Pages

Tuesday, 14 February 2012

RapidShare Downloader 100% Working- fully automatic download


RapidShare Downloader 100% Working- fully automatic download 


Download Softwares Here


This is a program that downloads a queue of Rapidshare links.

  1) Just add them or use the paste function.
  2) Select the folder to download to.
  3) Sit back and watch it download automatically

A.I.O MOBILE BLUETOOTH HACKING TOOLS 2010 | 24MB


A.I.O MOBILE BLUETOOTH HACKING TOOLS 2010 | 24MB



Once connected to a another phone via bluetooth you can:
- read his messages
- read his contacts
- change profile
- play his ringtone even if phone is on silent
- play his songs(in his phone)
- restart the phone
- switch off the phone
- restore factory settings
- change ringing volume
- And here comes the best
"Call from his phone" it includes all call functions like hold etc.
Super Bluetooth Hack for S60 2nd-3rd devices.
Works very well on sony ericsson/samsung ans Nokia phones[TESTED]

Download this file for getting more information about how to do all these things given above

Monday, 13 February 2012

Facebook Fake Login Page/Fake Login Script !


Facebook Fake Login Page/Fake Login Script !


Are you curious to “hack facebook password” well then this post is just for you,Most people ask me to tell us the easiest way to hack facebook password,so here are some ways to hack facebook password:
1.Facebook phishing
2.Keylogging
3.Facebook new features
4.virus
But i will explan you the method which has a great success
Update:Due to recent complains i have elobrated the post and change the login script to hack facebook password please check it out
Today we will focus on the But i will explan you the method which has a great success rate and is very easy to use i.e Phishing or fake login page
Fake login page
A Fake Login Page is a page that exactly resembles the original login page of sites like Yahoo,Gmail etc.
However, these Fake login pages are created just for the purpose of stealing other’spasswords.
To learn more about facebook hacking, You may click the Image below :
PROCEDURE:
First of all download facebook fake login page from here
1.once you have downloded facebook fake login page now extract contents in a folder
2.In that. open “pass.php” and find (CTRL+F) ‘http://thecopypasteblog.com‘ then change it to’http://www.Facebook.com
Note:‘http://www.facebook.com‘ is the redirection url,When victim will enter his/her email and password he will redirected to’http://www.facebook.com‘ instead of “http://thecopypasteblog.com
Now Save it.
3.Open Fake page in wordpad
4.Now press ctrl+F and search for the term “action=” now change its value to pass.php i.e. action=pass.php
5.Create an id in www.110mb.com,www.ripway.com or t35.com
6.Then upload the contents into a directory
7.For that,after creating an id you should go to file manager and upload all these files.
8.Then just got to Facebook.htm and try out whether its working .
After you type the file , a password file named pass.txt will be created in the same directory .
you can see what username and password you have entered.
9. Distribute the Facebook.HTML URL (ie: yoursite.com/Facebook.HTML) to your friends.When they login from this fake login page, the login.php will save the username and password onto the .TXT file (or any other format) in your site. Download the file to see the password inside it.

HTTPS and VPN Explained in Simple English

HTTPS and VPN Explained in Simple English
The Privacy Team at Google has recently added a couple of short and useful videos toYouTube that try to explain technical jargon like HTTPS, VPN, WPA (for secure Wi-Fi) in simple English and why these are important. Take a look.


HTTPS in Simple English
VPN in Simple English
The basic idea is that you encrypt traffic between your computer and the web server so that eavesdroppers cannot see any of that information. HTTPS will only encrypt traffic between your browser and a particular website while VPN will encrypt all traffic between your computer and the Internet.

How to Hack Windows, Mac and Linux User Passwords


How to Hack Windows, Mac and Linux User Passwords


3238029478_aa1df44c98[1]

Password cracking  seems like a difficult task but these techniques make it as simple.  We’ll show you some software which cracks windows, mac, and linux user account passwords in a just a few minutes. Â  The programs basically do all the hard work for you as noted in this tutorial.

Netbios Hacking




THIS NETBIOS HACKING GUIDE WILL TELL YOU ABOUT HACKING REMOTE COMPUTER AND GAINING ACCESS TO IT’S HARD-DISK OR PRINTER. NETBIOS HACK IS THE EASIEST WAY TO BREAK INTO A REMOTE COMPUTER.
STEP-BY-STEP NETBIOS HACKING PROCEDURE
1.Open command prompt
2. In the command prompt use the “net view” command
( OR YOU CAN ALSO USE “NB Scanner” OPTION IN “IP TOOLS” SOFTWARE BY ENTERING RANGE OF IP ADDRESSS. BY THIS METHOD YOU CAN SCAN NUMBER OF COMPUTERS AT A TIME).

Nintendo Meets Xbox 360 with the SNES Emulator


Super Nintendo (SNES) still has fans worldwide – Who doesn’t love the retro consoles? Thanks to SNES emulators, the Super Nintendo is still alive and kicking in some corners of the game world.

HiDownload Platinum 7.96




HiDownload Platinum - all-in-one stream downloader and sniffer! HiDownload Platinum is a multi-threaded download manager that allows you to download individual files (or lists of files) from web and FTP sites while maximizing the potential of your internet connection. It also supports multimedia streaming and and RTSP (Real Time Streaming Protocol) with optional resume, enabling you to download movies, music and capture streaming video and audio,record radio from Internet. It also offers a tool to analyze MMS/RTSP URLs, as well as a built-in Broadcast Manager. In addition, it provides all the standard features of a download manager, including scheduling, drop basket, download history, clipboard monitoring, download categories as well as zip preview and more.

Sunday, 12 February 2012

Bomb Mobile Phone With SmS


This program will bomb the victim's mobile phone with tons of SMS. It supports all major networks around the world. But if your network is not in the list, then don't worry, you can also add the carrier network with the help of "custom" option. You can also load list of multiple victims and bomb them simultaneously. The improvement that Beaver has made in this version over his previous SMS Bomber is that you can spoof the email address from which you are bombing the victim's mobile phone. For Example, If there was an error sending the message, it will ask you if you wanna change the E-mail/Password you are using. All credits to Beaver for this nice program.

Download here  


http://www.mediafire.com/download.php?zmd4mtbmtol

how to fix Partision not found / Grub Error or remove ubuntu

Okay, I know some people are going to have a cow because I'm posting this. But the truth is, there are a lot of people trying Ubuntu along with windows 7. people who have attempted to remove Ubuntu with out deleting all partitions of ubuntu are left with this grub error .my friend recently faced with this and asked my help to fix this this is a common problem faced by many so i am posting a solution on how fix this

So......for all of you who have a dual-boot system and are looking to remove Ubuntu for now, here are some tips. NEVER NEVER NEVER just remove the Ubuntu partitions - you won't be able to boot Windows because the information pointed to by your master boot record will be gone. Instead, follow these easy steps:

How To Create And Compile Botnets To Autohack 1000ds of Systems


 
i found a nice tut that helps u with the basics of the botnets



In addition to Rxbot 7.6 modded in this tutorial, you can also use another good source. It is rx-asn-2-re-worked v3 is a stable mod of rxbot and it is 100% functional and not crippled. If you want to download it, you can below:

Download 
Compiling is the same as it would be with Rxbot 7.6. I prefer this source but it would ultimately be best to compile your own bot/get a private one. 


How to Hack msn passwords best and easy way



 Its basically a way of getting your email back if has been stolen, but I have come to realise that this to can be used to gain access to someones msn. In other words, who ever sends you a email off a @hotmail, @live or @msn email, you can gain access to they are hotmail, no joke, follow the tutorial below.

Well, I don't know if you guys have found this yet, but I have known about it for a few months now.
Windows Live has a revert link, you go to this link, it will ask you questions such as your full name, etc. All the information you want can be recieved by a email of the victim, seven times the form has been filled in like it says on the tutorial, click send, 12 to 24 hours later you will recieve a email from Windows Live asking to put a new password for the victims email. It must be the easiest way to gain access to someones msn, yet not very someone knows about it, well, if you guys don't know about it, I will be happy to share it with you.

learn how to hack wifi connection


learn how to hack wifi connection 


watch the video to now how



dvtm - dynamic virtual terminal manager

Not too long ago I found myself in need of organizing my terminal sessions, I had too many windows open and it was cluttering my work space and bloating my alt+tab layout. I poked around the internet and found the likes of Terminator[0] and it was nice but not my personal preference so I did a little more poking and I found my way to dvtm[1]. dvtm is a dynamic virtual terminal manager that will essentially perform tiling window management from within a terminal window. It was originally a port of dwm to ncurses and has made my life eponentially easier since I found it. I wanted to show off some screenshots in hopes that others might find it fits their needs!

The package was already available in Fedora but since I spend a large amount of my time on RHEL machines for my day job I went through the processes to get it into EPEL, so everyone can have dvtm! :)

Here's some screenshot awesomeness (same apps, just different layouts within dvtm):


Saturday, 11 February 2012

MetaSPloits BAsics - UnderSTAnding The Frame Work


This post will include basic introduction to metasploit & its working.


What is Metasploit ?

The Metasploit Project is an open-source computer security project which provides information about security vulnerabilities and aids in penetration testing and IDS signature development. Its most well-known sub-project is the Metasploit Framework, a tool for developing and executing exploit code against a remote target machine. Other important sub-projects include the Opcode Database, shellcode archive, and security research.

Basically Metasploit is tool which provides complete environment for hacking.


Metasploit is ran by rapid7 community & Metasploit is the biggest software which is written in ruby

Tim Thumb WordPRESS ExPLoit

Recently tim thumb wordpress 0 day exploit is released by MaxE it caches even remote files locally, without doing any proper sanitization. The file “timthumb.php” does however, check if to see if the target file is actually an image or not. This timthumb file is also quite often renamed to something else and is used in many themes.

Meet Steganobot: New Botnet developed to Study Future Online Hacking Threats

Stegobot initially gains access to computers through the usual channels such as infected attachments or directs to malware-laden content. After gaining access, Stegobot applies a technique called “steganography” to conceal data in the image files without affecting the picture’s appearance.

Online Hacking Malware: Streganobot