skip to main | skip to sidebar

The Life of a Writer

OK, this is all about me and my life. I may post information on my books here too, the chances of that are pretty good.

Sunday, May 10, 2020

Hackable - Secret Hacker | Vulnerable Web Application Server

Related articles
  • Hacking Etico 101 Pdf
  • Hacking Time
  • Best Hacking Books
  • Rom Hacking Pokemon
  • Hacking Basico
  • Como Empezar En El Hacking
  • El Hacker
  • El Hacker Pelicula
  • Growth Hacking Pdf
  • Hacker Seguridad Informática
  • Hacking Libro
Posted by Nii-kun at 6:27 PM

No comments:

Post a Comment

Newer Post Older Post Home
Subscribe to: Post Comments (Atom)

Blog Archive

  • ►  2007 (26)
    • ►  June (12)
    • ►  July (6)
    • ►  August (1)
    • ►  September (1)
    • ►  October (1)
    • ►  November (4)
    • ►  December (1)
  • ►  2008 (6)
    • ►  January (2)
    • ►  April (1)
    • ►  June (1)
    • ►  September (2)
  • ►  2009 (2)
    • ►  February (2)
  • ►  2011 (2)
    • ►  June (1)
    • ►  December (1)
  • ►  2012 (1)
    • ►  November (1)
  • ►  2018 (2)
    • ►  June (2)
  • ►  2019 (1135)
    • ►  March (12)
    • ►  April (3)
    • ►  May (46)
    • ►  June (220)
    • ►  July (273)
    • ►  August (325)
    • ►  September (185)
    • ►  November (62)
    • ►  December (9)
  • ▼  2020 (377)
    • ►  February (9)
    • ►  March (15)
    • ►  April (35)
    • ▼  May (67)
      • Releasing On Nintendo Switch: Unattainable Dream T...
      • Deeds Not Words!
      • Scaling The NetScaler
      • How To Run Online Kali Linux Free And Any Devices
      • Workshop And Presentation Slides And Materials
      • Deepin Or UbuntuDDE
      • Steghide - A Beginners Tutorial
      • HOW TO DEFACE A WEBSITE USING REMOTE FILE INCLUSIO...
      • How tO Secure Yourself From Evil Twin Attack
      • RainbowCrack
      • Blockchain Exploitation Labs - Part 2 Hacking Bloc...
      • The History And Evolution Of Java
      • Web-fu - The Ultimate Web Hacking Chrome Extension
      • WHO IS ETHICAL HACKER
      • 12 Ways To Hack Facebook Account Passwords And Its...
      • PHASES OF HACKING
      • How Block Chain Technology Can Help Fight Wuhan Co...
      • BeEF: Browser Exploitation Framework
      • PowerSploit - A PowerShell Post-Exploitation Frame...
      • PHoss: A Password Sniffer
      • How To Set Up A VPN On Kodi In 2 Minutes Or Less
      • Many Ways Of Malware Persistence (That You Were Al...
      • Hackable - Secret Hacker | Vulnerable Web Applicat...
      • HTML5 Games On Android
      • OnionDuke Samples
      • Security Onion - Linux Distro For IDS, NSM, And Lo...
      • DEFINATION OF HACKING
      • Testing SAML Endpoints For XML Signature Wrapping ...
      • Part I. Russian APT - APT28 Collection Of Samples...
      • Scanning For Padding Oracles
      • HOW TO HACK WHATSAPP ACCOUNT? – WHATSAPP HACK
      • Ransomware.OSX.KeRanger Samples
      • Blockchain Exploitation Labs - Part 3 Exploiting I...
      • OSWA™
      • macSubstrate - Tool For Interprocess Code Injectio...
      • Security Onion - Linux Distro For IDS, NSM, And Lo...
      • HOW TO BECOME A CERTIFIED ETHICAL HACKER
      • What Is Keylogger? Uses Of Keylogger In Hacking ?
      • How To Crack A Password
      • CEH: Fundamentals Of Social Engineering
      • Probing For XML Encryption Weaknesses In SAML With...
      • Linux Command Line Hackery Series: Part 1
      • Linux/AirDropBot Samples
      • RFCrack Release - A Software Defined Radio Attack ...
      • WHY WE DO HACKING?
      • How I Hacked My IP Camera, And Found This Backdoor...
      • WHAT IS ETHICAL HACKING
      • Learn A-Z Kali_Linux Commands For Beginerrs
      • Learning Web Pentesting With DVWA Part 6: File Inc...
      • How To Start | How To Become An Ethical Hacker
      • DeepEnd Research: Analysis Of Trump's Secret Serve...
      • DOWNLOAD SQLI HUNTER V1.2 – SQL INJECTION TOOL
      • DEFINATION OF HACKING
      • SubOver - A Powerful Subdomain Takeover Tool
      • Removing Windows OS Passwords With CHNTPW On Kali ...
      • CEH: 10 Hacking Tools For Hackers
      • Cómo Te Pueden Hackear Cuentas De Whatsapp Usando ...
      • Learn A-Z Kali_Linux Commands For Beginerrs
      • How To Spoof PDF Signatures
      • Files Download Information
      • Blockchain Exploitation Labs - Part 3 Exploiting I...
      • Entropy: Netwave And GoAhead IP Webcams Exploiting...
      • TYPES OF HACKING
      • CEH: Gathering Network And Host Information, Types...
      • Best Hacking Tools
      • Ukrainian Police Arrest Hacker Who Tried Selling B...
      • CEH Practical: Gathering Target Information: Recon...
    • ►  June (28)
    • ►  July (103)
    • ►  August (100)
    • ►  September (9)
    • ►  October (3)
    • ►  November (3)
    • ►  December (5)
  • ►  2021 (22)
    • ►  January (2)
    • ►  February (2)
    • ►  March (3)
    • ►  April (2)
    • ►  May (3)
    • ►  June (3)
    • ►  July (2)
    • ►  August (2)
    • ►  October (2)
    • ►  December (1)
  • ►  2022 (5)
    • ►  March (1)
    • ►  May (1)
    • ►  July (1)
    • ►  August (2)
  • ►  2023 (68)
    • ►  April (1)
    • ►  May (24)
    • ►  June (25)
    • ►  July (6)
    • ►  August (7)
    • ►  September (1)
    • ►  October (1)
    • ►  November (2)
    • ►  December (1)
  • ►  2024 (53)
    • ►  January (35)
    • ►  February (5)
    • ►  March (1)
    • ►  April (3)
    • ►  May (1)
    • ►  June (2)
    • ►  July (3)
    • ►  August (1)
    • ►  November (1)
    • ►  December (1)
  • ►  2025 (45)
    • ►  January (27)
    • ►  February (5)
    • ►  March (6)
    • ►  April (2)
    • ►  May (2)
    • ►  June (1)
    • ►  July (2)

Who Am I?

My photo
Nii-kun
Florida, United States
OK, I'm a 15 year old writer. I like to play the trumpet, listen to music and read. I read anything from Manga to Romance novels to the extreme fantasy. I like Anime too, among my favorites is Naruto, Naruto Shippuden, and DNAngel. Although it sounds a bit strange I collect bottles (whine, Sobe, whiskey, rum, etc) just because they are an excellent way to store water in my room and they are great for decoration. :D I also like books by: Terry Brooks, Tamora Pierce, David B. Coe, J.K. Rowling, and some others that I haven't really deemed great enough to name here yet.
View my complete profile
 

Melanie again again

Melanie again again
All smiles.

Melanie again

Melanie again
She loosk so happy. Deep in thought, I think

Melanie

Melanie
Isn't she pretty? lol

My Friend Jesse

My Friend Jesse
Yuppers. She is a good friend

The night before

The night before
Dakota, Katie, Katrina, Chris, and me (I'm a Photo Hopper! XD)

Day before the injury

Day before the injury
This is the Jazz Band before the INjury of Dakota Abernathy

Coach Harper!

Coach Harper!
Coltan (CoCo), Me, and Tania- Just chillin' on the last day of school

Me

Me
Awhile back, near the begining of this year

Me and My friend

Me and My friend
Thats right, Me and Holly! XD

After the Injury

After the Injury
Me and some friends, The band group that saved Dakota Abernathy: Ironman