Follow us on Twitter!
Hacking isn't just Computers & Exploits. It's a Philosophy. - Mr_Cheese
Friday, September 04, 2015
HellBoundHackers Main:
HellBoundHackers Find:
HellBoundHackers Information:
HellBoundHackers Exploit:
HellBoundHackers Programming:
HellBoundHackers Think:
HellBoundHackers Track:
HellBoundHackers Patch:
HellBoundHackers Other:
HellBoundHackers Need Help?
Members Online
Total Online: 17
Guests Online: 16
TeamSpeak Online : 5 Members Online: 1

Registered Members: 89950
Newest Member: eltenaz
Latest Articles
Articles: Web Hacking

15 Ways to help you stay out of Jail

15 most common ways to stay out of Jail.

5 Firefox Addons Everyone Should Have

Here's a list of Firefox Addons that everyone should have and use.

AJAX Tutorial

How to use AJAX in websites

Advanced csrf and xss tricks

Going a little bit deeper into csrf and xss.

Basic 15 - Spoiler free Walkthrough

Has it been 30 minutes? Still looking for the right answer? Well, if you really just can't get this one, here's a simple article for you.

Basics OF webhacking

Basics Of WeBhAcKiNg nothing more nothing less

Basics of Web Hacking

Just a few tips...

Blind SQL Injection

Blind SQL Injection explained


An explanation of a new XSS assault vector. Only useful for IE and semi useful against Konqueror

Camera Hacking with Google

This is a list of strings that you could type into google and find a unprotected network camera.Enjoy!

Complete Set Of CGI-BIN Exploits and what they do

This tutorial will show you many Cgi-Bin exploits out there and tell you what they mean.

Content Type Spoofing

Fooling browser into doing things due to content type spoofing!


Viewing and editing cookies

Cracking MD5

Fine article on using a tool and wordlists to crack MD5 (unsalted).



Defacing FTPs

Another fine article about using an old exploit and a hacker's best friend, Google to find vulnerable sites.

Els1 Basic To Javascript (EBTJ)

Basics to Javascript, from els1 productions.

Email Spoofing with Telnet

Learn to email people from a different email address by spoofing.

Email spoofing... yet again

i did add this article a while ago but it went missing so.... i\'ve decided to add it again.

Exploiting a common EQDKP vulnerability.

a common CMS used by guilds in MMORPGs has a severe refspoof vulnerability.

FrontPage Extension Hacking made easy

Just a simple tute for beginners on FrontPage Extension

Get access to a website...

A simple way to trick the owner of a website into changing their password.

Get around censorship

Look at the title, but if I must...Get around the internet blocking at your school (or work place I guess)

Getting past Webbalanced

Getting past the Webbalanced blocking service

Guestbook Hacking

How to take control of Guestbooks, most commonly guestbook.html

Guide to telnet

A small guide to telnet. It covers HTTP and SMTP

Hackers essentials

Basic tools/progs a hacker mite need

Hacking InvisionFree forums

Ever wanted to hack that InvisionFree forum that you despise? Or maybe you're the ethical hacker that simply wants to show InvisionFree owners how to stay secure (through demonstration, no less). Either way, you might find this guide useful.

Hacking With Windows XP

\*\/*/ Hacking with Windows Xp /*/\*\ by Carolyn meinel Using telnet

Hacking in General


How to Use Netcat port 23

NetCat the other Telnet

How to become a hacker

How to become a hacker by Eric Steven Raymond

How to make popup and logout avatars

This tutorial will teach you how to make annoying avatars which will log you out from a forum, or cause annoying popups. <h1>mofo</h1>

How to rip from google videos

Rip from google videos.

How to save Pandora songs with the new version of pandora

They plugged the old hole, heres a new one.

How to view anyone's comments on

Err...kinda explained it in the subject. HOW TO VIEW ANYONE'S COMMENTS ON MYSPACE. There. Just in case you didn't get it.

IE Xploit

What the IE exploit is, how to use it, how to hide it and what you can do. Examples. Script kiddies beware, this article is engineered only to give enough to be just that script kiddies, the hardcore stuff you've got to learn yourself.

Include Exploits

Old but very effective technique to gaining to a web server

Injection via User Agents

What if there are no unprotected search boxes or logins to inject through?

Intro to CSRF

An introduction to Cross-site request forgery. Description, explanation, examples, prevention

Javascript Injections

Basics of javascript

MySQL injection complete tutorial

MySQL injection tutorial by sam207... please rate/comment it

Netcat back doors

Break into any computer you want

Network Hacking

How to access a folder or hardrive on a pc on your network.

Obtain a passwd file

Obtain passwd file

Obtaining a visitors IP adress

Here is some PHP code on getting a visitors ip adress

Password cracking!!

Different ways to crack a password

Physical Intrusion

A small guide about physical intrusion and its various aspects

Piczo Guestbook/Shoutbox Defacement

Ever wonder a safe way to post in a piczo guest book or shoutbox, or totally erase every message in one? Well this ones for you!

Port Knowledgebase

List of frequently seen tcp and udp ports and what they mean

Proxies 101

proxys proxi proxys??? basically a little tut one proxys.

Real-time source modification through Opera

How to modify the source without the hassle of offline editing & javascript injetion.

Remote Code Execution

A basic guide on how this method works and how to stop it

SQL Injection

Basic Guide to simple SQL Injection

SQL Injection

SQL Injection good for beginners

SQL Injection Whitepaper

long (blind) sql injection guide from basic to advanced showing all sides of the story

Sending Fake Emails

You want to send emails from you friends email account!!

Simple email spoofing with telnet

Send emails from other peoples addresses (or fake ones)

Spoofing HTTP Requests with Putty

Spoofing HTTP Requests with Putty

Steal zoom modem user's isp username and pw!

Yes... it really is possible, and very easy, i stumbled upon it when i had a zoom modem

Steps to Serious Penetration

An in depth article written by M3DU54 for me in regards to a question i asked about how to perform steps to Serious Penetration

Stuff you need for hacking

Some small software pieces which you really need if you want to hack.

TCP/IP port List

official tcp/ip port list

TelNet - tutorial for noobs

A intro to telnet with examples and brief history


IP Addresses you should not attemped to scan when doing IP scans

Using Google Search AJAX API in Python

This article hopefully teaches you how to use Google Search AJAX API in Python.

Using Internet Explorer for FTP

If you dont have the patience to get easyFTP or something else like that, heres a fix.

Various Piczo vulnerabilities

Just a list of various piczo vulnerabilities. Please don\'t flame me too much, it\'s my first article. it\'s kinda aimed at beginners and script-kiddies, so i tried to keep it simple

WEP Cracking, FBI Style

How to crack WEP like the feds, in 3 mins.

Ways Around Internet Censorship

This tutorial will help you get around those nasty firewalls at school or work and help you see the internet in its entirety.

Website Defacement

Learn to deface websites and break into intranets.

WiFi Gateway/Ibahn bypass

I do hate all these fake free wifi networks so I decided to look into how to work around these annoying buggers.



XSS Attacks and Phishing

A basic tut on XSS, how to test it, how to use this Vulnerability in a more interesting way.

XSS That some people forget about

This article describes a few types of XSS methods that you can use, which a lot of sites forget about.

XSS The Complete Walkthrough

XSS The Complete Walkthrough

XSS-Good For Java 4

What is XSS? Well read to find out.

constructing an XSS Worm

A step-by-step explanation of how an attacker creates an XSS worm

exploiting Windows, Linux, and MACs

an explanation of how to use exploits with msf, in order to get a payload on a remote machine (i.e. reverse shell, immediate root, etc..)

javascipt injection tutorials

covers all the methods and uses of javascript injection.

trojan TCP/IP ports

trojan TCP/IP ports just think what you can do with these

Most Read Articles

Selecting Your First Programming Language

Reads: 206267

If you are stuck wondering were to start in your programming adventure this is the article for you.

The Impact of the Gold Rush on Western Society

Reads: 186059

Essay for school on Gold Rush. Not really about western society. Just added "western society" to make it sound more specific. But good Gold Rush info. Please comment. I can expand on it.

Root in Under Five

Reads: 160737

For Schools and Such

Cracking Wep Keys With BackTrack

Reads: 147532

Guide to cracking wep keys for BEGINNERS! By: Exidous

The Tetris Effect

Reads: 132083

A quick overview on a psychological condition known as "The Tetris Effect."

Hydra: Brute-Forcing Passwords (Dictionary Attacks)

Reads: 76753

Brute-Forcing Logins on Remote Services.

MySQL injection complete tutorial

Reads: 73802

MySQL injection tutorial by sam207... please rate/comment it

Game of Life

Reads: 71068

A small article examining the influence of Conway's Game of Life on the hacker culture.

Basic 1 to 17

Reads: 69214

This article is got it....BASIC 1 TO 17! This is a :"how-to-" and may contain some spoliers.

Basic Web Hacking *ALL*

Reads: 63440

A good place to start. Simple instructions for every challenge. *VERY MINOR spoilers*


Reads: 59198


Complete Set Of CGI-BIN Exploits and what they do

Reads: 56827

This tutorial will show you many Cgi-Bin exploits out there and tell you what they mean.

School Network Hacking

Reads: 45793

How to become Admin on your school. This way works for most schools.

Using Python's HTMLParser class

Reads: 43290

A quick intro on parsing web pages in python

Camera Hacking with Google

Reads: 41368

This is a list of strings that you could type into google and find a unprotected network camera.Enjoy!

Latest Articles

Using Google Search AJAX API in Python

Reads: 3863

This article hopefully teaches you how to use Google Search AJAX API in Python.

Pen testing 2 walk through

Reads: 3658

a walk through on the pen testing 2

Top 10 Simple Home Security Tips

Reads: 3824

Easy Home Networking Tips!

Pen Testing 2

Reads: 3969

If you need hints because you are still stucked with pen test 2, this article is written for you.

5 Firefox Addons Everyone Should Have

Reads: 7148

Here's a list of Firefox Addons that everyone should have and use.

Realistic 18

Reads: 4557

A guide to help you with the 'insane' realistic 18.

IT Security, a way of life.

Reads: 5307

Offensive Security vs. Defensive Security general questions and answers essay.

WIFI - Part 6, Airodump-ng Part 2

Reads: 9753

This is a pretty thorough guide on everything Airodump-ng. It covers the basics and some of the more advanced features that are part of the tool. This part is about the Airodump-ng Results.

WIFI - Part 6, Airodump-ng Part 1

Reads: 10108

This is a pretty thorough guide on everything Airodump-ng. It covers the basics and some of the more advanced features that are part of the tool. This part is about the Airodump-ng options and syntax.

WIFI - Part 5, OSI and TCP/IP Models

Reads: 6001

This is a quick guide that will help you understand the OSI model and the TCP/IP model. Both are fundamental when dealing with any kind of networking.

WIFI - Part 4, Airmon-ng

Reads: 6934

This is a guide on how to utilize Airmon-ng to be able to place a wireless interface into monitor mode, and be able to successfully use it.

Artificial Intelligence

Reads: 6674

I wrote this a while back and thought it would be good to post on here to start some good debates or conversations. This article is a thought prosses on what gaps the real human mind with that of AI

WiFi - Part 3, Aircrack-ng

Reads: 9625

This is just a summary of the various tools that are included with the Aircrack-ng suite. It also goes over the installation process.

WiFi - Part 2, Protocols, Bands and Channels

Reads: 9844

This section goes over the common 802.11 protocols, talks about bands and channels, and some common characteristics of antennas. Also talks about world regulartoy domains, and how to set them.

WiFi - Part 1, Interfaces and Drivers

Reads: 11388

This section goes over Interfaces, Drivers, and Logs. Depicts what each of the above are, how to view them, and their importance.