self","type":"application/atom+xml","href":"https:\/\/www.blogger.com\/feeds\/3549945082353733982\/posts\/default\/6633470363577248058"},{"rel":"alternate","type":"text/html","href":"https:\/\/sniperhaxx.blogspot.com\/2013\/05\/indian-sqli-educational-websites-fresh.html","title":"SQLI Vulnerable Websites fresh List ( indian ) "}],"author":[{"name":{"$t":"Unknown"},"email":{"$t":"noreply@blogger.com"},"gd$image":{"rel":"http://schemas.google.com/g/2005#thumbnail","width":"16","height":"16","src":"https:\/\/img1.blogblog.com\/img\/b16-rounded.gif"}}],"thr$total":{"$t":"4"}},{"id":{"$t":"tag:blogger.com,1999:blog-3549945082353733982.post-5892409606705917122"},"published":{"$t":"2013-03-17T05:11:00.001-07:00"},"updated":{"$t":"2014-10-14T08:49:28.141-07:00"},"title":{"type":"text","$t":"Family keylogger for free (pc-Hack) no virus"},"summary":{"type":"text","$t":"\n\u003C!-- Ractangular blog --\u003E\n\n\n(adsbygoogle = window.adsbygoogle || []).push({});\n\n\n\nlink=http:\/\/adf.ly\/L1d54\ngoto the link and wait for a min and then click on skipAd on the topright side\n\n\u003C!-- Ractangular blog --\u003E\n\n\n(adsbygoogle = window.adsbygoogle || []).push({});\n"},"link":[{"rel":"replies","type":"application/atom+xml","href":"https:\/\/sniperhaxx.blogspot.com\/feeds\/5892409606705917122\/comments\/default","title":"Post Comments"},{"rel":"replies","type":"text/html","href":"https:\/\/sniperhaxx.blogspot.com\/2013\/03\/family-keylogger-for-free-pc-hack-no.html#comment-form","title":"2 Comments"},{"rel":"edit","type":"application/atom+xml","href":"https:\/\/www.blogger.com\/feeds\/3549945082353733982\/posts\/default\/5892409606705917122"},{"rel":"self","type":"application/atom+xml","href":"https:\/\/www.blogger.com\/feeds\/3549945082353733982\/posts\/default\/5892409606705917122"},{"rel":"alternate","type":"text/html","href":"https:\/\/sniperhaxx.blogspot.com\/2013\/03\/family-keylogger-for-free-pc-hack-no.html","title":"Family keylogger for free (pc-Hack) no virus"}],"author":[{"name":{"$t":"Unknown"},"email":{"$t":"noreply@blogger.com"},"gd$image":{"rel":"http://schemas.google.com/g/2005#thumbnail","width":"16","height":"16","src":"https:\/\/img1.blogblog.com\/img\/b16-rounded.gif"}}],"thr$total":{"$t":"2"}},{"id":{"$t":"tag:blogger.com,1999:blog-3549945082353733982.post-2568169479810585256"},"published":{"$t":"2012-06-08T05:13:00.001-07:00"},"updated":{"$t":"2012-06-08T05:13:17.111-07:00"},"title":{"type":"text","$t":"Havij download"},"summary":{"type":"text","$t":"\n\u0026nbsp; \u0026nbsp; \u0026nbsp; \u0026nbsp; \u0026nbsp; \u0026nbsp; \u0026nbsp; \u0026nbsp; \u0026nbsp; \u0026nbsp; \u0026nbsp; \u0026nbsp; \u0026nbsp; \u0026nbsp; \u0026nbsp;Havij download \u0026nbsp; \u0026nbsp; \u0026nbsp; \u0026nbsp; \u0026nbsp; \u0026nbsp; \u0026nbsp; \u0026nbsp; \u0026nbsp; \u0026nbsp; \u0026nbsp; \u0026nbsp; \u0026nbsp; \u0026nbsp; \u0026nbsp; \u0026nbsp;\nHavij is a software which is used to hack the websites with sql injection it automatically finds all the tables , and the whole database . to download this software\u0026"},"link":[{"rel":"replies","type":"application/atom+xml","href":"https:\/\/sniperhaxx.blogspot.com\/feeds\/2568169479810585256\/comments\/default","title":"Post Comments"},{"rel":"replies","type":"text/html","href":"https:\/\/sniperhaxx.blogspot.com\/2012\/06\/havij-download.html#comment-form","title":"1 Comments"},{"rel":"edit","type":"application/atom+xml","href":"https:\/\/www.blogger.com\/feeds\/3549945082353733982\/posts\/default\/2568169479810585256"},{"rel":"self","type":"application/atom+xml","href":"https:\/\/www.blogger.com\/feeds\/3549945082353733982\/posts\/default\/2568169479810585256"},{"rel":"alternate","type":"text/html","href":"https:\/\/sniperhaxx.blogspot.com\/2012\/06\/havij-download.html","title":"Havij download"}],"author":[{"name":{"$t":"Unknown"},"email":{"$t":"noreply@blogger.com"},"gd$image":{"rel":"http://schemas.google.com/g/2005#thumbnail","width":"16","height":"16","src":"https:\/\/img1.blogblog.com\/img\/b16-rounded.gif"}}],"thr$total":{"$t":"1"}},{"id":{"$t":"tag:blogger.com,1999:blog-3549945082353733982.post-5491424171047524139"},"published":{"$t":"2012-06-08T05:10:00.000-07:00"},"updated":{"$t":"2012-06-08T05:10:03.948-07:00"},"title":{"type":"text","$t":"Phishing material"},"summary":{"type":"text","$t":"\n\u0026nbsp; \u0026nbsp; \u0026nbsp; \u0026nbsp; \u0026nbsp; \u0026nbsp; \u0026nbsp; \u0026nbsp; Phishing material to download \u0026nbsp; \u0026nbsp; \u0026nbsp; \u0026nbsp; \u0026nbsp; \u0026nbsp; \u0026nbsp; \u0026nbsp; \u0026nbsp; \u0026nbsp;\nTo download the phishing material\u0026nbsp;please\u0026nbsp;visit our site\u0026nbsp;www.sniperweb.tk\u0026nbsp;then goto the directory\u0026nbsp;software\u0026nbsp;and then scroll down to download your 3files of phishing ."},"link":[{"rel":"replies","type":"application/atom+xml","href":"https:\/\/sniperhaxx.blogspot.com\/feeds\/5491424171047524139\/comments\/default","title":"Post Comments"},{"rel":"replies","type":"text/html","href":"https:\/\/sniperhaxx.blogspot.com\/2012\/06\/phishing-material.html#comment-form","title":"0 Comments"},{"rel":"edit","type":"application/atom+xml","href":"https:\/\/www.blogger.com\/feeds\/3549945082353733982\/posts\/default\/5491424171047524139"},{"rel":"self","type":"application/atom+xml","href":"https:\/\/www.blogger.com\/feeds\/3549945082353733982\/posts\/default\/5491424171047524139"},{"rel":"alternate","type":"text/html","href":"https:\/\/sniperhaxx.blogspot.com\/2012\/06\/phishing-material.html","title":"Phishing material"}],"author":[{"name":{"$t":"Unknown"},"email":{"$t":"noreply@blogger.com"},"gd$image":{"rel":"http://schemas.google.com/g/2005#thumbnail","width":"16","height":"16","src":"https:\/\/img1.blogblog.com\/img\/b16-rounded.gif"}}],"thr$total":{"$t":"0"}},{"id":{"$t":"tag:blogger.com,1999:blog-3549945082353733982.post-8412099811670790397"},"published":{"$t":"2012-06-08T05:06:00.002-07:00"},"updated":{"$t":"2012-06-08T05:06:38.048-07:00"},"title":{"type":"text","$t":"Hotspot shield download"},"summary":{"type":"text","$t":"\n\u0026nbsp; \u0026nbsp; \u0026nbsp; \u0026nbsp; \u0026nbsp; HOTSPOT SHIELD DOWNLOAD !! \u0026nbsp; \u0026nbsp; \u0026nbsp; \u0026nbsp; \u0026nbsp; \u0026nbsp;\nto download the hotspot shield please visit our site\u0026nbsp;www.sniperweb.tk\u0026nbsp;its free and then goto\u0026nbsp;software\u0026nbsp;and scroll down to get HOTSPOT SHIELD . make your web\u0026nbsp;Anchor\u0026nbsp;free with hotspot shield no url blocks."},"link":[{"rel":"replies","type":"application/atom+xml","href":"https:\/\/sniperhaxx.blogspot.com\/feeds\/8412099811670790397\/comments\/default","title":"Post Comments"},{"rel":"replies","type":"text/html","href":"https:\/\/sniperhaxx.blogspot.com\/2012\/06\/hotspot-shield-download.html#comment-form","title":"1 Comments"},{"rel":"edit","type":"application/atom+xml","href":"https:\/\/www.blogger.com\/feeds\/3549945082353733982\/posts\/default\/8412099811670790397"},{"rel":"self","type":"application/atom+xml","href":"https:\/\/www.blogger.com\/feeds\/3549945082353733982\/posts\/default\/8412099811670790397"},{"rel":"alternate","type":"text/html","href":"https:\/\/sniperhaxx.blogspot.com\/2012\/06\/hotspot-shield-download.html","title":"Hotspot shield download"}],"author":[{"name":{"$t":"Unknown"},"email":{"$t":"noreply@blogger.com"},"gd$image":{"rel":"http://schemas.google.com/g/2005#thumbnail","width":"16","height":"16","src":"https:\/\/img1.blogblog.com\/img\/b16-rounded.gif"}}],"thr$total":{"$t":"1"}},{"id":{"$t":"tag:blogger.com,1999:blog-3549945082353733982.post-4371751513312461811"},"published":{"$t":"2012-06-08T05:03:00.000-07:00"},"updated":{"$t":"2012-06-08T05:03:12.255-07:00"},"title":{"type":"text","$t":""},"summary":{"type":"text","$t":"\n\u0026nbsp; \u0026nbsp; \u0026nbsp; \u0026nbsp; \u0026nbsp;C99 shell download for website hacking \u0026nbsp; \u0026nbsp; \u0026nbsp; \u0026nbsp; \u0026nbsp; \u0026nbsp;\nto download the c99 or any shell plese visit our site\u0026nbsp;www.sniperweb.tk\u0026nbsp;and goto softwares and download the c99 shell."},"link":[{"rel":"replies","type":"application/atom+xml","href":"https:\/\/sniperhaxx.blogspot.com\/feeds\/4371751513312461811\/comments\/default","title":"Post Comments"},{"rel":"replies","type":"text/html","href":"https:\/\/sniperhaxx.blogspot.com\/2012\/06\/shell-download-for-website-hacking-to.html#comment-form","title":"1 Comments"},{"rel":"edit","type":"application/atom+xml","href":"https:\/\/www.blogger.com\/feeds\/3549945082353733982\/posts\/default\/4371751513312461811"},{"rel":"self","type":"application/atom+xml","href":"https:\/\/www.blogger.com\/feeds\/3549945082353733982\/posts\/default\/4371751513312461811"},{"rel":"alternate","type":"text/html","href":"https:\/\/sniperhaxx.blogspot.com\/2012\/06\/shell-download-for-website-hacking-to.html","title":""}],"author":[{"name":{"$t":"Unknown"},"email":{"$t":"noreply@blogger.com"},"gd$image":{"rel":"http://schemas.google.com/g/2005#thumbnail","width":"16","height":"16","src":"https:\/\/img1.blogblog.com\/img\/b16-rounded.gif"}}],"thr$total":{"$t":"1"}},{"id":{"$t":"tag:blogger.com,1999:blog-3549945082353733982.post-5928005617219608404"},"published":{"$t":"2012-06-08T05:00:00.003-07:00"},"updated":{"$t":"2012-06-08T05:00:44.990-07:00"},"title":{"type":"text","$t":"Windows 7 accitivator"},"summary":{"type":"text","$t":"\n\u0026nbsp; \u0026nbsp; \u0026nbsp; \u0026nbsp; \u0026nbsp; \u0026nbsp; \u0026nbsp; \u0026nbsp; \u0026nbsp; \u0026nbsp; \u0026nbsp; \u0026nbsp;Windows 7 accitivator \u0026nbsp; \u0026nbsp; \u0026nbsp; \u0026nbsp; \u0026nbsp; \u0026nbsp; \u0026nbsp; \u0026nbsp; \u0026nbsp; \u0026nbsp; \u0026nbsp; \u0026nbsp; \u0026nbsp; \u0026nbsp;\u0026nbsp;\nWindows 7 has keys but they are different for different computers and unable to find the most of pc,s keys so therefor we found an acctivator of windows7 name as windows 7 extreme loader to"},"link":[{"rel":"replies","type":"application/atom+xml","href":"https:\/\/sniperhaxx.blogspot.com\/feeds\/5928005617219608404\/comments\/default","title":"Post Comments"},{"rel":"replies","type":"text/html","href":"https:\/\/sniperhaxx.blogspot.com\/2012\/06\/windows-7-accitivator.html#comment-form","title":"0 Comments"},{"rel":"edit","type":"application/atom+xml","href":"https:\/\/www.blogger.com\/feeds\/3549945082353733982\/posts\/default\/5928005617219608404"},{"rel":"self","type":"application/atom+xml","href":"https:\/\/www.blogger.com\/feeds\/3549945082353733982\/posts\/default\/5928005617219608404"},{"rel":"alternate","type":"text/html","href":"https:\/\/sniperhaxx.blogspot.com\/2012\/06\/windows-7-accitivator.html","title":"Windows 7 accitivator"}],"author":[{"name":{"$t":"Unknown"},"email":{"$t":"noreply@blogger.com"},"gd$image":{"rel":"http://schemas.google.com/g/2005#thumbnail","width":"16","height":"16","src":"https:\/\/img1.blogblog.com\/img\/b16-rounded.gif"}}],"thr$total":{"$t":"0"}},{"id":{"$t":"tag:blogger.com,1999:blog-3549945082353733982.post-1010773109340344349"},"published":{"$t":"2012-06-08T04:54:00.006-07:00"},"updated":{"$t":"2012-06-08T04:54:53.527-07:00"},"title":{"type":"text","$t":"Windows XP genuine key"},"summary":{"type":"text","$t":"\n\u0026nbsp; \u0026nbsp; \u0026nbsp; \u0026nbsp; \u0026nbsp; \u0026nbsp; \u0026nbsp; \u0026nbsp; \u0026nbsp; \u0026nbsp; Windows XP genuine key \u0026nbsp; \u0026nbsp; \u0026nbsp; \u0026nbsp; \u0026nbsp; \u0026nbsp; \u0026nbsp; \u0026nbsp; \u0026nbsp; \u0026nbsp; \u0026nbsp;\nwe have found to genuine windows XP keys and want to share with you to view the keys you must visit our site www.sniperweb.tk\u0026nbsp;and goto softwares and then \u0026nbsp;scroll\u0026nbsp;down and download the xp key.\n"},"link":[{"rel":"replies","type":"application/atom+xml","href":"https:\/\/sniperhaxx.blogspot.com\/feeds\/1010773109340344349\/comments\/default","title":"Post Comments"},{"rel":"replies","type":"text/html","href":"https:\/\/sniperhaxx.blogspot.com\/2012\/06\/windows-xp-genuine-key.html#comment-form","title":"0 Comments"},{"rel":"edit","type":"application/atom+xml","href":"https:\/\/www.blogger.com\/feeds\/3549945082353733982\/posts\/default\/1010773109340344349"},{"rel":"self","type":"application/atom+xml","href":"https:\/\/www.blogger.com\/feeds\/3549945082353733982\/posts\/default\/1010773109340344349"},{"rel":"alternate","type":"text/html","href":"https:\/\/sniperhaxx.blogspot.com\/2012\/06\/windows-xp-genuine-key.html","title":"Windows XP genuine key"}],"author":[{"name":{"$t":"Unknown"},"email":{"$t":"noreply@blogger.com"},"gd$image":{"rel":"http://schemas.google.com/g/2005#thumbnail","width":"16","height":"16","src":"https:\/\/img1.blogblog.com\/img\/b16-rounded.gif"}}],"thr$total":{"$t":"0"}},{"id":{"$t":"tag:blogger.com,1999:blog-3549945082353733982.post-3570937314351200553"},"published":{"$t":"2012-06-08T04:50:00.001-07:00"},"updated":{"$t":"2012-06-08T04:50:53.488-07:00"},"title":{"type":"text","$t":"Google hacking dorks"},"summary":{"type":"text","$t":"\n\u0026nbsp; \u0026nbsp; \u0026nbsp;GOOGLE WEBSITES HACKING DORKS \u0026nbsp; \u0026nbsp; \u0026nbsp; \u0026nbsp; \u0026nbsp; \u0026nbsp; \u0026nbsp; \u0026nbsp; \u0026nbsp; \u0026nbsp; \u0026nbsp;\u0026nbsp;\nGoogle dorks allow you to find the\u0026nbsp;vulnerable\u0026nbsp;websites which can be hacked by sql injection . we have uploaded many of\u0026nbsp;Google\u0026nbsp;dorks to view\u0026nbsp;please\u0026nbsp;visit this link\u0026nbsp;http:\/\/sniperhaxxor.web44.net\/videos\/dorks1.html"},"link":[{"rel":"replies","type":"application/atom+xml","href":"https:\/\/sniperhaxx.blogspot.com\/feeds\/3570937314351200553\/comments\/default","title":"Post Comments"},{"rel":"replies","type":"text/html","href":"https:\/\/sniperhaxx.blogspot.com\/2012\/06\/google-hacking-dorks.html#comment-form","title":"2 Comments"},{"rel":"edit","type":"application/atom+xml","href":"https:\/\/www.blogger.com\/feeds\/3549945082353733982\/posts\/default\/3570937314351200553"},{"rel":"self","type":"application/atom+xml","href":"https:\/\/www.blogger.com\/feeds\/3549945082353733982\/posts\/default\/3570937314351200553"},{"rel":"alternate","type":"text/html","href":"https:\/\/sniperhaxx.blogspot.com\/2012\/06\/google-hacking-dorks.html","title":"Google hacking dorks"}],"author":[{"name":{"$t":"Unknown"},"email":{"$t":"noreply@blogger.com"},"gd$image":{"rel":"http://schemas.google.com/g/2005#thumbnail","width":"16","height":"16","src":"https:\/\/img1.blogblog.com\/img\/b16-rounded.gif"}}],"thr$total":{"$t":"2"}},{"id":{"$t":"tag:blogger.com,1999:blog-3549945082353733982.post-4410154242589959945"},"published":{"$t":"2012-06-08T04:46:00.002-07:00"},"updated":{"$t":"2012-06-08T04:46:47.183-07:00"},"title":{"type":"text","$t":"WIFI HACKING WITH BACKTRACK"},"summary":{"type":"text","$t":"\n\u0026nbsp; \u0026nbsp; \u0026nbsp; \u0026nbsp; \u0026nbsp; WIFI HACKING WITH BACKTRACK \u0026nbsp; \u0026nbsp; \u0026nbsp; \u0026nbsp; \u0026nbsp; \u0026nbsp; \u0026nbsp; \u0026nbsp; \u0026nbsp;\u0026nbsp;\nTo learn the complete wifi hacking\u0026nbsp;please\u0026nbsp;goto this link\u0026nbsp;http:\/\/sniperhaxxor.web44.net\/videos\/video4.html\nfor the material\u0026nbsp;please\u0026nbsp;visit our site www.sniperweb.tk\u0026nbsp;"},"link":[{"rel":"replies","type":"application/atom+xml","href":"https:\/\/sniperhaxx.blogspot.com\/feeds\/4410154242589959945\/comments\/default","title":"Post Comments"},{"rel":"replies","type":"text/html","href":"https:\/\/sniperhaxx.blogspot.com\/2012\/06\/wifi-hacking-with-backtrack.html#comment-form","title":"0 Comments"},{"rel":"edit","type":"application/atom+xml","href":"https:\/\/www.blogger.com\/feeds\/3549945082353733982\/posts\/default\/4410154242589959945"},{"rel":"self","type":"application/atom+xml","href":"https:\/\/www.blogger.com\/feeds\/3549945082353733982\/posts\/default\/4410154242589959945"},{"rel":"alternate","type":"text/html","href":"https:\/\/sniperhaxx.blogspot.com\/2012\/06\/wifi-hacking-with-backtrack.html","title":"WIFI HACKING WITH BACKTRACK"}],"author":[{"name":{"$t":"Unknown"},"email":{"$t":"noreply@blogger.com"},"gd$image":{"rel":"http://schemas.google.com/g/2005#thumbnail","width":"16","height":"16","src":"https:\/\/img1.blogblog.com\/img\/b16-rounded.gif"}}],"thr$total":{"$t":"0"}},{"id":{"$t":"tag:blogger.com,1999:blog-3549945082353733982.post-4479161309013545097"},"published":{"$t":"2012-06-08T04:29:00.007-07:00"},"updated":{"$t":"2012-06-08T04:29:58.304-07:00"},"title":{"type":"text","$t":"How to get your facebook hacked account back"},"summary":{"type":"text","$t":"\n\n\n\u0026nbsp; \u0026nbsp; \u0026nbsp; \u0026nbsp; \u0026nbsp; \u0026nbsp; \u0026nbsp; \u0026nbsp; Facebook account recovery \u0026nbsp; \u0026nbsp; \u0026nbsp; \u0026nbsp; \u0026nbsp;\n\nIf some hacker hack your account and change the password now you want it back .the process is easy and workable video\n\nwe can not upload the video to our blog so\u0026nbsp;please\u0026nbsp;click on the lick to view the tutorial\u0026nbsp;\n\n\n\n\u0026nbsp; \u0026nbsp; \u0026nbsp; \u0026nbsp; \u0026nbsp; \u0026nbsp; \u0026nbsp; \u0026"},"link":[{"rel":"replies","type":"application/atom+xml","href":"https:\/\/sniperhaxx.blogspot.com\/feeds\/4479161309013545097\/comments\/default","title":"Post Comments"},{"rel":"replies","type":"text/html","href":"https:\/\/sniperhaxx.blogspot.com\/2012\/06\/how-to-get-your-facebook-hacked-account.html#comment-form","title":"0 Comments"},{"rel":"edit","type":"application/atom+xml","href":"https:\/\/www.blogger.com\/feeds\/3549945082353733982\/posts\/default\/4479161309013545097"},{"rel":"self","type":"application/atom+xml","href":"https:\/\/www.blogger.com\/feeds\/3549945082353733982\/posts\/default\/4479161309013545097"},{"rel":"alternate","type":"text/html","href":"https:\/\/sniperhaxx.blogspot.com\/2012\/06\/how-to-get-your-facebook-hacked-account.html","title":"How to get your facebook hacked account back"}],"author":[{"name":{"$t":"Unknown"},"email":{"$t":"noreply@blogger.com"},"gd$image":{"rel":"http://schemas.google.com/g/2005#thumbnail","width":"16","height":"16","src":"https:\/\/img1.blogblog.com\/img\/b16-rounded.gif"}}],"thr$total":{"$t":"0"}},{"id":{"$t":"tag:blogger.com,1999:blog-3549945082353733982.post-643057184480841299"},"published":{"$t":"2012-06-08T03:56:00.000-07:00"},"updated":{"$t":"2012-06-08T03:56:11.578-07:00"},"title":{"type":"text","$t":"Google adsence accitivation trick"},"summary":{"type":"text","$t":"\n\n\u0026nbsp; \u0026nbsp; \u0026nbsp; \u0026nbsp; \u0026nbsp; \u0026nbsp; \u0026nbsp; \u0026nbsp; \u0026nbsp; \u0026nbsp; \u0026nbsp; \u0026nbsp; \u0026nbsp; \u0026nbsp;Google Adsence\u0026nbsp;approval\u0026nbsp;trick \u0026nbsp; \u0026nbsp; \u0026nbsp; \u0026nbsp; \u0026nbsp; \u0026nbsp; \u0026nbsp; \u0026nbsp; \u0026nbsp; \u0026nbsp; \u0026nbsp; \u0026nbsp; \u0026nbsp; \u0026nbsp;\n\nnow accitivate your adsence account in just 2hours no spam no money investment no website needed just follow the tutorial which can not be uploaded on our blog "},"link":[{"rel":"replies","type":"application/atom+xml","href":"https:\/\/sniperhaxx.blogspot.com\/feeds\/643057184480841299\/comments\/default","title":"Post Comments"},{"rel":"replies","type":"text/html","href":"https:\/\/sniperhaxx.blogspot.com\/2012\/06\/google-adsence-accitivation-trick.html#comment-form","title":"2 Comments"},{"rel":"edit","type":"application/atom+xml","href":"https:\/\/www.blogger.com\/feeds\/3549945082353733982\/posts\/default\/643057184480841299"},{"rel":"self","type":"application/atom+xml","href":"https:\/\/www.blogger.com\/feeds\/3549945082353733982\/posts\/default\/643057184480841299"},{"rel":"alternate","type":"text/html","href":"https:\/\/sniperhaxx.blogspot.com\/2012\/06\/google-adsence-accitivation-trick.html","title":"Google adsence accitivation trick"}],"author":[{"name":{"$t":"Unknown"},"email":{"$t":"noreply@blogger.com"},"gd$image":{"rel":"http://schemas.google.com/g/2005#thumbnail","width":"16","height":"16","src":"https:\/\/img1.blogblog.com\/img\/b16-rounded.gif"}}],"thr$total":{"$t":"2"}}]}});