Best of Wikipedia Tricks (Part1)

How to Search Your Website Link in Wikipedia


How to Find the Editors of Particular Wikipedia Articles

This site shows some current status and analysis of en.wikipedia. The data upon which this site’s contents are based is publicly available on wikipedia. The author of this site has no affiliation with wikipedia or other wikimedia projects.


How to Convert Wikipedia Article to MP3

Pediaphon is a free service by Andreas Bischoff, which generates MP3 audio files from Wikipedia articles by speech synthesis. The service was developed at the University of Hagen, Germany. These files can be played immediately in the web browser or be downloaded for later use in a MP3-Player. A podcast will be generated for each inquiry.


How to Track Wikipedia Article Page View Statics will add a link to a site showing traffic information for any given page on Wikipedia. By default the link is included in a pre-formatted sentence and links to statistics for the previous month. The default behavior can be manipulated using a small set of parameters.

How to View Deleted Wikipedia Webpage


Deletionpedia is a web site containing articles deleted from the English Wikipedia between February and September 2008. Its version of each article includes a header with more information about the deletion such as whether a speedy deletion occurred, where the deletion discussion about the article can be found and which editor deleted the article.

Best of Metasploit Meterpreter Script


Getcountermeasure is an automated script Disable security measures such as antivirus, firewall, and more.


getgui script is used to enable RDP on a target system.


gettelnet script is used to enable telnet on the victim.


Winenum script is used to dump tokens, hashes and more


Hostedit Meterpreter script is used to edit host file of windows


getlocalsubnet script is used to get the local subnet mask of a victim


Checkvm used to see if you exploited a virtual machine 


Killav used to disable most antivirus programs.


Scraper is an automated script that gathers the victim machine environment information


screenspy used to take screenshot f remote pc. 


keylogrecorder used to start keylogger in victim pc. 


credcollect used collect the hashes of victim users.

Run get_application_list used to get list of installed applications
Run netenum Network Enumerator Meterpreter Script
Run metsvc used to make permanent backdoor

Best of Online Website Scanner

Virus Total

Virus Total is a free service that analyzes suspicious files and URLs and facilitates the quick detection of viruses, worms, Trojans, and all kinds of malware.


AVG Online Web Page Scanner

The AVG Link Scanner® Drop Zone lets you check the safety of individual web pages you are about to visit. You may have received a suspicious link in an e-mail — just copy the URL (web page address) and drop it into the box below. Link Scanner® will examine the web page against 30-day domain threat history reports to see whether it’s hiding any suspicious downloads.


URL Black List Checker

Use this form to find out if a list of sites or URL is in the blacklist and in which categories all in one go. Only valid domains and URLs will be accepted.


Norton Web Safe

Norton Safe Web is a new reputation service from Symantec. Our servers analyze Web sites to see how they will affect you and your computer.


Unmask Parasites

Hackers exploit security vulnerabilities in popular web software such as blogs, forums, CMS, image galleries and wikis to insert hidden illicit content into web pages of innocent third-party web sites. Thousands of website owners are unaware that their sites are hacked and infected with parasites.


Website Malware Scanner

Enter a URL (ex. and the Sucuri Site Check scanner will check the website for known malware, blacklisting status, website errors, and out-of-date software.


Online Link Scan
Trend Micro Web Reputation
Malware Domain List
vURL Online
Browsing Protection

Best of SQL Injection Tools

Havij SQL Injection

Havij is an automated SQL Injection tool that helps penetration testers to find and exploit SQL Injection vulnerabilities on a web page.The power of Havij that makes it different from similar tools is its injection methods. The success rate is more than 95% at injectiong vulnerable targets using Havij.The user friendly GUI (Graphical User Interface) of Havij and automated settings and detections makes it easy to use for everyone even amateur users.



Pangolin – Automated SQL Injection Test Tool

Pangolin is a penetration testing, SQL Injection test tool on database security. It finds SQL Injection vulnerabitlities.Its goal is to detect and take advantage of SQL injection vulnerabilities on web applications. 



The Mole

The Mole is an automatic SQL Injection exploitation tool. Only by providing a vulnerable URL and a valid string on the site it can detect the injection and exploit it, either by using the union technique or a boolean query based technique.




Sqlninja’s goal is to exploit SQL injection vulnerabilities on web applications that use Microsoft SQL Server as back end. There are a lot of other SQL injection tools out there but sqlninja, instead of extracting the data, focuses on getting an interactive shell on the remote DB server and using it as a foothold in the target network.




Safe3SI is one of the most powerful and easy usage penetration tool that automates the process of detecting and exploiting SQL injection flaws and taking over of database servers. It comes with a kick-ass detection engine, many niche features for the ultimate penetration tester and a broad range of switches lasting from database fingerprinting, over data fetching from the database, to accessing the underlying file system and executing commands on the operating system via out-of-band connections.



BSQL Hacker

BSQL (Blind SQL) Hacker is an automated SQL Injection Framework / Tool designed to exploit SQL injection vulnerabilities virtually in any database.



FatCat Automatic SQL Injection
SQL Pozion
Dark Jumper