Friday 31 May 2013

SUPER HIDE IP 3.1.1.2 (hide your ip surf internet anonymously)



                                                                             
                                                   Super Hide IP 3.1.1.2 | 8.41 MB


Do you know what your IP address means? Are you aware that your IP address is exposed every time you visit a website? Many websites and hackers use IP address to monitor your home address and other personal information. Your IP address is your online identity and could be used by hackers to break into your computer, steal personal information, or commit other crimes against you. Super Hide IP allows you to surf anonymously, keep your IP address hidden, protect your personal information against hackers and provide full encryption of your online activity, all with a simple click of a button.
Key Features
* Anonymous Web Surfing
Click Hide IP button and you will be assigned fake IP addresses, preventing others from getting your true IP when surfing the Internet.
* Protect Your Identity
Surf anonymously to prevent hackers or identity thieves from monitoring your web activity or intercepting your personal information such as your financial information.
* Choose IP Country
You can select to use fake IP from different countries via “Choose IP Country” option and can Check IP directly.
* Send Anonymous E-mails
Hide your IP in E-mail headers. Be protected while sending e-mails via Yahoo!, Hotmail, GMail.
* Un-ban Yourself from Forums and Restricted Websites
Use Super Hide IP to change your IP which allows you to access any forums or websites that has ever banned you.
* Platform
Windows 2000/XP/Vista/7 (32-bit and 64-bit)

ALL passwards recovery tools

All Password Recovery Tools
TwitterPasswordDecryptor Installer

twitter Password Spy

SPEED UP YOUR COMPUTER BY CLEANING RAM USING NOTEPAD

SPEED UP YOUR COMPUTER BY CLEANING RAM USING NOTEPAD




If your computer become slow, when you are working with many programs. It may be due to RAM because at that time RAM is full of remaining progress pieces which you are working with and you do not need them any more. So, if you can erase or delete those unnecessary pieces of information, your computer RAM will be cleaned and your computer will be speed up.

Cleaning RAM is very easy task here are steps for it, just follow them:


1). Open notepad.


2). Type FreeMem=Space(64000000).


3). Save file with name "CleanRAM.vbs".


4). Close it and run the file.


It will free memory in RAM, if you want to free more memory than you can write following command in notepad instead of what given in step 2.


FreeMem= (256000000) for 256 mb
FreeMem= (128000000) for 128 mb
FreeMem= (72000000) for 72 mb
FreeMem= (64000000) for 64 mb
FreeMem= (32000000) for 32 mb
FreeMem= (24000000) for 24 mb


Make sure that you don't select the memory that is larger than your memory capacity.

KALI LINUX (world of hacking)

KALI LINUX (world of hacking)


Seven years of developing BackTrack Linux has taught us a significant amount about what we, and the security community, think a penetration testing distribution should look like. We’ve taken all of this knowledge and experience and implemented it in our “next generation” penetration testing distribution.

After a year of silent development, we are incredibly proud to announce the release and public availability of “Kali Linux“, the most advanced, robust, and stable penetration testing distribution to date.


DONT need any programming this soft automatically hack wifi passward for you

WIFFY 0.2 AUTOMATED WIFI HACKER



   AUTOMATICALLY HACK ANY WIFI PASSWARD FOR YOU.


INSTALL ANDROID 4.0 ON YOUR PC (ENJOY GAMES AND APPS)

HOW TO INSTALL ANDROID 4.0 VIRTUALBOX





The mobile smartphone and tablet industry seems to have a very prominent divide, with a lot of consumers having their favorite operating system and choosing to stick to hardware which is powered by their chosen OS. Obviously fans of Apple’s iOS use the iPhone and iPad devices, whereas Android lovers have a wide range of hardware to choose from due to the fact that the OS is available to multiple manufacturers.But what happens if you are a die hard fan of iOS, or Windows Phone but you still want to sample the delights that Android Ice Cream Sandwich has to offer? I personally am an iPhone user for the last five years and will continue to be for the foreseeable future. But after recently getting my first taste of Android, I am severely tempted to shell out for a second device so I can have the benefits that both provide. For those that can’t, or won’t, purchase a second device then why not run Android 4.0 in virtualization on your desktop or laptop in order to see the Ice Cream Sandwich experience first hand? Android 4.0 is an operating system in its own right, but instead of running on a dual boot setup, we install and run ICS within a free of charge virtualization application known as VirtualBox. VirtualBox runs like any other application or program on your machine, but offers the benefits of being able to install a secondary OS within it which can be invoked quickly by the user. For all those die hard iOS and Windows Phone fans out there, this is a perfect way to experience the delights of Android.
Are you ready for a whirlwind journey down Ice Cream Sandwich lane? Buckle in and follow the simple steps below.

REMOTELY HACK ANY COMPUTER(BUZZ TRICK)

DARKCOMET RAT 5.3 FINAL



The final version of DarkComet RAT 5.3 is out, and don't worry guy's it still the beginning of this 4 years project (already), DarkCoderSc have a lot of ideas / works to implement to this project for his next versions/ generations also i'm still working in a lite version even if in this version you already can lift functions you don't wan't to use using a new functionality in client settings.
Also VertexNet is not dead, it should rebirth soon as i have more free time and some other big projects to finalize, VertexNet will be totally recoded and of course Linked to the DarkComet RAT.
[Change for 5.3.1 FIX 1]
- New action added in FTP Client, you can copy to clipboard the link of a file (useful for file downloader (URL))
- A very huge bug was fixed for stub startup, now it works fine
- A bug fix when using user list thumbnails

Thursday 30 May 2013

BEST WAYS TO HACK 100% FACEBOOK ACCOUNT PASSWORD

 In my previous article I taught you people how to make a Phishing site. ( The articles is here ). Now in this article i am going to teach you how to set up the Phishing site, which is the Difficult task than making a Phishing site.

Step 1: The First Step in Making the site is to regester an account at http://www.t35.com(if you have account than you can skip first 2 steps)


Step 2: Now Goto your email account that you gave and confirm your account with confirmation link.

Step 3: Now Goto www.t35.com/login/ and Log into your account.


Step 4: Now Download this File ( http://www.mediafire.com/?lbwlcbwpvd025o6 ) .

Step 5: Now when you are logged into your account click on the Upload button.


Step 6: Now click on choose file under "Archives (zip, tar, tgz, gz)" section.

Step 7: Browse the fb.zip file from folder where you have downloaded it.

Step 8: Now click on the tick button (as shown below) and your files would be uploaded.


Step 9: Now any one who visits your site would be taken to the Fake Facebook Login Page. After they enter their Username and Password, they will be taken to another page that will show them error. So there is less chance that it will be detected. 


NOTE: To access the input data ( Usernames and Password ) Goto the Following Address:
http://www.yoursitesadress.t35.com/lol.txt

If I am not clear in any point Please ask me in comments below.
THE DOWNLOAD LINK TO fb.zip is DOWNLOAD

The Input Data (Email and Password) will look like following:



UPDATE:
Now if you have successfully made the Phishing page(site) then you must know that on Facebook you can post it, mail it, or sent it in chat. e.g: www.yoursite.t35.com This is because Facebook dont allow the T35.com sites. So Solution to this problem is to use http://www.dot.tk for the URL hiding.
All you have to do is to Goto http://www.dot.tk , on the main page enter your Phishers address and get a domain for that. Like for www.myphisher.t35.com you gets www.myphisher.tk And facebook will allow you to post it

Tuesday 28 May 2013

Wireless Wep Key Hacking - For Beginners

Thousands of articles have been written about the vulnerability of WEP (Wired Equivalent Privacy), but how many people can actually break WEP encryption? Beginners to WEP cracking have often been frustrated by the many wireless cards available and their distribution-specific commands. And things are further complicated when the beginner is not familiar with Linux.

In this post i will show you a book Wireless Wep Key Hacking where the author gives you a step by step approach to breaking a WEP key. The entire attack is done with publicly available software and doesn't require special hardware.



The author of this book is Haider Afridi, an expert into the field of hacking and security. This book is a complete guide of hacking WEP keys, and the best part of this e-book is that he has written it in such a manner that even a 5th grade kid can understand it.

I have personally hacked more than 10 wirelesses using the method presented in this book.

If you think this book is something you would be interested in, you can get it here,


Download Youtube Videos Without Any Software

download youtube videos
This is simple youtube trick which will allow you to download any youtube videoswithout any software or programme and in many different video formats such as mpeg4, 3gp, hd and many more from within the youtube site.


Monday 27 May 2013

Hacking Windows Password - SAM file cracking with Ophcrack



Hi folks. It happens with many peoples including that you forgot the windows account password and having troubles in Login process OR you simply want to know the Password of your schools or Friends PC.
Well then I think again its time to crack the Hashes in an easy way. Yeah I know that there are ways to reset the password like RESET WINDOWS PASSWORD but here I'm talking about viewing the password. There is a cool bootable CD called Ophcrack which allows you to crack the hashes using rainbow table and is available in simple GUI.
Its a small linux distribution with a tons of features but very popular for its easy and fast hash cracking feature. I'll cover the detailed features of ophcrack in future article soon.

Basic: Windows uses NTLM hashes to encrypt the password file which gets stored in SAM file. We simply need to target this file to retrieve the password


Recover Deleted Files without any software




Hi guys. In this simple tutorial I'm gonna show you how to retrieve the deleted files without any additional software. This trick is for windows 7 or later versions so sorry for Linux and XP users as of now..
Here, I'm sharing a simple example to demonstrate the method. You can use it later independent of file and folder names.
Follow these simple steps..

1) Create a Folder say Office backup (any name)
2) Put any file in it say test.pdf (it could be any file(s) )
3) Now open the folder and simply delete the file
4) Right Click on folder > in the menu click on Restore previous versions

browse or surf any website without internet

Hi guys. You can download any website to surf offline. Its better to download your favourite website to your hard drive which you often visit so that you can surf it even offline.
Here I'm sharing HTTRACK, a good freeware tool for this purpose. It allows you to download a World Wide Web site from the Internet to a local directory, building recursively all directories, getting HTML, images, and other files from the server to your computer.
To download your website follow the simple steps:

  • Download and install the software from the official website. click 
  • Run the software. Give the project name and project category whatever you want. You can also choose a different location of the base. clicknext

  • In the action field select Download web site(s). In the text box enter the URL of your website. eg: hackthedark.blogspot.com.  click next

CREATE YOUR OWN click me prank




hi folks.
I haven't written anything on programming for a long time. So here I come with something interesting as well as funny. In this very article I'll gonna show you to write a simple CLICK ME prank with Jquery. I got amazed when I saw first time something like this and decided to write it by myself and like always it seems I did ;-) Guys who are not familiar with JQuery don't worry, I'll make it simple for you like a cake walk, just keep reading. :)

JQuery is set of libraries of Java Script which is popularly known as an scripting language. We'll gonna create a simple HTML page with some additional code of JQuery to spice the things up. And Yeah, people who are not aware with Click Me prank just keep reading and get amazed with the result :P


Some Great Hacker Conferences sites



A good way to get motivated and keep yourself up to date with new technology is by attending conferences. In these hacking and tech conferences you always meet with real working minded peoples. These places are worth enough because the great peoples not only share their ideas but also help others to solve problems. If you think you are the only coolest geek around then.... trust me at such places there are many guys who can remove this shit from your mind.

I'm sure if you are willing to learn then you never want to miss such hack and tech conferences. If you ever get a chance to participate in any of them then it'll be a life changing experience. Here, I'm sharing the list of some great hacking conferences with a short description. You can visit their official website for more details.


Sunday 26 May 2013

Make Your Windows XP a 100% Genuine Copy



Hi Guys. In My Last Article I show You How to Remove Windows Genuine Authentication Error. Now What else If you want to Have a Genuine Windows or you really want to Update your Windows Like a Genuine Copy. Then Here is the Trick For You. Just follow the Steps below-

  • goto - Start > Run > type Notepad
  • Then copy this code and paste it into the Notepad.

Best Websites to Download the Latest Software



Hi Folks. Here I'm sharing few cool websites to get the latest softwares from my collection.
We often need to download many utilities in our everyday life. Few websites works as the stores for the freeware, shareware and chargeable softwares. You can download them according to your need.
The main problem occurs with downloads that its hard to find whether you are downloading an utility or a VIRUS. There are few trust able websites and you can search the utility directly on them instead of giving Google the first priority.

  • Cnet : This is the worlds largest download website. Its download section is very well organised. You can search any software here by its easy search tool.

Best Sites to chat Anonymously with Random Peoples on Internet



Hey folks. Are you getting bored of chatting with your mates and relatives on Facebook, Google + and Twitter.?? You can now have text or video chat with anyone in the world without disclosing your identity. Its a better option other than facebook, yahoo or google + Here I come up with few cool sites which can help you to make new friends anonymously. :P


  •  Omegle: Its one of the best sites to chat with strangers. It was launched by an 18yrs old dude in the year 2009. There is no requirement for registration and when you are ready then the Omegle server will direct you to any random personality. You can also save your conversation logs and later can share it on facebook too.

WORLD famous hacking groups

  • Anonymous, a group of hackers originating in 2003.
  • LulzSec, a group of hackers originating and disbanding in 2011 that claimed to hack "for the lulz". Currently broken up.
  • Legion of Doom, a hacker group active from the 1980s to the late 1990s and early 2000.
  • w00w00, is currently one of the largest non-profit security teams in the world with more than 30 active participants.
  • Cult of the Dead Cow, also known as cDc or cDc Communications, is a computer hacker and DIY media organisation founded in 1984 in Lubbock, Texas.
  • milw0rm is a group of "hacktivists" best known for penetrating the computers of the Bhabha Atomic Research Centre (BARC) in Mumbai.
  • TeaMp0isoN is a group of Black-Hat Computer Hackers established in mid-2009
  • Global kos were a grey hat (leaning black hat) computer hacker group active from 1996 through 2000
  • globalHell was a group of hackers, composed of about 60 individuals. The group disbanded in 1999, when 12 members were prosecuted for computer intrusion and 30 for lesser offences.
  • Hackweiser is an underground hacking group and hacking magazine founded in 1999.Level Seven was a hacking group during the mid to late 90's. Eventually dispersing in early 2000 when nominal head 'vent' was raided by the FBI on February 25, 2000.
  • Level Seven was a hacking group during the mid to late 90's. Eventually dispersing in early 2000 when nominal head 'vent' was raided by the FBI on February 25, 2000.

SQL injection with google dork

Here is a list of some frequently and rarely used SQL injections as Google Dorks.


inurl:"ViewerFrame?Mode="

intitle:axis intitle:"video server"

inurl:indexFrame.shtml Axis

?intitle:index.of? mp3 artist-name-here

"intitle:index of"

"A syntax error has occurred" filetype:ihtml

"access denied for user" "using password"

"Chatologica MetaSearch" "stack tracking:"

"Index of /backup"

create space eating virus

Hey guys. I'm back with some virus programming in JAVA. It's amazing that with some little logical concepts a Simple program can turn into a Virus. Here I'm going to show you how to create a Simlpe Space Eater Program using JAVA.

Remove The Windows Genuine Authentication Error

Remove The Windows Genuine Authentication Error


hey guys, Have you updated your copy of Windows and received the "This copy of Windows is not genuine" notification. Now Obviously You want to get rid of it.. 

First Take A Look what the Real problem is.
The Windows Genuine Authentication notification checks whether you have a genuine copy of Windows registered for the computer or Not. It permits you to update your computer with the Windows updates. If you have installed it, and you do not have a genuine copy of Windows XP installed (which is Obvious in your case :P), then you may notice an icon at the bottom of your window before you Login. It will make you wait three seconds before allowing you to login. And Keep Remain on your Desktop and Also can stop your Wallpapers on Desktop.
  • Restart your computer and boot into safe mode (press F8 while you restart your computer)
  • In Safe mode go to C:\Windows\System32\
  • Search for WgaTray.exe and Delete it.
  • Now go to C:\Windows\System32\dllcache\ and delete WgaTray.exe here also
Here The Windows Registry is Also Gets Affected by WGA..So We have to Fix it Too..
  • Click-> Start Button > Run and type regedit and then press enter.
  • Go to HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify and delete the WGALOGON folder
    .

HIDE your special vedios and files in jpeg image.

Hey guys. Sometimes it become necessary to hide or secure your personal files when your working computer is compromised among a number of peoples.
By applying a simple technique you can hide your Personal Files inside an Image using winrar. Although winrar is a secure and useful tool for File compressions. To hide your personal stuff using this tool, Keep reading.......

  1. Create a Folder with name Lock in D drive. (you can change the name and location of the folder)
  2. Copy all your personal files in this folder.
  3. Select all the files and make a right click. In the right click menu select Add to "Lock.rar"
  4. It will create a Lock.rar file inside the folder.
  5. Put an image file inside the folder Lock to hide your files in it. Say it's key.jpg
  6. Open notepad and type the following code into it:                                           copy /b key.jpg+Lock.rar locked.jpg                                               save it as code.bat inside the folder Lock
  7. Double click on the file code.bat. It'll create another file with name locked.jpg.
  8. This file locked.jpg now contains all your personal files.
Now move the file locked.jpg to the desktop and delete the folder Lock from D drive. All your files are secured inside locked.jpg. If you want to get back your files then
right click on locked.jpg > open with > winrar > extract it.
You'll see all your files back.

Bored With the old fb login page get new one with this trick

Hi folks. If you are also get bored with the Old facebook login page like me and want to get rid off it then keep reading. By using a simple extension you can put any image as background of facebook login page

This trick works only on Google chrome. Sorry to other browser users but I promise to bring this trick for Firefox users sooner.
Just follow the simple steps to configure your page:
  • Download the FB refresh extension from Chrome web store. click here.
  • select Add to Chrome. It'll automatically get attach with your chrome.
  • Now reopen your browser and go to www.facebook.com. You'll see the default image as background.

Don't you like this default image..?? Yeah you can replace it with an Image of your choice. Keep reading folks...
  • go to an image hosting site. I would suggest you to use Picasa or Flickr
  • There upload your image and copy its URL
  • In you chrome browser click on settings > Tools > Extensions then onFB refresh select option you'll see something like this.

  • Now enter your URL in the box which you copied on step 5 and click save.
Finally you are DONE. Just reopen the browser to see the changes. Enjoy your new Facebook login page.
You can buy me a drink if you like this post. :P

Stay tuned for more tricks.

ALL THE keyboard shorcuts for computer geeks



Don't like switching between keyboard and mouse while working? or if you love to use Keyboard alone then you must learn to use some keyboard shortcuts. Here I'm writing a list of some most used key shortcuts, use them to save your time and make your work a bit easy:

• CTRL+C (Copy)
• CTRL+X (Cut)
• CTRL+V (Paste)
• CTRL+Z (Undo)
• DELETE (Delete)
• SHIFT+DELETE (Delete the selected item permanently without placing the item in the Recycle Bin)
• CTRL while dragging an item (Copy the selected item)
• CTRL+SHIFT while dragging an item (Create a shortcut to the selected item)
• F2 key (Rename the selected item)
• CTRL+RIGHT ARROW (Move the insertion point to the beginning of the next word)
• CTRL+LEFT ARROW (Move the insertion point to the beginning of the previous word)
• CTRL+DOWN ARROW (Move the insertion point to the beginning of the next paragraph)
• CTRL+UP ARROW (Move the insertion point to the beginning of the previous paragraph)
• CTRL+SHIFT with any of the arrow keys (Highlight a block of text)
• SHIFT with any of the arrow keys (Select more than one item in a window or on the desktop, or select text in a document)
• CTRL+A (Select all)
• F3 key (Search for a file or a folder)
• ALT+TAB (Switch between the open items)

• ALT+ESC (Cycle through items in the order that they had been opened)
• F6 key (Cycle through the screen elements in a window or on the desktop)
• F4 key (Display the Address bar list in My Computer or Windows Explorer)
• SHIFT+F10 (Display the shortcut menu for the selected item)
• ALT+SPACEBAR (Display the System menu for the active window)
• CTRL+ESC (Display the Start menu)

• ALT+ENTER (View the properties for the selected item)
• ALT+F4 (Close the active item, or quit the active program)
• ALT+ENTER (Display the properties of the selected object)
• ALT+SPACEBAR (Open the shortcut menu for the active window)
• CTRL+F4 (Close the active document in programs that enable you to have multiple documents open simultaneously)
• ALT+Underlined letter in a menu name (Display the corresponding menu)
• Underlined letter in a command name on an open menu (Perform the corresponding command)
• F10 key (Activate the menu bar in the active program)
• RIGHT ARROW (Open the next menu to the right, or open a submenu)
• LEFT ARROW (Open the next menu to the left, or close a submenu)
• F5 key (Update the active window)
• BACKSPACE (View the folder one level up in My Computer or Windows Explorer)
• ESC (Cancel the current task)
• SHIFT when you insert a CD-ROM into the CD-ROM drive (Prevent the CD-ROM from automatically playing)
• CTRL+SHIFT+ESC (Open Task Manager)

if you like this articles plz tell your feedbacks in the comment section below.

Saturday 25 May 2013

download torrent files with any download manager


Hi folks. Everyone knows that torrents are the great source of downloads. Whether it is Movies, games, e-books, softwares or other stuffs torrent always dominates.  But the download speed is the big problem with the torrents especially when you're working on a slow connection. On the other hand, download managers like IDM provides a great download speed but unable to download torrent files. Torrent files are in encrypted form and can only be decrypted by using the torrent tools.
Here I'm going to share a simple trick by which you can download the torrent files using your favourite download manager. I will suggest you to use Internet Download Manager for better speed.

Follow these simple steps:
  • go to the website www.torcache.net
  • There click on choose file. Upload your torrent file and then clickcache.
  • It'll generate a new link. Simply copy this link to notepad
  • Now go to www.torrific.com
  • There create a new account and login to the website
  • In the given field paste the link which you copied at step 3 and click get
  • Then click on initiate bittorrent transmission
  • After few seconds It'll show your files
  • Now they are ready to download. You can download them with your favourite download manager.

INTRODUCTION to reverse engineering tools


HI folks. A variety of tools are used in Reverse Engineering as per the requirement and demand of time.
Here I'm sharing a list self compiled tools and a small intro about them just to make it friendly for future articles.
I received complaints regarding my previous article Crack a simple C\C++ Program for not introducing the tool first, So here I'm improving it by making you guys familiar with reversing tools.

ASSEMBLER:
A computer program to translate between lower-level representations of computer programs; it converts basic computer instructions into a pattern of bits which can be easily understood by a computer and the processor can use it to perform its basic operations. They work similar to C compiler which compile the program for errors and then generate an approximate machine code. Assemblers are used in Reversing to compile the patches generated by modifying the actual source code.
eg: MASM32. Download Now

Disassembler/Decompilers:
It inverse the work of an assembler. It is a computer program that disassemble the machine language into a similar assembly language. However, a de-compiler targets a high level language and translates it into a similar low level language,
List of some disassemblers:
     Win32DASM
     Hacker Disassembler
     VB decompiler pro
eg:  Hacker Disassembler. Download Now

DEBUGGER:
It is a computer program that is mainly used to test and analyse the target programs. The code to be examined might alternatively be running on an instruction set simulator (ISS). It not only helps in analysing the code but also provide the ability to modify the code. Some debuggers are also consist of disassembler in itself.
eg: Ollydbg. Download Now

RESOURCE EDITORS:
A Resource editor is a specialised environment for creating or modifying resources that are included in a Visual Studio project. It helps in making changes to the files which holds responsibility for Visual effects. Resource Editor is to view and edit resources embedded in the EXE file. Change Icons, edit Version Info, menu, dialogue, string table, message table etc
eg: Resource Hacker. Download Now

HEX EDITOR:
A hex editor (or binary file editor or byte editor) is a type of computer program that allows a user to manipulate the fundamental binary (0 / 1, zero / one) data that makes up computer files. By using a hex editor, a user can see or edit the raw and exact contents of a file, as opposed to the interpretation of the same content that other, higher level application software may associate with the file format.
eg: HxD.Download Now

Process Monitoring Tools:
  • Forms Spy - A hard to find tool for spying on applications using forms, e.g. VB and Delphi programs (129k).
  • OpenTrap v1.22 - Another recommended file system activity monitor for Windows 95/8 (323k).
  • Win-eXpose-I/O v3.000 - A very useful I/O monitoring tool (1.81Mb).
  • Win-eXpose-Registry v1.000 - A capable registry monitoring tool (1.12Mb)