ads

Saturday, March 10, 2012

GiGa Crypter Public | FUD 100% | Scantime/Runtime [UPDATE]





[Image: gigai.gif]


Example seeting DarkComet 3.1
 
Better use Compressed UPX manual :)




Rules : if want i make update again please dont scan @ VirusTotal only scan @ http://vscan.novirusthanks.org/ i want all Understand !!



New Update Feature : Added Bind Files, and make new method to get Undetectable

If u think i Infect people don't download !!

Scanner Crypter
File Info

Report date: 2011-02-09 13:32:07 (GMT 1)
File name: giga-crypter-public-exe
File size: 3638272 bytes
MD5 Hash: 8de9a8826f8fd56aeda146f28d4394b0
SHA1 Hash: 08ce30ac64b27ae57ad3e428a7ab9f2a10dba6d2
Detection rate: 0 on 16 (0%)
Status: CLEAN

Detections

a-squared -
Avast -
AVG -
Avira AntiVir -
BitDefender -
ClamAV -
Comodo -
Dr.Web -
F-PROT6 -
Ikarus T3 -
Kaspersky -
NOD32 -
Panda -
TrendMicro -
VBA32 -
VirusBuster -

Scan report generated by
NoVirusThanks.org


Crypted File Scanner
File Info

Report date: 2011-02-09 12:37:15 (GMT 1)
File name: testtt-exe
File size: 94208 bytes
MD5 Hash: acd00d87a7f27178f3fb46ca26c7a003
SHA1 Hash: e70b057086a4ffcf311dff2145e6d09a9a96ea60
Detection rate: 0 on 16 (0%)
Status: CLEAN

Detections

a-squared -
Avast -
AVG -
Avira AntiVir -
BitDefender -
ClamAV -
Comodo -
Dr.Web -
F-PROT6 -
Ikarus T3 -
Kaspersky -
NOD32 -
Panda -
TrendMicro -
VBA32 -
VirusBuster -

Scan report generated by
NoVirusThanks.org
<


Download Link
 Here Edited old link Down Sleep



Friday, March 9, 2012

Acunetix.Web.Vulnerability.Scanner.CE.v8.0.20120223.Retail.Cracked.yoza[UpK]


Acunetix.Web.Vulnerability.Scanner.CE.v8.0.20120223.Retail.Cracked
.yoza[UpK]




Product name : Web.Vulnerability.Scanner
Version           : 8.0.20120223.Retail
Release Type : Consultant Edition
Last Updated : 23 February 2012 - 10:38 AM
OS                  : Windows XP, Windows 2003, Windows Vista, Windows 7 (x86/x64)
Developer      : Acunetix
Web-site       :  http://www.acunetix.com/


Acunetix Web Vulnerability Scanner includes many innovative features:
  •    AcuSensor Technology
  •     An automatic client script analyzer allowing for security testing of Ajax and Web 2.0               applications
  •     Industries' most advanced and in-depth SQL injection and Cross site scripting testing
  •     Advanced penetration testing tools, such as the HTTP Editor and the HTTP Fuzzer
  •     Visual macro recorder makes testing web forms and password protected areas easy
  •     Support for pages with CAPTHCA, single sign-on and Two Factor authentication
             mechanisms
  •     Extensive reporting facilities including VISA PCI compliance reports
  •     Multi-threaded and lightning fast scanner crawls hundreds of thousands of pages
  •    with ease
  •     Intelligent crawler detects web server type and application language
  •     Acunetix crawls and analyzes websites including flash content, SOAP and AJAX
  •     Port scans a web server and runs security checks against network services running
             on the server


You can download Acunetix.Web.Vulnerability.Scanner.CE.v8.0.20120223.Cracked.
Version, here: Download


     Filename: Acunetix.Web.Vulnerability.Scanner.CE.v8.0.20120223.Retail.Setup.rar
    Filesize  : 13.70 MB

Wednesday, March 7, 2012

Saturday, March 3, 2012

How To Setup Your Own Shell Booter




Okay, so a lot of people don't want to mess around with bots and such, and want to start DDoSing, so I'm making this guide on how to get free shells, and setup a shell booter. This is great for xbox live booter and such, please note you may need a lot of shells to hit someone off, or it will take a long time. My best suggestion would be to buy dedicated private shells.

What Is a Shell Booter?

A shell booter uses a series of shells with a flood to send packets to someones router, and the router cannot handle that much packets, and simple no longer allows you to access websites for a short while. A booter can use slowloris POST, and a GET shells. GET are the best shells to use, these are the ones that are green and only have IP and time.


Downloads:
Shell Checker - By (Unknown, sorry I got it given to me) - This will be used later on in the tutorial:

How to Setup a Shell Booter:
Creating a MySQL Database

I am now going to walk you through on how to make a MySQL database, this is required for the booter to function, as it saves the users, passwords, shells, and so on. In the following demonstration I will be using cPanel.

Locate something relating to Databases, in this case mine looks like the following, this will look like this in all cPanels

[Image: jG6Eu.png]

Now, once you are here, make a name for the database, in the demonstration I will be using "desired" for the sake of this tutorial, I did change it to test after the screenshot, once again this is using cPanel, a host panel could be different.

[Image: jCmig.png]


Now scroll down, and you will see another part, this time username, and password of the database, I used test for this tutorial, and a password of test, you can use anything you desire.

[Image: jG8M4.png]


Now, a bit down select the two you made, and click add, this will add them together.

[Image: jGAUC.png]


Once you've proceeded with that, you will be prompted with a menu of privledges, click all privledges like shown below, that's MySQL done for now.

[Image: jcXns4.png]

Uploading and Editing your MySQL Database Information

Once downloaded the source, zip the folder called source and upload it to your desired host, booters are blocked on hosts such as 000webhost, I personally use offshore web hosting which can be found here: http://www.onebesthosting.com.

Once uploaded extract the source.zip and enter the folder. Find and locate dbc.php, now edit it like I have shown below, click the spoiler to locate the image. Replace the information with your MySQL information you have just created as shown above, make the user and name the same for less confusion. <

[Image: jcXp08.png]


Importing the SQL Database / Configuring It.

Now go to your host panel or cPanel, in this case I am using cpanel, and locate PhpMyAdmin, and open it.

[Image: jG6Eu.png]

Now, click your database on the side, and click the SQL tab above.

[Image: jcSq3W.png]

Now, the file you downloaded, go into the folder (On your desktop, not host) and locate dbprepare, and open it, Control + a (select all) and then Control + c (Copy), now go back to MySQL and paste it in the SQL box, scroll up and scroll down a little bit, replace the name with your DB name. Click go. Done!

[Image: jcSM1U.png]



Now, we're up to the last part of setting up the booter, go to http://yoursite.com/source/register.php obviously replace yoursite, with your own domain, and register yourself a new account. Once completed go back to PhpMyAdmin, and go to the users table. Like shown below.


[Image: jChVY.png]

Now find approval on the side, and find user_level, change user_level to 5, this puts you as administrator, and approval to 1, this makes it so your account is approved, like shown below.

[Image: jcXnwA.png]

Complete! Now login to your booter at http://yoursite.com/source/ you've successfully setup your booter! Now to get free shells.

Getting Free Shells From Pastebin!

Open ShellChecker.exe, the link I have provided above, that you downloaded before, and go to pastebin.com, or pastie.org. Or other pastebin sites that allow search.

In the search box type one of these in, open them until you get a big list.

Code:

/x32.php

/greenshell.php

/shell.php

/webdav/


Once you've found a list, go to the bottom, and copy it all, from the little box, and paste it into the first collum of your shell checker like shown below.

[Image: jcSMxC.png]

Once that's done, click start, after the scan has started it will supply you will 100% working shells! This program is great! You will need a lot of these though, as some shells may be weak, I still recommend buying or asking for private dedicated shells for the booter to work best.

[Image: jcWDeg.png]


TCP are POST shells, UDP are GET shells.

Wednesday, February 29, 2012

Basics of Hacking 101


Are you sure you want to hack?
First things first.
Do a background check of yourself, to tell whether really wanted to hack, or you just want to go to jail for some reasons.

First of all, you must have some basic knowledge about a computer. Upon reading this, you just passed the first test. Next, you should also be patient, for if not, you won't get anywhere. Next, you should have the "heart" or passion to hack, because as stupid as it sounds, if you don't have it, you won't make it to the finish line.

Now, if you passed the first test, you're 1% closer to your goal to be a hacker. Next, this is the special part because you're on HackForums, which can be considered the largest forums for hacking and the likes. You should know how to speak PROPER andDECENT English, because you won't be able to connect with properly with the cyberworld if you don't know your grammars, as simple as they could be. Next, if you're new here, you should learn your manners, but don't let yourself get trampled on by others. First, read the Help Documents for the Rules and Regulations, so as not to be banned early. Then, it's okay to ASK questions, but make sure they are SPECIFIC and makes sense, even if The Lounge is created for general purposes. Next, as a new member, you should learn to absorb GOOD info from bad ones, which usually come from trolls/skids. You'll notice not everyone here is friendly, not everyone is as good as a REAL hacker should be, and not every VIP member here is as respected as they should be, many of them just paid for the membership but still, they are trolls, so be observative. Next is, you must also be fine with the rule "Learn by yourself". Of course, not literally, because we help each other here, but not to the extent of having a 1-on-1 tutorial. Mentors DO exist here, but they seldom take apprentices 1-on-1 because the don't have much time, plus the fact that they live in different time zones. Lastly, if you are a new member, this is the most important thing, DO NOT FORGET THOSE WHO HELPED YOU, and LEARN TO SAY THANKS OR SHOW APPRECIATION OR GIVE CREDIT TO THEM.


What is Hacking?
Let's make it simple as it can be. You watch movies and you hear news about hacking as a criminal thing to do, right? Well, the world idea about hacking nowadays is not really true, so let's redefine it again. Hacking, according to it's earliest definitions, is the Art of Exploitation. In more simple terms, when you hack, you take advantage of vulnerabilities/weaknesses of a software/hardware/peopleware. Hacking is NOT JUST about breaking into a server, stealing information, controlling things like traffic systems, tracking people via GPS, etc.; but it's more like a discipline. True hackers, whatever their specialization is, have different principles in life that is connected on their chosen profession. They DO break the laws most of the times, but that's because they are curious on how far they can go, or what kind of things they can do with their skills, and usually, the "money-making" is just a side dish of it, because HACKING IS A LEGAL PROFESSION, and they're still humans which needs food to survive.


How to Become a Hacker?
This is what new members always ask. "How do I become a good hacker?", "How do I hack these...", "What do I need to become a hacker?". These are just few of the thousand questions a newbie would ask.

If you're a newbie, and you're reading this, I got a starting tip for you.
Don't act like you don't even know how to type a word.

One of the first starting tips to be a "good" hacker, because you can't be a GREAT hacker when you didn't passed the GOOD status, is to have the ATTITUDE. If you're new, don't act STUPID, yet don't act like you know everything even if you don't.
Setting Goals

Now, to be a hacker, the first thing you need to do is set some GOALS. Goals will guide you through your journey here in the cyberworld. I also have a tip in making goals: DO NOT RUSH. You won't get any progress if you think that you can be the world's best hacker overnight. You also might want to think of what do you really want to learn first, or what do you want to be as a hacker.
Types of Hackers

Speaking of that, I'm gonna discuss a little bit of what type of hackers exists, so that you can decide what you want to be, although you can really switch anytime you like.

The first is the Black Hats.
Black Hats are hackers who do "illegal" stuffs with their skills. They are usually the one's who steal information for certain purposes. Nowadays, being a black hat is not that EASY anymore, unless you have the guts to do it. Back in the days, the black hats we're able to do MORE because the police still doesn't have the right equipment to match the skills of our black hat fellows. Many black hats usually hack for money to sustain themselves and their activities, but today, you'll need to take extra precautions so as not to be caught. That's why black hats are now turning into our next type of hacker.

So, to balance the cyberworld after the black hats was publicly known, the White Hats emerged.

areLEGALLY paid by companies or individuals who hire them for their services.

Lastly, there is a third category, which is most probably one with the highest population 
nowadays, the Gray Hats.
A combination of the two categories above, these type of hackers might be the trending type nowadays, because the hacker culture have grown so much complicated, that being a black hat or a white is not enough anymore. They do steal information for some reasons, but usually for money. But they also help those who are victims of their fellow hackers, which places them on the side of white hats.

After setting your goals, and you have determined what you want to be, or what you really want to do, and you're really sure you want to learn the Art, let's have a start on your journey.

Resources

So, let's start with this one. Firstly, you should be able to identify your resources first. Hacker's common mistakes is that they want to do a "hack", but now knowingly, they don't have the resources for it.

As a hacker, you should know your computer well, because it is the most important resource for all hackers. You should be able to know it's limitations, so as not to totally mess it up. Also, you should have a basic concept on how a computer works, even if it's just very basic like "Input -> Process -> Output -> Storage" type of concepts, because it's good to have background first on the general, before diving to deeper parts of hacking.

Also, as a hacker, you must learn to SEARCH for your resources.



Many new members always ASK first without even searching, because I myself did it when I was a new member. You must learn to search because it's in searching that you develop one of your skill, to sort out bad info from good ones, which you will need if your need to Dox someone. (Dox is like "profiling" someone, say for example, a target of yours. It will be discussed on another tutorial I will make, or you can take a look around HF by using Search)

 Under certain circumstances, you will need, say for example, tools which are high-quality, you will have to pay for it. Just a word of advice, as a new member, even if you have money, don't buy things yet here, except the VIP Upgrade to be L33t or Ub3r, because you'll learn that everything you need CAN STILL BE FREE, but just not as good as paid ones.
Skills

A hacker won't survive in the cyber-world if he doesn't have the sufficient skills to do it. It's not included in the earlier test, because even a noob can be a great hacker if he has the passion and determination to learn.

There are many skills a hacker should have, but I will discuss two of the important skills you must have as a new hacker.

One is you have to train your Social Engineering skills. Social engineering, or SE for short, is simply defined as the Art of Human Manipulation, or human hacking in more simple terms. In hacking, lying/faking/spoofing is ALLOWED. It is one of the basic skills you will need, especially when you are targeting accounts for their information. Furthermore, as a side dish of this topic, you'll learn thatMANY, if not everything, in the Internet is fake, or just a part of social engineering for a hack or exploit.

Another skill you must have is coding. This is one of the hardest skill that you MUST acquire as a hacker, because it requires time, effort, patience, and perseverance. But, once you get good in coding, you're as much as close to be a great hacker before you know it. Coding is the skill in which you learn to "code" or create your own program using various languages like the C Family (C, C++, C#), Java, Phyton, and many more. Upon learning this skill, you don't just learn coding, you improve even yourself, because it improves logical thinking, patience, and not to mention your creativity when designing your programs. Also, if you're a coder, you would be know for your programs, especially if they are high-quality. Many coders nowadays prefer not to hack, but just to code the tools used for hacking because they still earn for their programs, PLUS it's legal.


As of now, this is all you need to start in hacking. If you passed through this tutorial, you're one step closer to be a good hacker, because you got patience to read it.


Sunday, February 26, 2012

Thread Options [TuT] Everything you need to know for Downing a site! [DDoS][ObjectIvvez]




Downing a site


Introduction
Welcome to this tutorial, it's a Noob friendly tutorial about downing a site. I'll explain how everything works and how you can down a site!

DoS
The first thing i gonna talk about is a DoS.
DoS stands for Denial of Service.
A DoS is an attempt to make a computer or network resource unavailable to its intended users.

There are many programs, that you can find on Hackforums to DoS somebody. 
In the section Hacking Tools and Programs you can search and you'll sure find a nice program.

DDoS
DDoS stands for distributed denial-of-service.
To explain it in a couple words, a DDoS is the same as a DoS. 
But with a DoS you are the one attack. DDoS'ing is shells around the world attacking. 

To get started: Getting the IP of a Website
To attack a website you need the IP adress. There are many ways to get them, but i'll explain a really simple one.

Go to start, typ in "CMD" and press enter.
After that typ in "ping sitenamehere.com". 
And press enter again, then you'll get the site IP.

Screen:
[Image: thisisagayfuckingscreen.png]
So now we know, the IP of hackforums is 216.245.194.194! :D


Because we can't down Hackforums.net, i'll take Lol.com as example.


Booter
You need a Booter to DDoS a site. Sorry that i need to say but i almost don't know anything about a booter. so i'll just what what i'm gonna to do.
I use the booter "Stress-Booter" its a PHP-Based booter.


What we need, is the IP of the site, the lenght of the DDoS in seconds and the port.
IP: 216.245.194.194
PORT: 80 (This is almost everything 80!)
Seconds: 200 (You can take another second to.)


I click 'boot' and wait until the boot is done.


Result:
[Image: scaled.php?server=684&filename=s...res=medium]

And you've downed a populair site! If you got any questions, just ask it!
Replaced.

♠♧♥♢ Adfly Working Bot ♦♡♣♤


What does it do?
- It automatically clicks your Adf.ly links, so that you gain money.

Features
- Comes with a current working proxy list ready to go.
- Add or remove proxies, as you like.
- There is no limit on the number of proxies you can add.
- Supports custom referrers.
- There is no limit on the number of referrers you can add.


Download Tally ERP 9 with 3.1 crack





ERP 9 - Overview
-------------------------------------------------------------------
You bank and pay utility bills from home, why not do your business accounts? Or call up a stock status report and print a copy from wherever you are? Tally.ERP 9 has been designed with you in mind. Powerful connectivity makes information available with your staff, CA and other professionals, round-the-clock, in any place. It's also quick to install and allows incremental implementation-a novel capability that lets you activate just as many of its functions when required, even across locations.

At Tally, we have a hard-earned reputation for empowering businesses with stable, effective software products and Tally.ERP 9 takes this further. Tally.ERP 9 has all the features required for high-performance business management including remote access, audit & compliance services, an integrated support centre and security management, all focused on delivering peace of mind. It is a complete product that retains its original simplicity yet offers evolved capabilities like statutory processes, payroll, excise etc. Whatever the demands, Tally.ERP 9 makes life a lot easier. With an ideal combination of function, control and customisability built in, Tally.ERP 9 permits business owners and their associates to do more.

Advantages of Tally.ERP 9:

Powerful remote capabilities that boost collaboration
Easy to find qualified personnel
Easy to customise
Low cost of ownership via quick implementation, Tally Integrator, Support Centre

---------------------------------------------------------------------
Installation Instructions
---------------------------------------------------------------------

1. Unrar
2. Install Tally ERP
3. Replace tally.exe
4. Activate License,you can use any serial , activation key & Email tally will make a tally_req.lic in your tallyerp directory.
5. Exit tally program,rename tally_req.lic to tally.lic and run
tally erp program again,tally should now be activated and ready to use.

.NET Reflector 7.3.0.18 {Full}




Reflector: 7.3.0.18
Latest version: 7.3.0.18
Released: 7/15/2011

.NET Reflector 7.3 Released, Including BAML to XAML Decompilation on July 15th, 2011

Developers use .NET Reflector to:

● Decompile .NET code to understand how it works
● Learn or teach the complexities of a .NET language
● Provide a better alternative to library documentation
Recover lost or unavailable source code
● Locate performance issues
● Analyze dependencies
● Check obfuscation
● Serve as a powerful object browser
● Aid complex debugging tasks

So, here's the download link for full (cracked) version of Reflector 7.3.0.18

Saturday, February 25, 2012

[TUT]==How to use Keyloggers – Detailed Tutorial== [hot]

1. What is a Keylogger?
A keylogger is also called a spysoftware is a small program that records each and every ...keystroke a user types on a specific computer’s keyboard. A keylogger program canb e installed or attached in computer just in a few seconds and once installed you are only a step away from getting the victim’s password.

2. How Keylogger works?
Once the keylogger is installed on a PC, it starts operating in the background (stealth mode) and captures every keystroke of the victim on that PC. Let’s take up a small example: The victim goes to http://www.gmail.com and types his “username” and the “password” in the respective fields to login. The keylogger silently records these keystrokes and stores them in the logs. These logs when opened up shows the captured “username” and “password” and will also tell you that they were typed in the gmail login page. Thus the keylogger loads upon every startup, runs in the background and captures each and every keystroke. Some keyloggers also give a screen-shot of Your computer background.

3-Types of Keyloggers.
1-Hardware Keylogger - A plug-in device or a hardware circuit can be used as keylogger tools. Either of the two can log to their internal memories all of a user’s keyboard activities.
2-Software Keylogger- The software keylogger needs to be installed on the Victims computer to work

4-Once I install the keylogger can the victim come to know about it’s presence?
No. The victim will never come to know about the presence of the keylogger on his/her computer. This is because, once installed the keylogger will run in total stealth mode. Unlike other programs it will never show up in start-menu, start-up, program files, add/remove programs and task manager. So the victim can no way identify it’s presence on his/her PC.But if the Victim is Wise he may run a system scan or he may also see the process then he rocks and you are fool

5-Can I be traced back if I install the keylogger on some other computer?

No, For a Man with no knowledge about computer and keylogger or even a man who know;s this cannot trace you back.

6- Which keylogger is the best?

Number of keyloggers are available but the best I used till now for me is Ardamax Keylogger 2.85.

***9668;***9668;~~ARDAMAX TUTORIAL~~***9658;

Download the Keylogger Here



1-After installation

2-.Now right-hand click it and click ‘Enter registration key….

3-Enter the Name and password in the box fields

4.Once done click ‘Ok’ and you should get a pop-up saying ‘Registration code is accepted. Thank you for registration!

II. Creating the Keylogger Remote file:
1. Now your going to make the Keylogger Remote file (The thing you give to your victim). Click ‘Remote Installation…’,

click ‘Next’
2.Now,you should see this.

3.If you want to bind Keylogger Remote file with another application or file click the box that says ‘Append keylogger Remote file to file or another application’ and browse file or application that you want to bind it with.. I would prefer to skip this and bind the keylogger after creating the remote file.

4. Now click ‘Additional components’ and tick ‘Installation Package Bilder’ like done in the screenshot.

5.Now you should be at ‘Invisibility’, make sure all the boxes are ticked, then click ‘Next’.

6. Now you should be at ‘Security’, click ‘Enable’ and put your password (it can be any password you like, make it something easy so you can remember). Once done, make sure all the boxes are ticked and click ‘Next’.. Or else SkIp this also

7-untik the update optiong

8. Ok, you should now be at ‘Options’, use setting like done in screenshots.You can also select it destruction date

9. Ok, now you should be at ‘Control’, click the box that says ‘Send logs every’, now make it so it sends logs every 20 minutes, then where it says ‘Delivery’, un-tick ‘Email’ and tick ‘FTP’, then where it says ‘Include’ un-tick ‘Screenshots’, now un-tick the box where it says ‘Send only if log size exceeds’, once thats done, it should all look like it does in this screenshot:

10.Now you should be at ‘FTP’, create a free account at http://www.drivehq.com/secure/FreeSignup…om=storage, then make sure your at ‘Online Storage’, then make a new folder called: Logs (this is where the logs are sent to when you keylogg someone), Now on your FTP on Ardamax Keylogger, where it says ‘FTP Host:’, put this:
http://FTP.DriveHQ.com
Now where it says ‘Remote Folder:’, put this: Logs
Now where it says ‘Userame:’ and ‘Password:’, put your DriveHQ username and password, then it should look something like this:


Now Click ‘Test’ and it should pop up like this

If not then see if the password and username is right.

Once done, do NOT change your DriveHQ password or rename/delete the folder called ‘Logs’, if you do, the logs will not come through.

11. You should now be at ‘Control’, un-tick ‘Enable Screenshots Capturing’ then click ‘Next’.

12. Now you can change name and icon your Keylogger Engine as you want it to look like.

ust click ‘Finish’.
13.After you click ‘Finish’ you should see this

Now Your Remote File Is Created

Site Search