Important Note - Interest is terrible thing to waste. Where are you?

\/ w4rri0r \/Hacking is not a crime - It's an art of Awareness. \/ w4rri0r mission \/ is to make the information systems more secure, more aware, more reliable and protect against possible security breaches.

\/ w4rri0r \/ internationally recognized as a Security Researcher or White-Hat Hacker and Hall of Fame by Google, Microsoft, Yahoo, AppleRedHat, AT&T, Adobe, PayPal, Yandex, eBay, Deutsche TelekomBarracuda Networks, Nokia Siemens Network, Tuenti, Opera, BlackBerry, Nokia, SpotifyZynga, Netflix, iFixit, Basecamp, SoundCloudConstant Contact, Xmarks, LaunchKey, Zendesk and we are currently building \/ w4rri0r group \/ and inviting to join worldwide Security Researchers and Professionals. If you think you can contribute anything for \/ w4rri0r group \/ you are heartily invited and we'll give credit for your contribution and is greatly appreciated. [Launching soon]

If you have any questions, ideas, suggestions or contributions please do not hesitate to contact @ This email address is being protected from spambots. You need JavaScript enabled to view it. and will respond you within 24 hours.

Open Panel
  • Register

Google Truths - What Many People Do Not Know About Google

In the present day world computer and internet helps everyone in their daily routine. Everyday thousands of users take help from search engine for getting the knowledge from internet.

A search engine is an information retrieval system designed to help find information stored on a computer system, such as on the World Wide Web (WWW), inside a corporate or proprietary network, or in a personal computer.

Google, One of the biggest search engine is widely used for getting the information. As a google user most of us our aware about its speed and accuracy, it's pronominal.

The Google search engine found at offers many different features including web, images, newsgroups, directories, news searches, language, document translation, and much more...

Google Searches for a particular word and displays the result in front of the user. Undoubtedly Google is one of the most powerful search engine and as we know there are millions of sites on the internet, hence it's very difficult to find the exact result among these millions of sites.

In order to enhance the searching capability certain search techniques are being used. If users want to get accurate information then they must learn about the accurate use of search syntax with Google Truths. Here are few features to improve the search technique in the Google.

These features offer obvious benefits to even the most uninitiated web surfer, As well as allow for far more nefarious possibilities to the most malicious Internet users including hackers, computer criminals, identity thieves and even terrorists.

Using Google to search the information's will locate resources that are available to the public. While these resources are good for some purposes, serious research and academic work often requires access to databases.

Google Truths is the term used when a hacker tries to find vulnerable targets and sensitive data by using search engines. It is the art of using Google's ability to find top secrets of the web and even attain personal, revealing or illegal information.

Google Truth is a repository of hacks for Google users. The hacks are not hacks into Google itself, rather they are hacks that use Google to find results that people should have kept private, but instead have been indexed and crawled by Google.

There are thousands of Google hacks available and listed on this site. 

Few examples are: vulnerable servers and files on servers; sensitive customer and financial information; online peripheral devices like printers, web cams and the like that is publicly available; file containing usernames and passwords. The list goes on;

Google offers many powerful features and advanced search capabilities that make it very helpful for finding certain kinds of information but we aim is to educate students, web & server administrators, security community and Internet users etc.


Check out Google Truths @ - Main Menu








CORE Impact Professional

Logo Core ImpactCORE Impact Professional is the most comprehensive software solution for assessing and testing security vulnerabilities throughout your organization.



IBM Security AppScan

Logo IBM Rational AppScanIBM Rational AppScan Enterprise is a scalable solution to help resolve application security vulnerabilities, offering recommendations to simplify remediation.



HP WebInspect

Logo - HP WebInspectHP WebInspect gives security professionals and security novices alike the power and knowledge to quickly identify and validate critical, high-risk security vulnerabilities.



Acunetix WVS

logo acunetix web application securityAcunetix Web Vulnerability Scanner (WVS) is an automated web application security testing tool that audits web applications by checking for hacking vulnerabilities. 



w4rri0r - Hacking Is Not A Crime - It's an art of Awareness

\/ w4rri0r - Hacking Is Not A Crime - It's an art of Awareness \/ -  w4rri0r work in the dark, w4rri0r do what w4rri0r can, w4rri0r give what w4rri0r have, w4rri0r doubt is w4rri0r passion and w4rri0r passion is w4rri0r task. The rest is the madness of art \/ w4rri0r \/ 

\/ \/ are the great resource for information security professionals and researcher. \/ w4rri0r \/ offers a extensive variation of information security services that include SECURITY EXPLOITS (Bug or Vulnerability), SECURITY ADVISORIES (Security Alerts), SECURITY RESEARCHER TOOLBOX (Freeware, Shareware & Open-Source), SHELLCODE (Attacker Controller - Chunk of Data), SECURITY TRAINING (Educational Purpose), SECURITY NEWS (Security Recent or Important Events) and with this group you can be assured that you’re in the right hands. \/ w4rri0r gr0up \/  efforts being endorsed and appreciated by administrators, security researchers and members of various underground hacking groups and communities worldwide.

\/ w4rri0r mission \/ are to make the information systems more secure, more aware, more reliable and protect against possible security breaches.