Designed by Freepik

p1

SQL vulnerable websites list 2016 updated



SQL vulnerable websites list 2016 updated

SQL injection


SQL injection is a code injection technique, used to attack data-driven applications, in which malicious SQL statements are inserted into an entry field for execution (e.g. to dump the database contents to the attacker)
SQL injection is widely used for checking the security of a blog or a website it is a simple method not too much complicated. There are various SQLI vulnerable websites till date through which anyone can be in the database of the site and can get admin username and password through which can easily login into the admin panel and then hack the website this how anyone can easily lose his website.
There is a huge list of SQL vulnerable websites, SQL injection is widely used through Kali Linux a backtrack Payoneer using Nmap and Metasploit out there. But using these things is a somehow complicated method there are now a few programs available on websites through which you can easily get into the database in some clicks. As  I remember a program launched by an Irani team[itsec team] named havij, which means carrot in the Persian language it is a program through which even a kid can get into the database of a website

Although havij is no longer available on the internet officially but till now available on the internet. so as you are looking for SQL vulnerable website list the list is below

SQL vulnerable websites list:

1.         These sqli injection website list is provided by www.cityofhackerz.com
2.         http://3rtechnologies.net/contact.php?id=1
3.         http://3rtechnologies.net/mobile.php?id=1
4.         http://7starevent.com/newsid.php?id=52
5.         http://9lanka.com/show.php?id=13859
6.         http://aarsh.co.in/products.php?id=11
7.         http://aarsh.co.in/products.php?id=9
8.         http://aarya-24kt.com/catalogue.php?id=11
9.         http://aarya-24kt.com/catalogue.php?id=2
10.    http://abhinavpublicschoolrohini.com/aboutus.php?id=4
11.    http://academiclub.com/features-prodect.php?id=504
12.    http://academiclub.com/features-prodect.php?id=506
13.    http://account-service.net/index.php?id=2
14.    http://account-service.net/index.php?id=3
15.    http://acmv.org/lecture/view.php?id=1
.
.
.DOWNLOAD FULL LIST: DOWNLOAD
.
.
.....
492.                       http://protechbuddy.com/services.php?id=4
493.                       http://protechbuddy.com/services.php?id=8
494.                       http://r4r.co.in/answer.php?id=5719
495.                       http://r4r.co.in/answer.php?id=7586
496.                       http://raahauges.com/view-news.php?id=8
497.                       http://raahini.com/products.php?id=11
498.                       http://raiderstalk.com/viewtopic.php?f=2&t=54
499.                       http://raids.com/single.php?id=90
500.                       http://randamvivaham.com/readymadeoccup.php?id=teacher

DOWNLOAD FULL LIST: DOWNLOAD


Read More Add your Comment 7 comments


CC DB Dork List



CC DB Dork List


/ccbill/secure/ccbill.log
/cgi-bin/orders/mc.txt
/WebCart/orders.txt
/cgi-bin/orders/cc.txt
/cvv2.txt
/cgi-bin/orderlog.txt
/WebShop/logs
/orderb/shop.mdb
/_private/shopping_cart.mdb
/scripts/iisadmin/tools/mkilog.exe
/cool-logs/mylog.html
/cool-logs/mlog.html
/easylog/easylog.html
.
.
.DOWNLOAD FULL LIST: DOWNLOAD
.
...

/orders/import.txt
/orders/checks.txt
/orders/orders.txt
/Orders/order.log
/order/order.log
/WebShop/logs/ck.log
/WebShop/logs/cc.txt
/WebShop/templates/cc.txt
/_private/orders.txt

DOWNLOAD FULL LIST: DOWNLOAD


Read More Add your Comment 2 comments


100-private-dorks



  100-private-dorks    


gallery.php?StoreID=45&CategoryID=140
odna_stat.php?id=215
SearchResults.asp?Cat=1831
opened_files_view.html?no_redirect=true
view.php?id=29
gallery.php?ref=rooms
selector.php?pid=81&sid=121&link_id=
index.php?cID=230&bID=520&arHandle=main content&ccm_token=1424097331:a44ed7134feac96542d284f4aee397c9&btask=passthru&method=view&sortBy=title&sortOrder=desc
product.asp?id=178
products.php?id=851&name=Purse Felting Kit (Pink)
newsitem.asp?newsID=2043
content.php?pid=170822&sid=1438777
.
.
.DOWNLOAD FULL LIST : DOWNLOAD NOW
.
.
...

handmark?id=129301
showthread.php?t=157061
index.html?print=yes&title=����Z
index.php?limitstart=5&lang=lv
faq.php?q_id=81
ShowProducts.php?id=3&brandcid=26&cateid=4
products.php?id=1164
product_reviews_info.php?products_id=9911131&reviews_id=4992949
view.php?id=7782

DOWNLOAD FULL LIST : DOWNLOAD NOW


Read More Add your Comment 2 comments


NEW DORKS LIST










 
 
 
inurl:/MyBB/Upload/inc/
inurl:db_mysql.php
inurl:sql.php?table=wp_users
inurl:sql.php?table=group
inurl:sql.php?table=phpMyAdmin
inurl:sql.php?table=users
inurl:sql.php?table=login
inurl:/phpMyAdmin/sql.php
inurl:sql.php?table=customer

.
.
.
.DOWNLOAD FULL LIST : DOWNLOAD
.
.
.
....
pub/a/php/2007/07/26/php-web-services.html?page=2
index.php?option=com_content&view=article&id=130&Itemid=166
calendar.php?page=2
index.php?option=com_content&view=article&id=121&itemid=133
store/product_details.php?products_id=108900
index.php?laid=1&com=module&module=store&action=listing&category=2
shop.asp?action=cat&catID=14767&keyword=&page=1
news/news.php?id=727
 
DOWNLOAD FULL LIST : DOWNLOAD 
 


Read More Add your Comment 2 comments


Looking for Email and Password Using Google Dork




Looking for Email and Password Using Google Dork


password Today I will teach you how to view the file password hacker illegal phish pages using Google, that all passwords are stored victims. As we all know 99% of hacker via the Internet hacker beginner or just script kiddies. They did not know the concept and they just follow or use the material available on the internet to make Phishing Hack Facebook, Gmail or just a password. Which always results in creating phishers successfully but no one safe because it does not tell after a phisher techniques such as how to make undetectable phishing, how to protect the password file in which all the hack passwords stored etc. As most of us know that the Phishing is the easiest way via the internet to hack Facebook Email account and password, so most novice hackers choose this option to hack the password of the victim. Even some professional hackers use phishing techniques as well, but they are somewhat more advanced and more tabnabbing called Phishing. How many results a site appears in Google search results? You create a website and how Google knows your site? All search engines use spiders and crawlers software via the web to index new websites or recent changes in existing sites to give users the best results to date. And the indexing of the site depending on the file located at the root level of all website hosting, if not attended to treat Google full index. Most people think that the robots.txt file is used to tell Google to index your website, but actually use a robots.txt file to tell Google that what you want to index your website and what you do not want. By default, the file allows the robot Full indexing of websites that all files are indexed and even passwords and database files. Ooh! Here gap lies. Most hackers use nearly all web hosting website to run a free Phish pages and all the free web hosting site has a robots.txt file standard meaning when hackers phish its upload page, which is indexed by Google. And we all know what we use to extract information from Google's smart? Of course Google Dorks her. Now we have to learn how to make our own dorks to extract information hackers phish pages. Hacker edit Shape diversion of any login page and change the mode of POST requests to GET to retrieve the password in plain text and then they store it in the text and html files simple. Today we will learn how to retrieve files using Google password. Well there is not much to learn in it because I've made ​​a DORK for you, what you have to do is just enter the same thing on Google and you'll have access to all Phish Hacker password file that contains all the pages of their hack password hack until now . Learn how to create pages Phish with Social Engineering Toolkit in less than two minutes. Dork to take all password files stored on web Phishing:

filetype:txt @gmail.com OR @yahoo.com OR @hotmail intext:password
filetype:txt @gmail.com OR @yahoo.com OR @hotmail intext:pass
inurl:"passes" OR inurl:"pass" OR inurl:"passwords" OR inurl:"credentials" -search -download -techsupt -git -games -gz -bypass -exe filetype:txt @yahoo.com OR @gmail OR @hotmail OR @rediff
 Just open Google search and enter dork above into it, you will get all the files Phish password page.
Hope you all like the way noobie to see all the passwords hack. There are several other ways to hack hacker in a smart way. We will learn that in the next tutorial.


Read More Add your Comment 0 comments


SQL Dumper v.8.0



SQL Dumper v.8.0



Primitive remembrance of what distinguishes the program from the old version:

1. The speed and strength to bring sites
2. speed in the extraction of data tables
3. Protection of crach
4. extracted flag properly
5. you can get mail list
6. More and discovered it yourself

download link: SQL Dumper v.8.0




How To Use?


  1. First, Download Net Framework 4.0 
  2. Download & Extract SQLi Dumper v8.0.rar
  3.  Open SQLi Dumper v8.0.exe          
Download : http://sh.st/RlflX    


Read More Add your Comment 5 comments


new new SQL vulnerable websites 2016 list



  1. http//www.icdcprague.org/index.php?id=10%27
  2. http://www.tadspec.com/index.php?id=15%27
  3. http://spo.1september.ru/articlef.php?ID=200302309%27
  4. http://www.calidus.ro/en/news.php?id=2%27
  5. 5-50  hidden contact  download full list  1-50 
   download list 1-50 : 1-50 SQL vulnerable websites 2016 list.txt 


       52. http://www.ajaximpact.com/detail_opinions.php?id=11%27
       53.http://www.medy.ru/pages.php?id=1244%27&page=4%27
       54. http://education.aspu.ru/page.php?id=57%27 

   download list 1-50 : 50-100 SQL vulnerable websites 2016 list.txt 

101.http://www.kitchengardenpreserves.co.uk/prod_detail.php?cat_id=1%27&scat_id=3%27&prod_id=7%27
102.http://www.profi-car.com/category.php?id=6%27
103.http://www.toploop.com.tw/productinfo.php?id=174%27
104.http://www.kalyrawinery.com/Store/Gifts/product-info.php?id=12%27
151.http://www.interpowermalta.com/prod_info.php?id='%27
152.http://www.zebra.nsk.ru/product.php?id=6558%27
153.http://www.isrsy.org/view.php?id=25%27
154.http://www.readyicons.com/iconset-preview.php?id=11%27

   download list 1-50 : 150-200 SQL vulnerable websites 2016 list.txt


    Read More Add your Comment 2 comments


    Ȱ