Sunday, 30 January 2011

About infySEC and my personal thoughts

                                     Hi friends today i am going to share my few ideas about the infySEC workshop which i atten on  30.01.2011 regarding ETHICAL HACKING & INFORMATION SECURITY in ANNA UNIVERSITY...
Read more...

DarkComet Remote Administration Tool v3.0

DarkComet-RAT (Remote Administration Tool) is software design to control in the best condition and comfort possible any kind of Microsoft Windows machine since Windows 2000.This software allow you to make hundreds of functions stealthy and remotely without any kind of authorization in the remote process.This software is a long time project, started the August 2008, DarkComet-RAT is now one of the...
Read more...

Phone Creeper v0.98 latest version download ! :

�Phone Creeper is a phone espionage suite It can be silently installed by just inserting an sd card with the files below on it. The program does not show up under installed programs or running programs and allows for a useful array or features. Phones running this software can be remotely controled by sms text messages. All commands will be silently received and deleted immediately and results...
Read more...

Saturday, 29 January 2011

Ultra Hacker Kit Special 150 tools

Hello friends, today i am introducing you a ultra hacker kit Isoftdl special, it consists of more than 150 working hacking tools. Note: This material is posted for educational purposes only!Hacking in any form is punishable offense. This material may be used by you only for the study of vulnerabilities, and nothing more.This Package Includes:AddrViewAddrView gives you the ability to analyze...
Read more...

Thursday, 27 January 2011

Download Free Hacking Tools: 33 Best Hacking Tools

Well, I've gained a lot of tools , so I decided it'd be a good idea to give some of it back to the community. I've made this pack which contains most of my hacking tools collection (though not all Non). There's 33 (or more) tools in here.KEYLOGGERS & PASSWORD STEALING:- Ardamax 2.8- Ardamax 3.0- Fake Messenger w/ password retriever (Revenge Messenger)- Silent Keylogger by BUNNN- Digital Keylogger...
Read more...

Recover FireFox Passwords using FireFox Password Viewer

FirePasswordViewer is the GUI version of popular FirePassword tool to recover login passwords stored by Firefox. Like other browsers, Firefox also stores the login details such as username, password for every website visited by the user at the user consent. All these secret details are stored in Firefox sign-on database securely in an encrypted format. FirePasswordViewer can instantly decrypt and...
Read more...

Enable Telnet in windows 7

It�s very rare that I use Telnet these days, so it took a long time for me to notice that by default it was not packaged with Windows 7. I did some research and found out that this was also true for Windows Vista. More than likely this was an attempt to make Windows more secure by default, as Telnet is very insecure and whenever you have the choice you should always use SSH. However, with that being...
Read more...

LOCK YOUR FOLDERS WITHOUT ANY SOFTWARES

This is a very simple batch file trick. Paste the given code in batch file and save it as with any name.(remember Batch file extension is .bat). Double click on this batch file to create a folder locker. Now you will see a folder name Locker at the same directory of batch file. Put all files which you want to hide in the Locker folder. Double click on this batch file to lock the folder 'Locker'. If you want to unlock your files,double click the batch file again and you would be prompted...
Read more...

Tuesday, 25 January 2011

What is Double Password?

Strong passwords should have a significant length and cannot contain normal words. Only random digits and letters of different case. Such passwords are extremely hard to remember and it takes time to enter. But, even strong passwords have their weaknesses. When you type a password, it can be intercepted by a spy program that logs all your keystrokes. Others can see what you type (even if the...
Read more...

Here is the Best way to Crack the BIOS password

There are a lot ways to Crack the BIOS password. This is one of them but I would say that this one is more effective than the rest because the rest of the ways does not Guarantee you that it will Crack the BIOS password while in this case the Cracking is Guaranteed since in this we will remove the functionality of password protection of the BIOS.Follow the steps below:[eminimall]1) Boot up windows.2) go to dos-prompt or go to command prompt directly from the windows start up menu.3) type...
Read more...

Pak Cyber hackers hack Cochin Port website

KOCHI: Cyber hackers from Pakistan are alleged to have hacked the website of the Cochin Port Trust, investigations have revealed.The cyber wing of police found that the portal was hacked from a Pakistan Internet Protocol (IP) address."We have handed over the log details to CBI Interpol Cyber wing," Police Commissioner Manoj Abraham told PTI.The hacking was done at 0830 am on January 19. Cochin Port Trust said the hackers left an anti-...
Read more...

Monday, 24 January 2011

Infecting Your Victom through IP

Many of the times I saw this question asked here & everywhere on the Blog that �Is it possible to infect victim using his IP address?� So, I am going to show you how to do it. Requirements: Nmap MetasploitFirst of all you need target ip of your victim. Then open Metasploit Console & type db_create. [Use: This�ll create or connect you to database.]Once...
Read more...

download SqlInjector v.1.0.2 | blind SQL injection tool

download SqlInjector v.1.0.2 blind SQL injection toolSQLInjector is a tool to perform blind SQL injection in a website. This version only supports MS SQL Server. It uses time based inference to determine true or false conditions to extract data. The key feature is that it uses a binary search mechanism to reduce the character search address space, this means it can get each character value...
Read more...

400 Viruses In 1 File

.................................................................................................... 400 Viruses In 1 File  Avispa.drDark AvengerAVA.550Univ/aAuspar.377Auspar.338OC/oopsMiddleAuspar.635Aus-Term.mp.3490Jeru.1413OC/scudAuspar.drAuspar.635Auspar.615AusparAust.543Auspar.424Auspar.377Auspar.338Auspar.292aAuspar.215Auspar.187AusparUniv/bAurea.653Iron-MaidenAkuku.1111Akuku.889Akuku.886NRLG.bAttitudeAttention.394HLL.ow.4505Attention.394.damXanyUniv/gUniv/qUniv.cmpOC/vclAtomant.2143ATAtomic.350Astra.1010Suriv.drComaspShocker.cmp.7000TiebudBtDr.bAsh.743Univ/rArmagedon.yArmagedonViennaARCV.Scy.1208ARCV.Scroll.795ARCV.Scroll.dr)ARCV.Sand.1172ARCV.MoreARCV.KissARCV.Jo.986ARCV.Jo.912aARCV.250.drARCV.642ARCV.639aARCV.1183.drARCV.Anna.742.drARCV.639aARCV.Jo.916ARCV.839ARCV.Slime.773ARCV.IceARCV.IceArara.drArara.1054Arab.834Armagedon.yQScreen3Suriv.1488Suriv.drDark...
Read more...