DOWNLOAD
Watch Tutorial ...
Home » Archives for August 2012
Monday, 27 August 2012
Hacking For Dummies [Excellent book for Ethical hacking]

It's bad enough when a hack occurs-stealing identities, bank accounts,
and personal information. But when the hack could have been prevented by
taking basic security measures-like the ones described in this
book-somehow...
Sunday, 26 August 2012
How to Make Facebook Phising page

here we go for creating Fake page of Facebook...
Here we will need 3 types of files for facebook:
1. A php file with any name say login.php. This php file places main role to get the passwords of victim
2. index.html which is...
Saturday, 25 August 2012
Friday, 24 August 2012
Rapzo Logger v1.5
Stealers [6] All Stealers Pure Code - No Drops + Runtime FUD
[#] Firefox 3.5.0-3.6.X
[#] DynDns
[#] FileZilla
[#] Pidgin
[#] Imvu
[#] No-Ip
Features [25]
* Full UAC Bypass & Faster Execution
* Coded in Vb.NET
* Min Req...
Sharp Stealer 2.5
Steals:
• Firefox (All versions, included 3.5) New
• Internet Explorer (All versions, included 8) New
• Google Chorme (All versions)New
• MSN Messenger / Live Messenger (All versions)
• Yahoo Messenger (All versions)
• Yahoo ETS
•...
Setup Ardamax Keylogger To Hack ID's [Video]
Ardamax Keylogger is a keystroke recorder that captures user's activity
and saves it to an encrypted log file. The log file can be viewed with
the powerful Log Viewer. Use this tool to find out what is happening on
your computer...
XSS,RFI LFI and SQLI Attacks [Ebooks]
Hello Guyz toady i m sharing 3 ebooks of XSS ,LIF RFI and SQLI Explained how thery works and how to attack a site .
XSS Guide
LFI and RFI Guide
SQL Injection Gui...
Thursday, 23 August 2012
Tabnapping [New Type Of Phising]

Tabnapping Is the new type of phising attack
Phising : it is fake page of facebook which is sent to victim . and he logins like facebook then its email and passowrd is sent to hosting of phising
Watch Video
...
Wednesday, 22 August 2012
Toxic Public Crypter [100% Fud]
Toxic Public Crypter 100% FUD
Runtime + Scantime + EOF Support
SCAN OF CYRPTED PRO RAT SERVER:
File Info
Report date: 2010-04-17 17:25:57 (GMT 1)
File name: Server.exe
File size: 440252...
Tuesday, 21 August 2012
Super Hide IP 3.2 [Crack Included]

Anonymous Surfing with Super Hide IP Protect your privacy on the
Internet. Use Super Hide IP to surf anonymously, prevent hackers from
monitoring your online activities or identity thieves from stealing your
identity and...
DDOS Attack [Kill the Site]

[Use VPN or Ip Hiding Tool to do following Action]
[Like HotSpot Shield or Super Hide IP]
DoS Attack Stands For Denial of Service Attack
What Is DoS?
A: Denial of Service (DoS) attackes are aggressive attacks on...
Monday, 20 August 2012
How To Upload Shell In JOOMLA
Hello Guyz Today im sharing a tut How to Upload Shell In Joomla
1. Suppose we have an access to joomla admin.
2. Once you Login you see the below screen.
3. Then look for Extensions and in...
Huge List Of SQL Dorks

Dorks Are very use ful to scan Vulnerable sites . So Today im giving you a list of dorks for you
So Enjoy guyz
View Li...
Friday, 17 August 2012
How To Hack ID's With Rin Logger

DOWNLOAD RIN Logger
Run the keylogger file on your pc and click on “Create new”
Now, enter the information as follows:Email address: your email address (gmail recommended)Account Password: Password of your Email address.Keylogger...
Z-A Pakistani SMS Bomber (Fast Speed)

Z-A's Pakistani SMS Bomber
Created By ME & Zaryab Jamil
Greets:-
Mudassar Nazar - Maher Bro - Zaryab Jamil
Nice Speed
Sms Counter
DOWNLOAD
...
Thursday, 16 August 2012
How To Fix Windows Errors (Keep your Windows live long)
Today i will tell your how to fix windows errors and drive volume fixer
it repairs currupted files in the hard disk and keeps your windows clean
Ok lets Start
1. Go To Start >run > type chkdsk press Enter
Now...
How To make .exe file Icon Changer ||Visual Basic Tutorial||
Hello Guyz today i will tell u how to create an .EXE file Icon changer in Vb
1st of all open vb and create new Project
Now from Tool Box add following things
2 textboxes
3 buttons
1 openfiledialog
button1 = browse...
Wednesday, 15 August 2012
Havij Sql Injection + Upload Shell + Deface Site [full tutorial]

Things Need
1. Havij Automated Sql injection Tool DOWNLOAD From Here
2. A Shell DOWNLOAD SHELL
3. Security [ use Tor browser to browse anonymously DOWNLOAD TOR
Watch Tutoria...
Some Best Important ||Shells||

the shells are most important to hack a website . Today i m sharing some important powerfull shells
which are very useful to deface a site
1. c100
2. B374K
3. WSO Shell
4. Madspot shell
5. Priv8 Shell [ used...
Subscribe to:
Posts (Atom)