HACK PACK 33 HACKING TOOLS PACK
1-ACT Anti Phishing 2006
Crack search engine 1
DLLs Essential Tools AIO (pass: When-You-Say)
Gabri3l
hack attack ebook
Hacking cat1Q
Hacking section
Hacking tutorials
How Stuff Works (pass: samonvn)
ISO AIO (pass: O__iapS525uyOOOLK2*/Z)
Loads of cracks & serials
PHP5 For Dummies-RiPPED
ping 1 7 5
Ports Utilities AIO (pass: PU_PACHINO)
TMDozen (pass: TMDAIO-TPachino)
Tons of keygens
Unhackme.v3.0.3, Rootkits remover
WingateTest
WTF.TK.2006 (pass: no_more_gates)
XP hack
===
1-ACT AntiPhishing 2006
Protects you against Internet criminals (phishers) sending spoofed' e-mails to lead consumers to counterfeit websites designed to trick recipients into divulging financial data such as credit card numbers, account usernames, passwords and social security numbers.
1-ACT Antiphishing 2006 is ID theft protector, a solution for phishing and email fraud.Phishers will try to trick you into giving out your credit card or the login information for your bank's website or other things you don't want to give out to scammers! Then they will use that information to steal from your accounts, make purchases using your information, or even identity theft.
protects you from these scams
===
DLLs Essential Utilities AIO
Includes:
01 DLL to Lib 1.42 - Convert DLL file into its equivalent static library
02 DLL Toys International Edition 2004 R3 - find unused DLLs to delete, view dependencies of executables, and view running processes and modules
03 DLL Spy v1.6 - searches your drives for Dynamic Link Libraries (DLLs) and makes a catalog of them
04 DLL Show 2000 v5.5 - displays a list of all running processes and their DLL dependencies
05 DLL Killer 5.0.1.5 - locate and delete redundant DLL files
06 AnalogX DLL Archive v1.00 - searches through all the files on your system and lets you know if any of them contain references to the DLL\'s in question
07 BFC Crypter DLL v1.3 - password-protection to all types of encryption
08 Find missing DLLs - Link to a useful site for downloading .dll files
Bonus:
eBook: Flash Web Design The Art of Motion Graphics By: Hillman Curtis
===
Gabri31 - Some tutorials
Beginner Tutorial: Serial fishing
Beginner Tutorial: Internal Keygen and Patching
Beginner Tutorial: Unpacking and Patching
Beginner tutorial #4: unpacking and patching, a more complex case v.1.1
Beginner Tutorial: Inline Patching
Packers theory v1.1
Cracking Lost Marble's Moho v5.1 using Memory BP's
Breakpoints Theory v1.2
Defeating Magic Byte Protection
===
- Hacking cat1Q:
Network Security Tools (OReilly- Apr 2005).chm
PC Hacks(Oct 2004).chm
PDF Hack(Aug 2004).chm
Practical Study Remote Access (Cisco-December 22, 2003).chm
Spidering Hacks(O'Reilly- October 2003).chm
Steal This Computer Book 3 What They Won't Tell You About the Internet(No Starch Press _ 2003 ).chm
Web Hacking- Attacks and Defence (Pearson Education-August 08, 2002).chm
Windows Server Hack(O'Reilly - March 2004).chm
- Hacking catQ:
Amazon Hacks - (O'reilly-August 2003).chm
Ethical Hacking and Countermeasures EC Council Exam 312 50 (OSB- 2004).chm
Hack IT Security Through Penetration Testing (Addison Wesley-2002).chm
Hacker Disassembling Uncovered (A List- 2003).chm
Hackers Delight( Addison Wesley- 2003 ).chm
Hacking-The Art of Exploitation(No Starch-2003).chm
Malware - Fighting Malicious Code (Prentice Hall-November 21 2003).chm
Maximum Security, 3rd Edition(Sams-April 2001).chm
Maximum Security_-A Hackers Guide to Protect Your Internet .chm
- Hacking Mixed
Hacks all files
A Buffer Overflow Study - Attacks and Defenses (2002)
Computer Vulnerability(March 9 2000)
Crackproof Your Software(No Starch-2002)
Credit Card Visa Hack(Cambridge Lab-2003)
Google Hacking for Penetration Tester (Syngress-2005)
Hacker's Desk Reference
Hackers Beware (NewRiders -2002)
Hacking Exposed- Network Security Secrets and Solutions (MCGraw-Hill-2001)
Hacking Exposed- Web Applications (MCGraw-Hill-2002)
Hacking Exposed- Windows 2003 Chapter 5
Hacking for Dummies (John Wiley-2004)
Hacking for Dummies-Access to Other Peoples Systems Made Simple
Hacking Guide v3.1[www.netz.ru]
How Thieves Targeted eBay Users but Got Stopped Instead(Interhack-June 2003)
Reversing Secrets of Reverse Engineering (Apr 2005)
Secrets To Winning Cash Via Online Poker
Stealing the Network; How to Own the Box ( Syngress-2003)
The Art of Deception by Kevin Mitnick
The Art of Intrusion-The Real Stories Behind the Exploits of Hackers Intruders and Deceivers (Wiley- Feb 2005)
The Extreme Searchers Internet Handbook A Guide for the Serious Searcher (Feb 2004)
Tricks of the Internet Gurus (April 1999)
Underground Hacking Madness & Obsession on the Electronic Frontier (Suelette Dreyfus & Julian Assange-2001)
===
Hacking section:
FXP Basics
Pub Scanning
Remote Scanning
Win Proxy Scanning
exploits
msinet
schemes
Selector
spam_pi
TagCheck
WinGet2k1
====
New Hacking Ebooks:
A Basic UNIX Overview
A BEGINNERS GUIDE TO Hacking Unix
A Novice's Guide to Hacking 2004
A Novice's Guide To Hacking
A Short HACKER SPEAK Glossary
A simple TCP spoofing attack
Accessing the bindery files directly
An Architectural Overview of UNIX Network Security
Anonymity complete GUIDE
ANONYMOUS emails
Anonymous FTP FAQ
ANSIBombs II Tips And Techniques
attacks on networks how to stop
Backdoor
Backdoors
BBS CRASHING TECHNIQUES
Bust Avoidance For Dipshits
Firewall Protection how to
Guide to Hacking with sub7
hacking and phreaking
Hacking for Dummies Volume 2
Hacking For Newbies
hacking in telnet ftp
hacking on Telnet explained
hacking password protected site
Hacking Password Protected Website's
hacking passwords
How to learn to hack in easy steps
How to use the Web to look up information on hacking
IP how to
NetBios explained
Proxy how to
Routing Basics
telnet trick port 25
Yahoo Chat Commands how to
===
How Stuff Works - ebooks:
How 3D Glasses Works
How ASPs Work
How Banner Ads Work
How Bits and Bytes Work
How Cable Modems Work
How Caching Works
How CD Burners Work
How CDs Work
How CGI Scripting Works
How Computer Keyboards Work
How Computer Memory Works
How Computer Mice Work
How Computer Monitors Work
How Computer Viruses Work
How Domain Name Servers Work
How DSL Works
How Encryption Works
How Ethernet Works
How Facial Recognition Systems Work
How File Compression Works
How File Sharing Works
How Fingerprint Scanners Work
How Flash Memory Works
How Floppy Disk Drives Work
How Hard Disks Work
How IDE Controllers Work
How Inkjet Printers Work
How Internet Cookies Work
How Internet Infrastructure Works
How Internet Search Engines Work
How IP Telephony Works
How Java Works
How LAN Switches Work
How Laptops Work
How Laser Printers Work
How LCDs Work
How Microprocessors Work
How Modems Work
How Motherboards Work
How MP3 Files Work
How Network Address Translation Works
How Newsgroups Work
How OSI Works
How PC Power Supplies Work
How PCI Works
How PERL Works
How Phone networking works
How RAM Works
How ROM Works
How Routing Algorithms Work
How Scanners Work
How SCSI Works
How Serial Ports Work
How Sound Cards Work
How Video Game Systems Work
How Virtual Memory Works
How Virtual Private Networks Work
How Web Servers Work
How Webcams Work
===
Ports Utilities ... All-In-One
01- Atelier Web Security Port Scanner 4.61
02- Atelier Web Ports Traffic Analyzer v2.32
03- Ports Lock v1.80
04- AnalogX Port Blocker v1.02
05- Port Mapper v1.4
06- Port Peeker v2.7.0.21
07- DiamondCS Open Ports v1.0
08- Active Ports v1.4
09- CurrPorts v1.07
10- Free Port Scanner v2.0
01- Atelier Web Security Port Scanner 4.61
02- Atelier Web Ports Traffic Analyzer v2.32
is the only software in the World that can capture the data that flows in and out of your PC since boot time.
03- Ports Lock v1.80
04- AnalogX Port Blocker v1.02
Whenever you run a server on your machine, it uses what are called 'ports', which allow other machines to connect to them. Of course, sometimes you're just running them for your own internal use, but there's no easy way to stop someone from accessing the server.
05- Port Mapper v1.4
Simple command-line port mapper(port redirector).
06- Port Peeker v2.7.0.21
07- DiamondCS Open Ports v1.0
08- Active Ports v1.4
09- CurrPorts v1.07
10- Free Port Scanner v2.0
===
Magic Dozen
Includes:
01- Magic Utilities 2005 v3.70
02- Magic Tweak v3.00
03- Magic Recovery Pro v3.2
04- Magic DVD Ripper v3.5
05- Magic DVD Copier 3.0a
06- Magic ISO Maker v5.0.0.166
07- Magic File Renamer Pro v6.12
08- Magic Media v3.25.50920
09- Magic Notes v3.4.5120
10- Magic Picture Converter v1.02
11- Magic Gallery
12- Magic Bios v2.0
01- Magic Utilities 2005 v3.70 Magic Utilities is a cute program designed to make your computer clean and more stable. These utilities include Uninstaller Plus, StartUp Organizer,and Process Killer. Magic Utilities enables you to easily and safely uninstall programs, inspect and manage the programs that automatically start when your turn on or logon to your computer, and lists and controls all currently running processes (system and hidden processes are also shown).
===
Unhackme.v3.0.3, Rootkits remover
A rootkit is a collection of programs that a hacker uses to mask intrusion and obtain administrator-level access to a computer or computer network.
===
WTF Toolkit 2006
1. Cracks-Activators
- Windows 2003 & Windows XP SP2 AntiProduct Activation fix v1.2
- All Windows XP and All Windows 2003 Server Activate fix
2. KeyGens
- All Windows CD Key Generators
- XP Key Recoverer & Discoverer 5.12 OEM Edition
- XP Key Recoverer & Discoverer 5.12
- MSKey 4 in 1
3. Magical Jelly Bean Keyfinder 1.41
4. Magical Jelly Bean Keyfinder/Changer 1.5 beta 3
5. Office 11 Reset
6. Windows Server 2003 Ent. VLK keygen
7. Win XP SP2 - Activation fix
- Windows 2003 & XP SP2 Anti Product Activation fix 1.2
- Windows XP [all] and Windows 2003 Server [all] Activation fix
8. Windows XP/.NET/2003 - Product Key Changer
9. Windows Longhorn Pro Build 4074 WinHEC [Sxol.net] Part 1
- Windows Code Name "Longhorn" WinHEC Build 4074 Activation fix
- New folder fix for Longhorn build 4074 - Version 1.0 by BetaONE
10.Windows Longhorn Pro Build 4074 WinHEC [Sxol.net] Part 2
11.Windows XP CD Key and Product ID Changer 1.0.1
12.RockXP 3.0
RockXP 3.0 allows you to :
- To retrieve and change your XP Key
- To retrieve all Mcft Products keys
- To save your XP activation file
- To retrieve your lost XP system passwords
- To retrieve your lost RAS (Remote Access Settings) passwords
- And to generate new passwords
13.Office XP Universal Activator (version 1.0)
14.Windows XP Key Viewers
15.Activate Windows XP SP2 RC2 2162 EN
16.ToolKit Part 1-5
17.Activation Disabler for Office XP all SP
18.Activate Windows XP SP2 RC2 2179 EN
19.Activate Windows XP SP2 RC2 2180 EN
20.Anti Product Activation fix 1.6
21.Windows - All Keygens
22.Activate Win XP Sp2 Part 1
23.Activate Win XP Sp2 Part 2
24.Any XP
25.Uninstall Reset 5
26.Make Cab
27.Windows XP Professional,Home Edition and OEM Final
- WINDOWS XP FINAL 2600 PROFESSIONAL, HOME, OEM
28.Keys
29.Windows XP Embedded fix
- (tested with "Windows XP Embedded with Service Pack 1" and SP2RC,
but should
work with any version of Windows XP Embedded)
30.Windows 2003 & XP & Longhorn - Anti Product Activation fix 2.0.1
- Tested with winlogon.exe build:
*Windows XP 2600.0 (Retail)
*Windows 2K3 3790.0 (Retail)
*Windows XP 2600.2180 (SP2 RTM)
*Windows XP 2600.1106 (SP1)
*Windows 2K3 3790.1218 (8.7.2004)
*Windows Longhorn (not tested by myself)
31.Activator & Product Activation fix 1.6
- Windows 2003 & XP Anti Product Activation Patch 1.6.1
- Windows XP SP2 Activator
NOTE: THIS AIO have in EXPLOITS Folder 6 malware (NOT VIRUS) this is hacking tools.
Use all this at your own risk...
download
1-ACT Anti Phishing 2006
Crack search engine 1
DLLs Essential Tools AIO (pass: When-You-Say)
Gabri3l
hack attack ebook
Hacking cat1Q
Hacking section
Hacking tutorials
How Stuff Works (pass: samonvn)
ISO AIO (pass: O__iapS525uyOOOLK2*/Z)
Loads of cracks & serials
PHP5 For Dummies-RiPPED
ping 1 7 5
Ports Utilities AIO (pass: PU_PACHINO)
TMDozen (pass: TMDAIO-TPachino)
Tons of keygens
Unhackme.v3.0.3, Rootkits remover
WingateTest
WTF.TK.2006 (pass: no_more_gates)
XP hack
===
1-ACT AntiPhishing 2006
Protects you against Internet criminals (phishers) sending spoofed' e-mails to lead consumers to counterfeit websites designed to trick recipients into divulging financial data such as credit card numbers, account usernames, passwords and social security numbers.
1-ACT Antiphishing 2006 is ID theft protector, a solution for phishing and email fraud.Phishers will try to trick you into giving out your credit card or the login information for your bank's website or other things you don't want to give out to scammers! Then they will use that information to steal from your accounts, make purchases using your information, or even identity theft.
protects you from these scams
===
DLLs Essential Utilities AIO
Includes:
01 DLL to Lib 1.42 - Convert DLL file into its equivalent static library
02 DLL Toys International Edition 2004 R3 - find unused DLLs to delete, view dependencies of executables, and view running processes and modules
03 DLL Spy v1.6 - searches your drives for Dynamic Link Libraries (DLLs) and makes a catalog of them
04 DLL Show 2000 v5.5 - displays a list of all running processes and their DLL dependencies
05 DLL Killer 5.0.1.5 - locate and delete redundant DLL files
06 AnalogX DLL Archive v1.00 - searches through all the files on your system and lets you know if any of them contain references to the DLL\'s in question
07 BFC Crypter DLL v1.3 - password-protection to all types of encryption
08 Find missing DLLs - Link to a useful site for downloading .dll files
Bonus:
eBook: Flash Web Design The Art of Motion Graphics By: Hillman Curtis
===
Gabri31 - Some tutorials
Beginner Tutorial: Serial fishing
Beginner Tutorial: Internal Keygen and Patching
Beginner Tutorial: Unpacking and Patching
Beginner tutorial #4: unpacking and patching, a more complex case v.1.1
Beginner Tutorial: Inline Patching
Packers theory v1.1
Cracking Lost Marble's Moho v5.1 using Memory BP's
Breakpoints Theory v1.2
Defeating Magic Byte Protection
===
- Hacking cat1Q:
Network Security Tools (OReilly- Apr 2005).chm
PC Hacks(Oct 2004).chm
PDF Hack(Aug 2004).chm
Practical Study Remote Access (Cisco-December 22, 2003).chm
Spidering Hacks(O'Reilly- October 2003).chm
Steal This Computer Book 3 What They Won't Tell You About the Internet(No Starch Press _ 2003 ).chm
Web Hacking- Attacks and Defence (Pearson Education-August 08, 2002).chm
Windows Server Hack(O'Reilly - March 2004).chm
- Hacking catQ:
Amazon Hacks - (O'reilly-August 2003).chm
Ethical Hacking and Countermeasures EC Council Exam 312 50 (OSB- 2004).chm
Hack IT Security Through Penetration Testing (Addison Wesley-2002).chm
Hacker Disassembling Uncovered (A List- 2003).chm
Hackers Delight( Addison Wesley- 2003 ).chm
Hacking-The Art of Exploitation(No Starch-2003).chm
Malware - Fighting Malicious Code (Prentice Hall-November 21 2003).chm
Maximum Security, 3rd Edition(Sams-April 2001).chm
Maximum Security_-A Hackers Guide to Protect Your Internet .chm
- Hacking Mixed
Hacks all files
A Buffer Overflow Study - Attacks and Defenses (2002)
Computer Vulnerability(March 9 2000)
Crackproof Your Software(No Starch-2002)
Credit Card Visa Hack(Cambridge Lab-2003)
Google Hacking for Penetration Tester (Syngress-2005)
Hacker's Desk Reference
Hackers Beware (NewRiders -2002)
Hacking Exposed- Network Security Secrets and Solutions (MCGraw-Hill-2001)
Hacking Exposed- Web Applications (MCGraw-Hill-2002)
Hacking Exposed- Windows 2003 Chapter 5
Hacking for Dummies (John Wiley-2004)
Hacking for Dummies-Access to Other Peoples Systems Made Simple
Hacking Guide v3.1[www.netz.ru]
How Thieves Targeted eBay Users but Got Stopped Instead(Interhack-June 2003)
Reversing Secrets of Reverse Engineering (Apr 2005)
Secrets To Winning Cash Via Online Poker
Stealing the Network; How to Own the Box ( Syngress-2003)
The Art of Deception by Kevin Mitnick
The Art of Intrusion-The Real Stories Behind the Exploits of Hackers Intruders and Deceivers (Wiley- Feb 2005)
The Extreme Searchers Internet Handbook A Guide for the Serious Searcher (Feb 2004)
Tricks of the Internet Gurus (April 1999)
Underground Hacking Madness & Obsession on the Electronic Frontier (Suelette Dreyfus & Julian Assange-2001)
===
Hacking section:
FXP Basics
Pub Scanning
Remote Scanning
Win Proxy Scanning
exploits
msinet
schemes
Selector
spam_pi
TagCheck
WinGet2k1
====
New Hacking Ebooks:
A Basic UNIX Overview
A BEGINNERS GUIDE TO Hacking Unix
A Novice's Guide to Hacking 2004
A Novice's Guide To Hacking
A Short HACKER SPEAK Glossary
A simple TCP spoofing attack
Accessing the bindery files directly
An Architectural Overview of UNIX Network Security
Anonymity complete GUIDE
ANONYMOUS emails
Anonymous FTP FAQ
ANSIBombs II Tips And Techniques
attacks on networks how to stop
Backdoor
Backdoors
BBS CRASHING TECHNIQUES
Bust Avoidance For Dipshits
Firewall Protection how to
Guide to Hacking with sub7
hacking and phreaking
Hacking for Dummies Volume 2
Hacking For Newbies
hacking in telnet ftp
hacking on Telnet explained
hacking password protected site
Hacking Password Protected Website's
hacking passwords
How to learn to hack in easy steps
How to use the Web to look up information on hacking
IP how to
NetBios explained
Proxy how to
Routing Basics
telnet trick port 25
Yahoo Chat Commands how to
===
How Stuff Works - ebooks:
How 3D Glasses Works
How ASPs Work
How Banner Ads Work
How Bits and Bytes Work
How Cable Modems Work
How Caching Works
How CD Burners Work
How CDs Work
How CGI Scripting Works
How Computer Keyboards Work
How Computer Memory Works
How Computer Mice Work
How Computer Monitors Work
How Computer Viruses Work
How Domain Name Servers Work
How DSL Works
How Encryption Works
How Ethernet Works
How Facial Recognition Systems Work
How File Compression Works
How File Sharing Works
How Fingerprint Scanners Work
How Flash Memory Works
How Floppy Disk Drives Work
How Hard Disks Work
How IDE Controllers Work
How Inkjet Printers Work
How Internet Cookies Work
How Internet Infrastructure Works
How Internet Search Engines Work
How IP Telephony Works
How Java Works
How LAN Switches Work
How Laptops Work
How Laser Printers Work
How LCDs Work
How Microprocessors Work
How Modems Work
How Motherboards Work
How MP3 Files Work
How Network Address Translation Works
How Newsgroups Work
How OSI Works
How PC Power Supplies Work
How PCI Works
How PERL Works
How Phone networking works
How RAM Works
How ROM Works
How Routing Algorithms Work
How Scanners Work
How SCSI Works
How Serial Ports Work
How Sound Cards Work
How Video Game Systems Work
How Virtual Memory Works
How Virtual Private Networks Work
How Web Servers Work
How Webcams Work
===
Ports Utilities ... All-In-One
01- Atelier Web Security Port Scanner 4.61
02- Atelier Web Ports Traffic Analyzer v2.32
03- Ports Lock v1.80
04- AnalogX Port Blocker v1.02
05- Port Mapper v1.4
06- Port Peeker v2.7.0.21
07- DiamondCS Open Ports v1.0
08- Active Ports v1.4
09- CurrPorts v1.07
10- Free Port Scanner v2.0
01- Atelier Web Security Port Scanner 4.61
02- Atelier Web Ports Traffic Analyzer v2.32
is the only software in the World that can capture the data that flows in and out of your PC since boot time.
03- Ports Lock v1.80
04- AnalogX Port Blocker v1.02
Whenever you run a server on your machine, it uses what are called 'ports', which allow other machines to connect to them. Of course, sometimes you're just running them for your own internal use, but there's no easy way to stop someone from accessing the server.
05- Port Mapper v1.4
Simple command-line port mapper(port redirector).
06- Port Peeker v2.7.0.21
07- DiamondCS Open Ports v1.0
08- Active Ports v1.4
09- CurrPorts v1.07
10- Free Port Scanner v2.0
===
Magic Dozen
Includes:
01- Magic Utilities 2005 v3.70
02- Magic Tweak v3.00
03- Magic Recovery Pro v3.2
04- Magic DVD Ripper v3.5
05- Magic DVD Copier 3.0a
06- Magic ISO Maker v5.0.0.166
07- Magic File Renamer Pro v6.12
08- Magic Media v3.25.50920
09- Magic Notes v3.4.5120
10- Magic Picture Converter v1.02
11- Magic Gallery
12- Magic Bios v2.0
01- Magic Utilities 2005 v3.70 Magic Utilities is a cute program designed to make your computer clean and more stable. These utilities include Uninstaller Plus, StartUp Organizer,and Process Killer. Magic Utilities enables you to easily and safely uninstall programs, inspect and manage the programs that automatically start when your turn on or logon to your computer, and lists and controls all currently running processes (system and hidden processes are also shown).
===
Unhackme.v3.0.3, Rootkits remover
A rootkit is a collection of programs that a hacker uses to mask intrusion and obtain administrator-level access to a computer or computer network.
===
WTF Toolkit 2006
1. Cracks-Activators
- Windows 2003 & Windows XP SP2 AntiProduct Activation fix v1.2
- All Windows XP and All Windows 2003 Server Activate fix
2. KeyGens
- All Windows CD Key Generators
- XP Key Recoverer & Discoverer 5.12 OEM Edition
- XP Key Recoverer & Discoverer 5.12
- MSKey 4 in 1
3. Magical Jelly Bean Keyfinder 1.41
4. Magical Jelly Bean Keyfinder/Changer 1.5 beta 3
5. Office 11 Reset
6. Windows Server 2003 Ent. VLK keygen
7. Win XP SP2 - Activation fix
- Windows 2003 & XP SP2 Anti Product Activation fix 1.2
- Windows XP [all] and Windows 2003 Server [all] Activation fix
8. Windows XP/.NET/2003 - Product Key Changer
9. Windows Longhorn Pro Build 4074 WinHEC [Sxol.net] Part 1
- Windows Code Name "Longhorn" WinHEC Build 4074 Activation fix
- New folder fix for Longhorn build 4074 - Version 1.0 by BetaONE
10.Windows Longhorn Pro Build 4074 WinHEC [Sxol.net] Part 2
11.Windows XP CD Key and Product ID Changer 1.0.1
12.RockXP 3.0
RockXP 3.0 allows you to :
- To retrieve and change your XP Key
- To retrieve all Mcft Products keys
- To save your XP activation file
- To retrieve your lost XP system passwords
- To retrieve your lost RAS (Remote Access Settings) passwords
- And to generate new passwords
13.Office XP Universal Activator (version 1.0)
14.Windows XP Key Viewers
15.Activate Windows XP SP2 RC2 2162 EN
16.ToolKit Part 1-5
17.Activation Disabler for Office XP all SP
18.Activate Windows XP SP2 RC2 2179 EN
19.Activate Windows XP SP2 RC2 2180 EN
20.Anti Product Activation fix 1.6
21.Windows - All Keygens
22.Activate Win XP Sp2 Part 1
23.Activate Win XP Sp2 Part 2
24.Any XP
25.Uninstall Reset 5
26.Make Cab
27.Windows XP Professional,Home Edition and OEM Final
- WINDOWS XP FINAL 2600 PROFESSIONAL, HOME, OEM
28.Keys
29.Windows XP Embedded fix
- (tested with "Windows XP Embedded with Service Pack 1" and SP2RC,
but should
work with any version of Windows XP Embedded)
30.Windows 2003 & XP & Longhorn - Anti Product Activation fix 2.0.1
- Tested with winlogon.exe build:
*Windows XP 2600.0 (Retail)
*Windows 2K3 3790.0 (Retail)
*Windows XP 2600.2180 (SP2 RTM)
*Windows XP 2600.1106 (SP1)
*Windows 2K3 3790.1218 (8.7.2004)
*Windows Longhorn (not tested by myself)
31.Activator & Product Activation fix 1.6
- Windows 2003 & XP Anti Product Activation Patch 1.6.1
- Windows XP SP2 Activator
NOTE: THIS AIO have in EXPLOITS Folder 6 malware (NOT VIRUS) this is hacking tools.
Use all this at your own risk...
download
No comments:
Post a Comment