Search This Blog

Monday, January 23, 2012

- Windows Hacking and Security

Hacking School Lesson 3 covers the ever popular topic of Windows Hacking and Security. The content is organized in a slideshow. That's because i thought it would be more interesting and easy to read and understand the content presented in the course.

7 practical modules of hacking techniques, described step-by-step. This is the core of your training. You will learn all the attack and defense techniques.

This ethical hacking training course is a hands-on journey into the hacking mindset, examining and practically applying the tools and techniques that hackers use to launch "infrastructure" attacks.

Click here to get the full Windows Hacking and Security tutorial


SOFTWARE MENTIONED IN ABOVE TECHNIQUES ARE AVAILABLE HERE TO DOWNLOAD.CLICK HERE TO DOWNLOAD.

Email Hacking

Hacking School Lesson 2 covers the topic of Email Hacking. The content is organized in a slideshow. That's because i thought it would be more interesting and easy to read and understand the content presented in the course.

7 practical modules of hacking techniques, described step-by-step. This is the core of your training. You will learn all the attack and defense techniques.

This ethical hacking training course is a hands-on journey into the hacking mindset, examining and practically applying the tools and techniques that hackers use to launch "infrastructure" attacks.

Get the Email Hacking the full tutorial


Any one need software mentioned in the lesson just comment it below or message me i will send them as these softwares are illegal to upload on internet.So any of you who need them just comment below or email me.

Click here to download email hacking software.

Hacking School Lesson 6 - Wireless Hacking

Hacking School Lesson 6 covers the topic of Wireless Hacking. The content is organized in a slideshow. That's because i thought it would be more interesting and easy to read and understand the content presented in the course.

7 practical modules of hacking techniques, described step-by-step. This is the core of your training. You will learn all the attack and defense techniques.

This ethical hacking training course is a hands-on journey into the hacking mindset, examining and practically applying the tools and techniques that hackers use to launch "infrastructure" attacks.

Get the info here Wireless Hacking

SOFTWARE MENTIONED IN ABOVE TECHNIQUES ARE AVAILABLE HERE TO DOWNLOAD.CLICK HERE TO DOWNLOAD.

10 Best Yahoo! Messenger Tricks and Hacks

Yahoo! Messenger is an instant messaging program which is compatible with all Windows versions. While instant messaging is the focus of Yahoo! Messenger, there are several special tricks that can enhance the user experience.

Here are my 10 Best Yahoo! Messenger Tricks and Hacks:

1. Find invisible users on your Yahoo! Messenger list


Want to find out someone who’s hiding from you? You can easily do so by going to Yahoo! Invisible Checker. All you need to do is type in the Yahoo! ID and the particular users status will be revealed.

2. Invisible nickname on chat rooms

Just go to edit profile and in the nick name type a (space character) on it just press Alt 0160 ( or ALT+255 ) and save it.

Now go to any Yahoo! chat room and you’ll notice that your nick name is empty. [Alt+0160 is a keyboard shortcut for space]

3. Run Multiple Instances of Yahoo! Messenger on same system

Some of you might be having more than one Yahoo! ID would like to log in simultaneously. Here is an easy way to do it without installing any sort of software. You just have to edit the registry and voila there you go. Follow the instructions below:

Download the following -multiyahoo.reg and save it to your hard disk.
Double click on it.



A dialog box will popup, click ‘Yes’
Start the yahoo messenger login with your first ID. Then again start another yahoo messenger by clicking on the messenger icon and log in with your second ID.This tweak works with all versions of Yahoo Messengers.



4. Removing Ads from your Yahoo! Messenger


If you are using Yahoo! Messenger 8.0, then you can disable ads by following the below steps:

First close the Yahoo! Messenger.
Save this .bat file and execute it. (Note: You won’t be able to enter the chat rooms if you use this patch.)


The above fix doesn’t work for Yahoo! Messenger 9 Beta. Here’s a way to disable the ads in Yahoo! Messenger 9:

Make sure the Yahoo! Messenger isn’t running, if it is then just close it.
Now backup the following file C:\Program Files\Yahoo!\Messenger\Yahoo!Messenger.exe (create a new copy)
Download HxD hex editor.
Open C:\Program Files\Yahoo!\Messenger\Yahoo!Messenger.exe in the hex editor
Now go to the offset 295928 (in HxD: Search/GoTo)
Look at the right column and replace y from “y.m.s.g.r.a.d.s” with p
Save the file and close HxD.

Note: This approach breaks Yahoo! Messenger’s terms of service.

If nothing works try launching this file.

5. Yahoo! Smiley Codes

You can make use of all smileys including hidden ones in your messenger by using YEmotePLUS plugin.

6. Creating Custom Profiles for Chat

You can create custom profiles with different name, sex and other details from Yahoo! Create/Edit Profiles. You can use these for chat services only.

7. Change the Yahoo! Messenger Title Bar

You can change the text that appears at the very top of the Yahoo! messenger window by editing the ymsgr.ini file.

1. Go to Program Files\Yahoo!\ and open ymsgr.ini.

2. Then at the end, type this:

[APP TITLE]
caption=YOUR TEXT

3. Change YOUR TEXT to whatever you want it to say. Then save the file and close messenger. When you restart messenger you will see your new message.

8. Online Status Changer and Manager

HyperIM is currently the best status changer & manager for Yahoo! messenger available at present.

9. Access Yahoo! Messenger Chat archives while offline


You can access your Yahoo! chat logs using Yahoo! Message Archive Decoder. It reads Yahoo! Messenger archive files (.dat files) and presents them in a format that you can read. It decodes the message archive without logging in (offline mode and no passwords required).

10. Retrieve Yahoo! Messenger Display pictures

Y! Display Pic will retrieve Yahoo! users even if they are offline or invisible.

How To Speed Up My Internet Connection with Google Public DNS

A guide to getting more out of your internet connection without switching.

If you are looking to increase your internet speed without any expensive software then you came to right place. I will tell you how to increase your internet speed up to 50%-60 % with few clicks. I have applied this trick to my GPRS dial-up connection and my internet connection speed increased to almost double.
Here I will show you how to get fastest speed to load your websites by the using of Google public DNS. Domain Name System (DNS) is a database system that translates a computer’s fully qualified domain name into an IP address. For example, when you type pc-tips-hacks.blogspot.com in web browser then DNS translate pc-tips-hacks.blogspot.com to computer readable number known as IP address and when computer knows about the IP location of web domain name it simply opens website in the browser.



Our ISP (Internet Service Provider) provide their DNS which are located at router. Sometimes DNS server of ISP is very slow then it takes so much time to find out the web address and open the website. To solve this problem you can replace your ISP’s DNS service with Google Public DNS by changing the settings of the network connection.

1) Go to Start -> Control Panel




2) Click on Network Connections in Control Panel




3) Right click on Local Area Connection and then click on Properties




4) Select Internet Protocol (TCP/IP) and then click on properties





5) Select Use the following DNS server addresses in filed Preferred DNS server type 8.8.8.8 and in Alternate DNS server type 8.8.4.4




Hope this tutorial was useful for you.

Saturday, January 21, 2012

Awesome Collection of Underground Illegal E-Books

14 Illegal/Banned Books Collection

Here i want to show you an awesome collection of underground illegal eBooks. I started reading these books few days ago and for now they really keep me interest. Here you can find anything from making gun silencers to lock picking, from growing and making drugs to passing drug tests, from killing people to even making yourself disappear forever. I am shure this collection will have your interest from beginning to end.

This Collection includes 14 complete books from infamous publishers such as Paladin Press, Loompanics Unlimited, Desert Publications and others.

Please use these books responsibly and don't try any of this stuff!! Just read them!



Collection of 14 BANNED and ILLEGAL eBooks

Lockpick

Defeating Electromagnetic Door Locks
Improvised Lock Picks

Druglord

Beginners Guide To Growing Marijuana
Fooling the Bladder Cops- Complete Drug Testing Guide
How to Grow Psychedelic Mushrooms
Secrets of Methaphetamine Manufacture
The Beginners Guide to Hash Growing

Assasin

21 Techniques of Silent Killing
Hidden Street Weapons
Jack the Rippa - Murder Inc
Silent but Deadly - Homemade Silencers

Anarchy

100 Ways to Disappear and Live Free
Anarchists Cookbook
Steal This Book


These books are provided for informational purposes only! Don't be an idiot and actually try any of this stuff and then be surprised to find yourself doing time inside prison.

YOU HAVE BEEN WARNED!!
Download it from here.

How To Send Anonymous Emails - For Free

Proxy servers and other anonymizing tools are useful for web surfing, but what if you want to send anonymous email—for example, if you’re a “whistle blower” and don’t want your identity known? Use an anonymous remailer such as the webbased Anonymouse’s AnonEmail, Send Anonymous Email, or the downloadable QuickSilver.

Anonymouse’s AnonEmail

With AnonEmail it is possible to send e-mails without revealing your e-mail address or any information about your identity. Therefore you can communicate more freely and you do not have to worry that it might cause consequences for you. This service allows you to send e-mails without revealing any personal information.

Send Anonymous Email

Send Anonymous Email is a service that allows you to send anonymous emails by resending your email several time through random nodes, thus making it impossible to trace back.

In Send Anonymous Email, you can fill in your recipient, the subject, and a short plain-text message. Contrary to many other services Send Anonymous Email does not (seem to) log your IP. However, we do urge you not to use it for anything illegal.

QuickSilver
QuickSilver is PRIVACY software. It can give you complete privacy in your email and newsgroup postings. Why would this be of interest to you?

Do you have fears that taking part in newsgroup discussions could lead to your harassment or stalking by some internet kook? We’ve all seen stories about this on CNN. Using QuickSilver you can post articles with absolutely no traces of their true origin. A QuickSilver message cannot be traced to you.

In another scenario, you are 1 of several individuals under surveillance. Your government believes you are involved in subversive activities. Using QuickSilver all individuals can communicate freely. Observers will find they can neither read this mail nor trace it to its destination—even after tracing dozens of messages. Surveillance of the message recipient’s connections will reveal only the receipt of a message. Its origin cannot be determined nor its content.

Suppose you work for an organization that is involved in criminal activity. You believe you must inform the proper authorities regarding the activities. To ‘go public’ with this information would not only affect your employment adversely, it could indeed be life threatening. With QuickSilver, your privacy is effectively bullet-proof.


Note: By sending a fake email or prank email you may be committing the offence of fraud even you did not intend to. You are not allowed to use these services for any illegal activities at any time.

Free Hotfile Premium Account That Works

Hello folks, before few day I bought premium hotfile account, so I decide to share this account with all loyal visitors of hackerx-malik.blogspot.com or hackerxpk.tk.



Username: 4745452
Password: aijyaq

Protect Yourself Against Viruses, Spyware and Web Bugs – For Free

You don’t have to spend a penny to keep your PC safe from viruses, spyware and web bugs. Fight back with these tips and tools—for free.

Kill Viruses

Big-name antivirus software such as Norton AntiVirus or McAfee VirusScan forces you to pay for a subscription every year, but they have another drawback as well. They also tend to suck up a lot of system resources and use plenty of RAM, and your PC can take a big performance hit from them just to keep itself protected.

There’s a better way. Use avast!, nifty antivirus software that’s free for personal use and that takes up so few system resources and RAM you won’t even notice it’s there. It includes seven different shields, and it’s a good idea to install and use them all. Once avast! is running, you can customize each shield. Double-click the avast! icon running in the System Tray and from the screen that appears, select the shield you want to customize. To change the sensitivity of the scanner—how aggressively the shield should act—move the slider. Move it to the left to make it less sensitive, and to the right to make it more sensitive. To customize the shield even further, click the Customize button. The dialog box that appears will vary according to the shield you’re customizing.

Note, by the way, that before you install avast!, you’ll need to first uninstall whatever antivirus software you’re already using; otherwise it might not work properly.

Protect Yourself Against Spyware

For most people, spyware has replaced viruses or worms as the most-feared and obnoxious danger on the Internet. A relatively few number of people become infected by viruses or worms, but it seems as if almost everyone you know has been hit by some kind of spyware.

Spyware is a catch-all phrase that encompasses many different types of obnoxious programs. The least intrusive of the bunch report on your surfing activity to a web site, which tracks what you do and then delivers ads to your PC based on your interests. But increasingly, they are becoming more intrusive. Some of them spawn pop-up swarms of ads that appear so quickly they overwhelm your PC, slowing it down and making it unusable. Others hijack your browser home page so that no matter what you do, you’re sent to a home page of the hijacker’s choosing, which might be a pornographic site, or perhaps a web site that spawns even more pop ups. And some kinds of spyware, called keyloggers, literally spy on you by watching every keystroke you make, and then send that information to someone on the Internet.

Even more fearsome is spyware that turns your PC into a “bot” or a “zombie” and forces it to spew out tens of thousands or more pieces of spam, all without your knowledge.

But you don’t have to be a victim; there’s a good deal you can do to protect yourself, and you won’t have to spend a penny to do it:

Get a free spyware detector and eradicator

One of the best and most popular free program is Ad-Aware. It checks your system for spyware, finding not only program files, but also Registry entries and cookies. After it does a check, you can choose which spyware problems you want the program to fix, and it’ll go about its work, deleting files, folders, and cookies, and fixing Registry entries. Because no one spyware-killer is perfect, I suggest getting another free one, Spybot Search & Destroy. If you’re a Vista user, you already have a free piece of antispyware, Windows Defender, shown on the picture below, on your system. If you use an earlier version of Windows, get a free copy of Windows Defender.



Be vigilant about what you download

There are plenty of free programs available on the Internet, but not all have good intentions in mind. Some are spyware. So be careful before downloading any free software. Go to reputable download sites, such as the download library run by PC World or to CNET Download.com and read the descriptions and reviews, to make sure the software doesn’t carry a spyware load. In addition, head to the Index of Known Spyware page run by Gibson Research, the SpywareGuide, and the Spyware Warrior List of spyware for a list of spyware programs.


Use a personal firewall such as ZoneAlarm

A personal firewall will let you block any program on your system from contacting the Internet without your approval. With one installed, spyware can’t “phone home” and alert others to your surfing habits. Windows XP’s Windows Firewall doesn’t have this capability, so you can’t use it to block spyware. Windows Vista’s Windows Firewall is better than XP’s at blocking these kinds of outbound connections, but it may not block all of them. For maximum safety, get a free firewall such as ZoneAlarm.



Kill pop ups

Pop-up ads are a common way of delivering spyware. Click a pop up, and you might get infected with spyware. So, kill pop ups. Internet Explorer includes pop-up killers, as does Firefox. But keep in mind that sometimes pop-ups make it through their pop-up killers. If one does, close it down and don’t click anything inside it (especially fake close buttons; be sure to use the real Windows controls in the upper corners of the window).

Be wary of files and links sent in instant messages

Increasingly, spyware is propagated via instant messaging programs. Spyware can in essence take over someone’s instant messaging program and then send itself to everyone on the buddy list, either as an executable file or a link—and it appears that a person, rather than spyware is sending the file or link. So before clicking a link or using a file sent via instant messaging, double-check with your friend that he is actually sending you something, and that spyware hasn’t done the job.

Stop drive-by downloads

A web site might attempt to download software to your PC without your knowledge, and it might carry a spyware payload. Internet Explorer includes tools to stop drive-by downloads, as does Firefox. However, they’re not necessarily 100 percent effective. So don’t click links sent to you in spam, which can lead to sites with drive-by downloads.

Watch Out for Web Bugs

Web bugs are invisible bits of data, frequently a single pixel in size (sometimes called clear GIFs), that can track all your activities on a web site and report them back to a server. They are one of the more pernicious ways your online activities can be tracked, no matter which browser you’re using. Sometimes, the web site the bugs send information to isn’t the one that contains the web bug; for example, a web bug might send information back to an online advertising network.

Web bugs can send the following information back to a server:

The IP address of your computer
The URL of the page on which the web bug is located, so they know you visited the page
The time the web bug was viewed, so they know exactly when you visited the page
The URL of the web bug image
The type of browser you have
The values of certain cookies (generally only cookies set by the web site that the bug resides on)


A free piece of software called Bugnosis will alert you whenever it comes across web bugs on pages you visit. It reports on the URL the bug reports to, and, for some bugs, it lets you click a link it creates so that you can send an email of complaint to the web site that runs the bug. It runs inside Internet Explorer as a toolbar and doesn’t work with any other browsers.

The software can’t actually protect you against web bugs, but it can alert you when you visit pages that use them, so you’ll know to stay away from them in the future. When you visit a site, the Bugnosis toolbar reports on the number of suspicious items that might be web bugs. To see detailed information about each suspicious item and web bug, click the down arrow next to the Bugnosis logo, and choose Bugs Found in This Session. You’ll see a list of every suspicious web bug. Click the item, and you’ll see a more detailed description, and an analysis on whether the item is truly a web bug or only suspicious.

Bugnosis can’t actually block web bugs; it can only alert you to their presence. If you want your privacy protected when you surf the Web, your best bet is to surf anonymously.

How To Make Your Own Anonymous Email Service

Do you want to send an email anonymously because, for example, you fear your views might not be appreciated by your boss? When avouching your opinion in public — critically important under more favorable circumstances — is unhealthy, anonymity becomes vital. Here i will show you how to setup your own anonymous email service. I am writing this post because there are some things that must be said, even when the speaker must remain anonymous. Lets start:

1. First of all you need to find a free hosting service that supports PHP and SendMail. Here is one that works perfect, and without ads: x10hosting.com. Create an account there.

2. Now open notepad and paste this PHP code: the code.

3. Save it everywhere u want as mail.php, then upload it in your host you created (x10hosting) via FTP.

4. Now we are done. Just go at yourname.x10hosting.com/mail.php, and start sending your fake emails.

Why sending anonymous emails is important:

Anonymously report sensitive information to the media
Send crime tips to law enforcement agencies anonymously
Report wrongdoing or theft at the workplace
Voice concerns to school principals anonymously
Report child or any other abuse
Initiate an anonymous chat discussion
Share suspicions regarding a friend or loved one

Collection of Password Hacking Tools 2012

Here I am sharing with you my collection of "Password Hacking Tools 2010". Using this password hacking kit you will be able to crack a lot of passwords like Windows Admin password, pdf passwords, zip files passwords, document passwords, rar passwords and much more.. I am sure you will find this collection useful.




This Password Hacking Kit Consists of following Password Hacking Breaking Tools:

PDF Password Remover
Windows XP Admin Password Remover
Zip File Password Cracker.
SQL Password Remover
Microsoft Office Password Remover.
Microsoft Windows Vista Password Remover.
Rar File Password Cracker
Windows Password Recovery Kit
Password Changer.
Distributed File Password Recovery..

and much more..

As the name of the tools suggests its a complete password hacking Kit. So guys Enjoy Latest Hacking tools...

How to Use it?

1. Download the Password Hacking
2. Extract the file and install it.
3. Then Register them and use it. ( all tools contain full serial keys and patches)

FREE HACKING SOFTWARES

Hacking School Download Section

Welcome to the Hacking School Download Section. Here you can download all programs presented in the course. You can find your program by pressing CTRL+F. Simply type the word to look for and press ENTER.
Note: The programs are compressed in RAR file format. You need to download a file archiver software, like WinRar or 7-Zip, in order to open the files. You can download WinRar for free from here.


Concept of Hacking


1. Proxy Software

GPass

GPass is a highly advanced software that can encrypt your online data, hide your IP address, and sidestep content filtering and monitoring using a number of secure channels to connect to the Internet and break through the Internet blockade. GPass supports the online applications that you use the most, including Web browsers (e.g. Firefox), multimedia players, email, instant messengers, download managers, and so on.

Hopster

Bypass Firewall - Bypass Proxy - HTTP tunnel Chat with your friends using your favourite applications: MSN, AOL, Yahoo Messenger, ICQ, Miranda, Trillian, mIRC... Wherever your friends are, hopster will bypass a censoring firewall and take you right to your buddies.
Browse, Surf, Download & Chat Anonymously Hide your real IP address and protect yourself from nosy people and wannabe-hackers. With hopster, there's no way anyone will know where or who you are.

M Proxy

This provides proxy solutions, with which you can access the blocked websites and protect your online privacy. You can also get free proxy lists.

Proxy I

A server that sits between a client application, such as a Web browser, and a real server. It intercepts all requests to the real server to see if it can fulfill the requests itself. If not, it forwards the request to the real server.

Tor

Tor is free software and an open network that helps you defend against a form of networksurveillance that threatens personal freedom and privacy, confidential business activities and relationships, and state security known as traffic analysis. Tor protects you by bouncing your communications around a distributed network of relays run by volunteers all around the world: it prevents somebody watching your Internet connection from learning what sites you visit, and it prevents the sites you visit from learning your physical location. Tor works with many of your existing applications, including web browsers, instant messaging clients, remote login, and other applications based on the TCP protocol.

Download Proxy Software




2. Scanners

GFI Lan Guard

GFI LANguard™ scans your network and ports to detect, assess and correct security vulnerabilities with minimal administrative effort. As an administrator, you have to deal separately with problems related to vulnerability issues, patch management and network auditing, at times using multiple products. However, with GFI LANguard these three cornerstones of vulnerability management are addressed in one package. This gives you a complete picture of your network set-up and help you to maintain a secure network state faster and more effectively. Vulnerability Management Patch Management Network Auditing

Nessus

The Nessus® is a vulnerability scanner for active scanners, featuring high-speed discovery, configuration auditing, asset profiling, sensitive data discovery and vulnerability analysis of your security posture. Nessus scanners can be distributed throughout an entire enterprise, inside DMZs and across physically separate networks.

Net Tools

Net Tools is a comprehensive set of host monitoring, network scanning, security, administration tools and much more, all with a highly intuitive user interface. It's an ideal tool for those who work in the network security, administration, training, internet forensics or law enforcement internet crimes fields.

NMAP

Nmap ("Network Mapper") is a free and open source utility for network exploration or security auditing. Many systems and network administrators also find it useful for tasks such as network inventory, managing service upgrade schedules, and monitoring host or service uptime. Nmap uses raw IP packets in novel ways to determine what hosts are available on the network, what services (application name and version) those hosts are offering, what operating systems (and OS versions) they are running, what type of packet filters/firewalls are in use, and dozens of other characteristics. It was designed to rapidly scan large networks, but works fine against single hosts. Nmap runs on all major computer operating systems, and official binary packages are available for Linux, Windows, and Mac OS X. In addition to the classic command-line Nmap executable, the Nmap suite includes an advanced GUI and results viewer (Zenmap), a flexible data transfer, redirection, and debugging tool (Ncat), and a utility for comparing scan results.

Download Scanners




Email Attacks



1. Email Server


Email Tracker Pro

eMailTrackerPro helps wipe out SPAM email from your inbox and can trace any email to its true geographical location.

Neo Trace Pro

NeoTrace shows you how packets get from your computer to another computer on the Internet by displaying all nodes between your computer and the trace target.

Post Cast Server

PostCast Server is an SMTP mail server program that completely replaces your ISP's SMTP server. By making one small change in your e-mail program, you can start sending messages directly from your computer. With the help of Post Cast Server you can turn your Computer into a Email Server.

Surege Mail Server

SurgeMail is an advanced secure easy to manage and install high performance email server using fast browser based administration tools. Surgemail includes user and domain self administration. Surgemail is scalable to an unlimited number of users or domains. Surgemail's efficiency mean tens of thousands of users can be supported even on very modest hardware.

H Mail Server

hMailServer is a free e-mail server for Microsoft Windows. It's used by Internet service providers, companies, governments, schools and enthusiasts in all parts of the world. It supports the common e-mail protocols (IMAP, SMTP and POP3) and can easily be integrated with many existing web mail systems. It has flexible score-based spam protection and can attach to your virus scanner to scan all incoming and outgoing email.

Free SMTP

Free SMTP Server is a SMTP server program for Windows that lets you send email messages directly from your computer. It's very simple but very useful for laptop users traveling around the world and connecting their PCs to different Internet Service Providers in different countries. You can use it instead of ISP's SMTP server to increase your security and privacy. The email program you already use for sending and receiving messages can be connected to the server in a very easy way - by using the word "localhost" instead of your current SMTP host. Having done so, you can send messages in a usual manner. Free SMTP Server is very fast, while sending; it establishes dozens of SMTP connections, and gets the most out of your Internet connection.

Download Email Servers





2. Scripts

PHP Phishing Demo Script

This Script can be used for PHISHING and must solely be used for Educational Purpose only. For using this script, you will have to upload it on some Website.

PHP Fake Mail Script

This Script can be used for Sending Fake Mail and must solely be used for Educational Purpose only. For using this script, you will have to upload it on some Website.

PHP Email Bombing Script

This Script can be used for Sending Numerous Mails on a Single Click and must solely be used for Educational Purpose only. For using this script, you will have to upload it on some Website.

Download Scripts






3. Tracing Tools

Email Tracker Pro

eMailTrackerPro helps wipe out SPAM email from your inbox and can trace any email to its true geographical location.

Neo Trace Pro

NeoTrace shows you how packets get from your computer to another computer on the Internet by displaying all nodes between your computer and the trace target.

Post Cast Server

PostCast Server is an SMTP mail server program that completely replaces your ISP's SMTP server. By making one small change in your e-mail program, you can start sending messages directly from your computer. With the help of Post Cast Server you can turn your Computer into a Email Server.

Surege Mail Server

SurgeMail is an advanced secure easy to manage and install high performance email server using fast browser based administration tools. Surgemail includes user and domain self administration. Surgemail is scalable to an unlimited number of users or domains. Surgemail's efficiency mean tens of thousands of users can be supported even on very modest hardware.

H Mail Server

hMailServer is a free e-mail server for Microsoft Windows. It's used by Internet service providers, companies, governments, schools and enthusiasts in all parts of the world. It supports the common e-mail protocols (IMAP, SMTP and POP3) and can easily be integrated with many existing web mail systems. It has flexible score-based spam protection and can attach to your virus scanner to scan all incoming and outgoing email.

Free SMTP

Free SMTP Server is a SMTP server program for Windows that lets you send email messages directly from your computer. It's very simple but very useful for laptop users traveling around the world and connecting their PCs to different Internet Service Providers in different countries. You can use it instead of ISP's SMTP server to increase your security and privacy. The email program you already use for sending and receiving messages can be connected to the server in a very easy way - by using the word "localhost" instead of your current SMTP host. Having done so, you can send messages in a usual manner. Free SMTP Server is very fast, while sending; it establishes dozens of SMTP connections, and gets the most out of your Internet connection.

Download Tracing Tools




System Hacking



1. Admin Password Cracker

Active Password Changer

Active Password Changer is designed for resetting local administrator and user passwords on Windows XP / VISTA / 2008 / 2003 / 2000 & Windows 7 systems in case an Administrator's password is forgotten or lost. You do not need to re-install and re-configure the operating system. Other Windows login security restrictions like 'Account is disabled', 'Password never expires', 'Disable Force Smart Card Login', 'Account is locked out ', 'User Must Change Password at Next Logon' and 'Logon Hours' can be changed or reset. With Active Password Changer you can log in as a particular user with a blank password.

Cain & Abel

Cain and Abel is a password recovery tool for Microsoft Operating Systems. It allows easy recovery of various kind of passwords by sniffing the network, cracking encrypted passwords using Dictionary, Brute-Force and Cryptanalysis attacks, recording VoIP conversations, decoding scrambled passwords, recovering wireless network keys, revealing password boxes, uncovering cached passwords and analyzing routing protocols. Its main purpose is the simplified recovery of passwords and credentials from various sources, however it also ships some "non standard" utilities for Microsoft Windows users.

Hiren’s Multi Boot Disk

Hiren's Multi BootCD is one of the most popular Boot CD-s. It contains dozens of diagnostic tools that would be useful to everyone in different situations. Contains a collection ofsoftware programs to work with partitions on the hard disk, making back up, measuring the productivity of your machine, for testing of memory, hard disk and other hardware, antivirus software with the latest virus definitions and dozens of others

Offline Password Cracker

Offline Password Cracker is an amazing password recovery tool but instead of actually recovering your Windows password like OPH Crack and similar tools do, it deletes it. Without a password, you're allowed unrestricted access to your Windows operating system.

OPH Crack

Ophcrack is a free Windows password cracker based on Rainbow Tables. It is a very efficient implementation of rainbow tables done by the inventors of the method. It comes with a Graphical User Interface and runs on multiple platforms.

Sam Inside

SAMInside is designated for the recovery of Windows NT, Windows 2000, Windows XP, Windows 2003, Windows Vista, Windows 7 user passwords.

Download Admin Password Crackers





2. Data Recovery Tools

Active Disk Image

Active@ Disk Image is software that makes an exact copy of any PC disks (HDD, SSD, USB, CD, DVD, Blu-ray etc.) and stores it into a folder. The disk images may be used for backups, PC upgrades or disk duplication purposes. In case of computer failure, a backup image may be used to recover your computer system or find & restore any necessary files from within an image.

B4win Backup

Easy to use Backup Freeware. Many features including spanned and Huge backups. KISS - Keeping It So Simple. This backup utility is reliable, and simple. Powerful arrangement of backup size - spanning disks, predefined disk size to suit CDR CDRW media etc. Can restore from a disk which has lost the directory reference (most ZIP programs cannot do this).

Easy Recovery Pro

EasyRecovery™ software products offer home users or businesses complete solutions for their data recovery, file repair and disk diagnostic needs.

Eraser

Eraser is an advanced security tool for Windows which allows you to completely remove sensitive data from your hard drive by overwriting it several times with carefully selected patterns.

Restoration

Restoration is an easy to use and straight forward tool to undelete files that were removed from the recycle bin or directly deleted from within Windows, and we were also able to recover photos from a Flash card that had been formatted. Upon start, you can scan for all files that may be recovered and also limit the results by entering a search term or extension. In addition, it also provides the option to wipe the found files beyond simple recovery. The program is small and standalone, it does not require installation and can also run from a Floppy disk. Restoration works with FAT and NTFS as well as digital cameras cards.

Win Backup

Win Backup Software makes it easier than ever before to secure your data by making regular backups. Not only will the Backup Software help you organize your backups and schedule automatic backups, it will also protect your data using the latest encryption techniques, compress data to save space, create detailed logs of all backup operations and more. Win Backup Software also features one of the most intuitive user interfaces you have ever seen, making even the most advanced features easily accessible to beginners and professionals alike.

Download Data Recovery Tools




3. Encryptors

StegoMagic

StegoMagic brings you a feature-based steganalytic method for music files, text files and images. StegoMagic can hide a message or file in many formats, such as WAV, TEXT, BMP 24 bit and BMP 256 colour files. There will be no change in file size of the carrier medium except when text file is the carrier medium. There will not be any perceptible distortion in the carrier file after hiding. Your file will seem exactly as the original, so it's almost impossible to detect hidden data. Your data is encrypted with a password using D.E.S. (for additional protection) and hidden in the carrier medium. The data to be hidden must be approximately 1/8th of carrier file size or less. No file size restriction for text file carrier files.

Encryptor

Encryptor is a password protected utility that allows you to send and receive encrypted emails to your friends and business acquaintances. Encrypt and send mail directly from the program. Saves email address's for quick responding. File size has been kept to a minimum (75 Kb) so you can easily send the program along with your encrypted message as an attachment to the recipient. Easy one button encrypt/decrypt process.

Image Hide

Hide your sensitive data in image files. This is great Stenography software, Now with better encryption (RC_4) and SHA hashed passwords, image file versioning, auto image create (fractals), save files to BMP or PNG format, Load in many different image formats.

PC Security

PC Security™ is the ultimate in computer security, offering multiple locking systems for the windows environment and internet. Lock files, monitor programs activities, even detect intruders! PC Security offers flexible and complete password protection, "Drag and Drop" support, plus many other handy features. All together, an incredible security package.

True Crypt

Free open-source disk encryption software for Windows 7/Vista/XP, Mac OS X, and Linux. Handle this tool very carefully else why you may loss your data.

Download Encryptors




4. Keyloggers

Actual Spy Keylogger

Actual Spy - is a keylogger which allows you to find out what other users do on your computer in your absence. It is designed for the hidden computer monitoring and the monitoring of the computer activity. Keylogger Actual Spy is capable of catching all keystrokes, capturing the screen, logging the programs being run and closed, monitoring the clipboard contents.

Ardamax Keylogger

Ardamax Keylogger is a keystroke recorder that captures user's activity and saves it to an encrypted log file. The log file can be viewed with the powerful Log Viewer. Use this tool to find out what is happening on your computer while you are away, maintain a backup of your typed data automatically or use it to monitor your kids. Also you can use it as a monitoring device for detecting unauthorised access. Logs can be automatically sent to your e-mail address, access to the keylogger is password protected. Besides, Ardamax Keylogger logs information about the Internet addresses the user has visited.

Ghost Keylogger

Ghost Keylogger invisibly captures all keystrokes to a logfile or optionally sends them to a predefined email address.

Golden Keylogger

If you have teenage son or daughter (some of us have both), then you know how crazy they are about chatting and instant messaging. We know that it's not all that innocent. TV news are packed with stories when strangers tried to take advantage of innocent children by using internet chats and IM (instant messaging). The problem is so big that FBI has a task force that works 24 hours a day 365 days a year. Another problem that recently got a lot of publicity is bullying and name-calling with instant messengers. While your kids may not be honest with you about who they are chatting with and what they discuss, you have the way to know exactly what's going on without invading your kids' privacy. How? Golden Keylogger!

Home Keylogger

Home Keylogger is intended for interception and recording in a file of everything that is entered from the keyboard. The program is able to work in the hidden mode and to emerge on pressing a combination of keys. Home Keylogger is able to present the recorded data in a neat way that is easy to read but at the same time fixing exactly every event that has been done. By constantly using this program you will save your time by preventing accidental data damage and loss that is frequently caused by the use of Internet. You can immediately restore the text which was typed yesterday, the day before yesterday, or one week ago. Home Keylogger will also help to recollect passwords that you have forgotten or to recover lost e-mail.

Invisible Keylogger

Invisible is a full featured pc and Internet activity monitoring software that enables you to record everything on your pc. This product is extremely stealth and packs a big punch.

KGB Keylogger

Imagine you are writing an e-mail message. Then you click a wrong button or your e-mail client hangs and you have to write the same text from scratch. Sounds familiar? With KGB Free Keylogger, you will never lose any of your text, whether it was typed in an e-mail client, a text editor, an on-line form or anywhere else. This free program logs everything you type. Get your passwords, registration keys and other info safely logged.

Invisible Keylogger

Software has enhanced feature to record keystroke activities in encrypted log file with option to mail the log report at your specified email address. Helps to provide full control on your PC and act as powerful surveillance utility for Home and Office usage.

Remote Keylogger

Powerful and easy to use Computer Keylogger is a Stealth Keylogger to monitor your PC being hidden while maintaining absolute secrecy in your absence.

Soft Central Keylogger

SC-KeyLog PRO is a powerful digital surveillance monitor that logs computer activity for later review. Our spy program allows you to secretly record computer user activities such as e-mails, chat conversations, visited web sites, clipboard usage and more in a protected logfile. SC-KeyLog PRO even captures Windows user logon passwords!

Stealth Keylogger

Keylogger Software efficiently monitors the entire typed keystrokes activities of external user performed on your PC or Laptops. Easy to use utility records each keyboard entries including composed emails, chat records, typed web url’s, passwords, text etc. Software has enhanced feature to record keystroke activities in encrypted log file with option to mail the log report at your specified email address. Helps to provide full control on your PC and act as powerful surveillance utility for Home and Office usage.

Winvestigator Keylogger

Winvestigator™ is a user monitoring program that starts on boot, and runs undetectable in Windows. It even takes pictures so you can really see what is going on! Although powerful, this program was designed to be easy to use. Offering a web page style interface and a thorough help resource. Winvestigator can send the log over email so you can monitor a computer without having to physically access it.

Download Keyloggers




5. Password Recovery Tools


Asterisk Password Recovery

Reveals passwords hidden under password dialog boxes and web pages asterisks.

Chrome Password Recovery

It is a small password recovery tool that allows you to view the user names and passwords stored by Google Chrome Web browser. For each password entry, the following information is displayed: Origin URL, Action URL, User Name Field, Password Field, User Name, Password, and Created Time. You can select one or more items and then save them into text/html/xml file or copy them to the clipboard.

Dial Up Password Recovery

This utility enumerates all Dial-Up entries on your computer and reveals their logon details: User Name, Password and Domain. It works perfectly in the following operating systems: Windows 95, Windows 98, Windows ME, Windows NT, Windows 2000, and Windows XP. In Windows 2000 and Windows XP, the Dialupass utility can reveal the Dial-Up passwords only if you are logged on with administrator privileges.

E-mail Password Recovery

You've forgotten your Outlook PST password or Mail account passwords? Probably you have lost a note, where your password was written? Password Recovery Engine for Outlook can help you immediately. One click and you get your lost password back.

Firefox Password Recovery

Firefox Password Recovery presents itself as a handy tool enabling you to restore any cached passwords for such popular web browsers as Mozilla and Mozilla Firefox. The program will provide you with the list of website passwords straight after you start it. Firefox Password Recovery is very convenient as it provides all the passwords instantly, regardless to their length and complexity. You will certainly appreciate that the utility can both recover passwords typed in any language and easily restore multilingual passwords. Using this helpful utility you can immediately restore passwords for websites, requiring access passwords and even decrypt passwords protected with the User Master Password. The program interface is pretty simple and comes with such useful features as copying of the retrieved data to clipboard and saving it in a formatted text file, so you won’t lose it again. If you want to be sure that no one else uses Firefox Password Recovery while you are away you can set an access password and prevent any unauthorized program start.

Internet Explorer Password Recovery

Internet Explorer Password Recovery is a comprehensive solution for recovering all types of Internet Explorer saved passwords: cached credentials, FTP passwords, Internet Explorer AutoForm and AutoComplete fields, AutoComplete passwords, synchronization passwords, Identities, Content Advisor password. It's the first program in the world that can decrypt Internet Explorer passwords manually from registry binary files.

Messenger Password Recovery

Messenger Password Recovery is a password recovery tool that reveals the passwords of the instant messenger applications.

Network Password Recovery

When you connect to a network share on your LAN or to your .NET Passport account, Windows allows you to save your password in order to use it in each time that you connect the remote server. This utility recovers all network passwords stored on your system for the current logged-on user. It can also recover the passwords stored in Credentials file of external drive, as long as you know the last log-on password.

Powerpoint Password Recovery

PowerPoint Password Recovery is a program that allows recovery of lost or forgotten passwords required to open or modify password-protected Microsoft PowerPoint presentations. The program supports all versions of Microsoft PowerPoint, including 2007.

RAR, DOC, EXCEL, PDF Password Recovery

These are the programs those recover lost or forgotten passwords for Microsoft Word documents, Microsoft Excel Sheets, WinRar Archives, Adobe PDF Files. The program recovers all types of passwords, including instant recovery of document and template protection and passwords to modify. These programs instantly recover passwords for the read only permissions, editing and formatting restrictions, including instant recovery of passwords to open if weak encryption was used. The interface is simple and easy to understand, yet the functionality and the set of features are truly immense.

Remote Desktop Password Recovery

Remote Desktop Connections passwords are stored in *.rdp files, which are normally located in current user's 'My Documents' folder. When you select the manual mode, NPRW will automatically scan your disk searching for these files. If the program was unable to find a *.rdp file automatically, you can try locating it manually and entering path to it by hand.

VNC Password Recovery

VNC Password Recovery is a small Windows utility that recover the passwords stored by the VNC tool. It can recover 2 of passwords: password stored for the current logged-on user (HKEY_CURRENT_USER in the Registry), and password stored for the all users.

Wireless Password Recovery

Wireless Password Recovery recovers all wireless network security keys/passwords (WEP/WPA) stored in your computer by the 'Wireless Zero Configuration' service of Windows XP and by the 'WLAN AutoConfig' service of Windows Vista. It allows you to easily save all keys to text/html/xml file, or copy a single key to the clipboard.

Download Password Recovery Tools





6. Sticky Keys Backup

Sethc_Windows7

Sethc_Vista

Sethc_XP

Sethc is a process associated with Windows NT High Contrast Invocation and is part of Microsoft® Windows® Operating System. With default Windows settings, this process is run when the shift is pressed 5 times in sequence, to invoke the StickyKeys configuration window.

Download Sticky Keys Backup





7. System Utilities

Ava Find

Search without delay. Sophisticated ranking shows what you want near the top. Scout Bot finds newly downloaded files automatically. You don't even have to enter a search!
Clean up Your Hard Drive Ava Find can show you all your files and folders by size, instantly. Ava Find takes the guesswork out of finding the biggest file or folder on your computer.

Registry Tweak

Registry Tweaker is a powerful and fully automated application for tweaking your Windows Registry. This tweaker is different from other tweakers, becouse you actually see which keys are modified, you can even add your own tweaks in database.

Resource Hacker

Resource HackerTM is a freeware utility to view, modify, rename, add, delete and extract resources in 32bit Windows executables and resource files (*.res). It incorporates an internal resource script compiler and decompiler and works on Win95, Win98, WinME, WinNT, Win2000 and WinXP operating systems.

Download System Utilities





8. Virtual Machine

Virtual Box

VirtualBox is a powerful x86 and AMD64/Intel64 virtualization product for enterprise as well as home use. Not only is VirtualBox an extremely feature rich, high performance product for enterprise customers, it is also the only professional solution that is freely available as Open Source Software under the terms of the GNU General Public License (GPL).

VMware Workstation

VMware Workstation is optimized for maximum performance when running on 32-bit and 64- bit Windows 7 PCs. Supports Flip 3D and Aero Peek to show live thumbnails of your virtual machines. Run legacy application with 3D graphics, faster performance, and tighter desktop integration better than Windows XP Mode. Get shared folders and drag and drop convenience.

Download Virtual Machine





Utilities


1. Creating a Pen Drive Bootable


Unet Boot

UNetbootin allows you to create bootable Live USB drives for Ubuntu, Fedora, and other Linux distributions without burning a CD. It runs on both Windows and Linux.

Win to Flash

WinToFlash starts a wizard that will help pull over the contents of a windows installation CD or DVD and prep the USB drive to become a bootable replacement for the optical drive. It can also do this with your LiveCD. You don't have to worry about scratches on the disc or misplacing your original media discs once you transfer their contents to the flash drive. The optical drive is quickly becoming a thing of the past, especially in office environments, as media is shifted to the cloud.

PE Builder

PE Builder is not a Microsoft product and does not create Microsoft Windows Preinstallation Environment ("Windows PE"). Using PE Builder does not grant you a license to Microsoft Windows PE or to use the Windows XP or Server 2003 binaries in a manner other than stated in the End-User License Agreement included in your version of Microsoft Windows XP or Windows Server 2003. Microsoft has not reviewed or tested PE Builder and does not endorse its use.

Download Creating a Pen Drive Bootable





2. Remote Desktop


Bluetooth Remote Control

Use Phone Remote Control (previously Bluetooth Remote Control) both for buisness and pleasure! Give PowerPoint presentation and see the actual slides in the phone. Change songs that are currently being played on ITunes or Media Player, browse for artists, albums, change volume and much more..

EvilVNC

Evil-VNC is an vnc server injector as it's name it will install secretly an vnc server on remote host ,and run it automatikly after installation and you will be notified immediatly by server given u the remote ip and password for connection. Once the server installed It allows a person at a remote computer to assume control of another computer across a network, as if they were sitting in front of the other computer. In other words, sitting at your desk in Baltimore, you could use it to take control of your mother's PC in London and show her how to install and use some new software package by actually doing it yourself.

NetMaster

Net master is a tool for Remote Administration.

Remote Admin

Radmin (Remote Administrator) is a secure remote control software and remote access software which enables you to work on a remote computer in real time as if you were using its own keyboard and mouse.

Remote Administrator Control

With RAC (Remote Administrator Control) you can work without any limits on a remote computer with operation system Windows,as if working on your local computer. You can conduct remote administration and maintainenance of your computers, offer remote support and troubleshooting to your users.

Remotely Anywhere Network Console

Network Console is the perfect tool for system administrators to detect, control and deploy RemotelyAnywhere on computers they support. This application runs on the administrator’s PC and allows them to instantly remote control, access and configure any of the computers on the network that have RemotelyAnywhere or LogMeIn Pro installed.

Team Viewer

TeamViewer connects to any PC or server around the world within a few seconds. You can remote control your partner's PC as if you were sitting right in front of it.

Ultra VNC

UltraVNC is a powerful, easy to use and free software that can display the screen of another computer (via internet or network) on your own screen. The program allows you to use your mouse and keyboard to control the other PC remotely. It means that you can work on a remote computer, as if you were sitting in front of it, right from your current location.

VNC

VNC provides remote control software which lets you see and interact with desktop applications across any network.

Download Remote Desktop





3. Software


Smart Whois - Download

SmartWhois is a useful network information utility that allows you to look up all the available information about an IP address, hostname or domain, including country, state or province, city, name of the network provider, administrator and technical support contact information.

Adobe Reader - Download

Adobe Reader software is the global standard for electronic document sharing. It is the only PDF file viewer that can open and interact with all PDF documents. Use Adobe Reader to view, search, digitally sign, verify, print, and collaborate on Adobe PDF files.

Netcut - Download

NetCut is a solution that is helping you to admin your network based only on ARP protocol . It can execute several tasks as list IP-MAC table in seconds, turn off & on network on any computer on your LAN including any device like router or switcher. Also, NetCut can protected users from ARP SPOOF attacks.

Anti Netcut - Download

Anti Netcut 2Prevent Internet disconnection caused by netcut and similar programs,it get started in system start up. Enhanced anti spoofing. Who is using net cut capability.

Autoruns - Download

This utility, which has the most comprehensive knowledge of auto-starting locations of any startup monitor, shows you what programs are configured to run during system bootup or login, and shows you the entries in the order Windows processes them. These programs include ones in your startup folder, Run, RunOnce, and other Registry keys. You can configure Autoruns to show other locations, including Explorer shell extensions, toolbars, browser helper objects, Winlogon notifications, auto-start services, and much more. Autoruns goes way beyond the MSConfig utility bundled with Windows Me and XP.

Ccleaner - Download

CCleaner is a tool for cleaning your Windows PC. It protects your privacy online and makes your computer faster and more secure. Easy to use and a small, fast download.

Deep Freeze - Download

Deep Freeze makes computers indestructible and prevents against unwanted workstation changes—regardless of whether they are accidental or malicious. Deep Freeze is proven to reduce helpdesk support incidents and allows IT personnel to focus on more strategic IT needs.

Get User Info - Download

A tool to extract user info from a domain or computer.

Hide Window - Download

It is a utility that helps you to quickly hide a window of any application by using hotkeys or by clicking an icon in your tray. Moreover, you can specify groups of windows by their title text and set hotkeys for them. (For example, a group can comprise all windows that have 'Internet Explorer' in their title text.)

Java Run Time Environmnet - Download

JRE allows you to play online games, chat with people around the world, calculate your mortgage interest, and view images in 3D, just to name a few. It's also integral to the intranet applications and other e-business solutions that are the foundation of corporate computing.

Virtual Machine EHIS - Download

It’s a Virtual Machine created for Ethical Hacking & Information Security Workshop’s Student of VMWare Workstation.

Metasploit Framework - Download

Metasploit provides useful information and tools for penetration testers, security researchers, and IDS signature developers. This project was created to provide information on exploit techniques and to create a functional knowledgebase for exploit developers and security professionals. The tools and information on this site are provided for legal security research and testing purposes only.

Power ISO - Download

PowerISO is a powerful CD/DVD image file processing tool, which allows you to open, extract, create, edit, compress, encrypt, split and convert ISO files, and mount these files with internal virtual drive. It can process almost all CD-ROM image files including ISO and BIN.

Process Explorer - Download

The Process Explorer display consists of two sub-windows. The top window always shows a list of the currently active processes, including the names of their owning accounts, whereas the information displayed in the bottom window depends on the mode that Process Explorer is in: if it is in handle mode you'll see the handles that the process selected in the top window has opened; if Process Explorer is in DLL mode you'll see the DLLs and memory-mapped files that the process has loaded. Process Explorer also has a powerful search capability that will quickly show you which processes have particular handles opened or DLLs loaded.

LinkProcess Monitor - Download

Process Monitor is an advanced monitoring tool for Windows that shows real-time file system, Registry and process/thread activity. It combines the features of two legacy Sysinternals utilities, Filemon and Regmon, and adds an extensive list of enhancements including rich and nondestructive filtering, comprehensive event properties such session IDs and user names, reliable process information, full thread stacks with integrated symbol support for each operation, simultaneous logging to a file, and much more. Its uniquely powerful features will make Process Monitor a core utility in your system troubleshooting and malware hunting toolkit.

Streams - Download

The NTFS file system provides applications the ability to create alternate data streams of information. By default, all data is stored in a file's main unnamed data stream, but by using the syntax 'file:stream', you are able to read and write to alternates. Not all applications are written to access alternate streams, but you can demonstrate streams very simply. First, change to a directory on a NTFS drive from within a command prompt. Next, type 'echo hello > test:stream'. You've just created a stream named 'stream' that is associated with the file 'test'. Note that when you look at the size of test it is reported as 0, and the file looks empty when opened in any text editor. To see your stream enter 'more < test:stream' (the type command doesn't accept stream syntax so you have to use more) Tweak - Download

Tweak add fun and functionality to the Windows experience. Its additional programs that developers work on after a product has been released.

Unlocker - Download

LinkUnlocker is the tool for unlocking resources from external dependencies.

WinPcap - Download

WinPcap is the industry-standard tool for link-layer network access in Windows environments: it allows applications to capture and transmit network packets bypassing the protocol stack, and has additional useful features, including kernel-level packet filtering, a network statistics engine and support for remote packet capture. WinPcap consists of a driver, that extends the operating system to provide low-level network access, and a library that is used to easily access the low-level network layers. This library also contains the Windows version of the well known libpcap Unix API.

WinRAR - Download

WinRar is the utility for creating Rar, Zip, etc Archives and Vice Verse.

ZoomIt - Download

ZoomIt is screen zoom and annotation tool for technical presentations that include application demonstrations. ZoomIt runs unobtrusively in the tray and activates with customizable hotkeys to zoom in on an area of the screen, move around while zoomed, and draw on the zoomed image.



4. Update Master Boot Record

Update Master Boot Record


Perform several Master Boot Record (MBR) tasks, like backing up, restoring, fixing the boot code in the MBR, etc. The utility should not be used for GUID Partition Table (GPT) disks. The utility now, by popular demand, also come in a x64-version running unde x64-editions of Windows and PE.

Download Update Master Boot Record




Trojans



1. Batch To Exe Converter

Bat to Exe Converter

Bat To Exe-Converter converts batch-script files to EXE files. Some features and differences to usual batch files: ghost applications; additional binaries, icons, version information; hidden source.

Download Batch To Exe Converter





2. Joiners

Micro joiner

With MicroJoiner you can join (bind) more than one file into single one. And all files will be executed at once.

Hot Fusion

Hotfusion is a free file binder tool that can be used to bind files of all types into a single fused module for silent self-extraction. Below are some features of Hotfusion. Features and configurations: Binds files of all types; Sets user defined icon of fused module; Randomly renames files on extraction; Moves each bound file to its desired destination; Sequentially runs bound files on extraction; Randomize signature of fused module to prevent detection by antivirus; Silently registers bound libraries on extraction (dll, ocx); Adds bound files to startup using different methods; Silent self destruction; Saves fusion configuration.

Download Joiners




3. TCP View


TCP View

TCPView is a Windows program that will show you detailed listings of all TCP and UDP endpoints on your system, including the local and remote addresses and state of TCP connections. On Windows Server 2008, Vista, and XP, TCPView also reports the name of the process that owns the endpoint. TCPView provides a more informative and conveniently presented subset of the Netstat program that ships with Windows. The TCPView download includes Tcpvcon, a command-line version with the same functionality.

Download TCP View





4. Trojan Software


Beast

Beast is a Windows-based backdoor trojan horse more commonly known in the underground cracker community as a RAT (Remote Administration Tool). Beast was one of the first trojans to feature a 'reverse connection' to its victims and once established, it gave the attacker complete control over the infected computer.

Back Attack

Back Attack is a Windows Based Trojan horse, which can also be called as Remote Administration Tool.

Back Orifice

BackOrifice Trojan when installed on a Microsoft Windows system, this backdoor trojan horse program allows others to gain full access to the system through a network connection

Donald Dick

Backdoor Donald Dick 1.52 is a Trojan that opens up a backdoor program that, once installed on a system, permits unauthorized users to remotely extract passwords, edit the registry, log keystrokes, etc. Donald Dick runs from the server file "c:\WINDOWS\SYSTEM\pnpmgr.pci" over the ports 23476 and 23477 via TCP.

Girl Friend

The Girlfriend trojan horse is one of many trojan horse programs that attackers can use to access your computer system without your knowledge or consent.

Net Bus

The Netbus trojan is one of the most famous trojans around. Its authored by Carl-Frederik Neikter that is very similar to the "Back Orifice" trojan distributed by CdC. It allows ANYONE running the client portion to connect and control ANYONE running the server portion of it, with the same rights and privileges as the currently logged on user.

Snow Door

Snow Door is a trojan program with help of this hacker can gain access of Victim.

Sub Seven

Sub7 or Subseven Gold (also known as Backdoor-G and all of its variants) is the most well known Trojan backdoor application available. You can download the setup-file of Sub7 from anywhere.

Download Trojan Software




Web Server As a Target


1. Script

PHP Remote Code Execution Script

This Script can be used for Sending PHP Remote Code Execution and must solely be used for Educational Purpose only. For using this script, you will have to upload it on some Website.

Download Script





2. Vulnerability Scanners

Acunetix

Website security is possibly today's most overlooked aspect of securing the enterprise and should be a priority in any organization. Hackers are concentrating their efforts on web-based applications - shopping carts, forms, login pages, dynamic content, etc. Web applications are accessible 24 hours a day, 7 days a week and control valuable data since they often have direct access to backend data such as customer databases.

N Stalker

N-Stalker® was created in April 2000 by information security technology specialists, aiming at providing solutions to protect corporations and individuals against digital threats that affect information systems. Since then, our research & development laboratory has been working nonstop on security researches, producing web attack detection controls for the past years.

Download Vulnerability Scanners




3. Web Ripper Software

Internet Download Manager

Internet Download Manager (IDM) is a tool to increase download speeds by up to 5 times, resume and schedule downloads. Comprehensive error recovery and resume capability will restart broken or interrupted downloads due to lost connections, network problems, computer shutdowns, or unexpected power outages Also you can rip any Website with the help if IDM.

Web Ripper

WebRipper is a free Internet scanner and downloader, which is easy to use, yet powerful and fast. Download massive amounts of images, videos, audio, executables or documents from any website in just a moment. No need to waste your time clicking the links and saving every file manually. WebRipper uses spider-technology to follow the links in all directions from the startaddress. It filters out the interesting files on the way, and adds them to the download-queue for fast downloading by the multi channel download-engine.

Black Widow

Internet scanning and downloading tool for the expert and the novice.

Download Web Ripper Software





Wireless Hacking


1. Linux OS


Back Track

BackTrack is a Linux-based penetration testing arsenal that aids security professionals in the ability to perform assessments in a purely native environment dedicated to hacking. Regardless if you’re making BackTrack your primary operating system, booting from a LiveDVD, or using your favorite thumbdrive. Whether you’re hacking wireless, exploiting servers, performing a web application assessment, learning, or social-engineering a client, BackTrack is the one-stop-shop for all of your security needs.

Download Back Track




2. Network Analyzer

Aircrack-NG


Aircrack-ng is an 802.11 WEP and WPA-PSK keys cracking program that can recover keys once enough data packets have been captured. It implements the standard FMS attack along with some optimizations like KoreK attacks, as well as the all-new PTW attack, thus making the attack much faster compared to other WEP cracking tools. In fact, Aircrack-ng is a set of tools for auditing wireless networks.

Net Stumbler

It’s a Wireless Networking Tool, can be used for Wireless Auditing Purpose.

Download Network Analyzer




3. Proxy Server

CC Proxy

Proxy Server CCProxy is easy-to-use and powerful Internet connection sharing software. CCProxy can support broadband, DSL, dial-up, optical fiber, satellite, ISDN and DDN connections, it helps you build your own proxy server and share Internet access within the LAN efficiently and easily. CC Proxy Server can act as an HTTP, mail, FTP, SOCKS, news and telnet proxy server. It features powerful account management functions, including Internet access control, bandwidth control, Internet web filtering, content filtering and time control. It also provides web caching, online access monitoring, access logging and bandwidth usage statistics functions.

Download Proxy Server





Software Cracking



1. Debugger

Olly Debugger

OllyDbg is a 32-bit assembler level analysing debugger for Microsoft® Windows®. Emphasis on binary code analysis makes it particularly useful in cases where source is unavailable. OllyDbg is a shareware, but you can download and use it for free. It can help you in checking Assembly code of any software also you can make changes in that software.

Download Debugger





2. Disassembler


Windows Disassembler (WinDASM)

It’s a Windows hosted multi-processor disassembler that offers so many features it is hard to describe them all. It can help you in checking Assembly code of any software.

Download Disassembler




3. Patch Creator

Code Fusion

It’s a utility which can help us in Creating Patch pf any sodtware.

Download Patch Creator






4. Softwares

Perfect Keylogger

It logs the keystrokes from your keyboard and saves the data in a protected file.

PowerArchiver

PowerArchiver offers hundreds of features, yet remains easy to use, small and fast. Novice users will find a familiar interface complete with tutorial and detailed help, while more experienced users can take advantage of full Explorer integration, multiple encryption methods and advanced compression algorithms.

WinRAR

WinRAR is an archiving utility that completely supports RAR and ZIP archives and is able to unpack CAB, ARJ, LZH, TAR, GZ, ACE, UUE, BZ2, JAR, ISO, 7Z, Z archives. It consistently makes smaller archives than the competition, saving disk space and transmission costs.

Download Softwares



FOR MORE INFO DROP YOUR COMMENTS OR E-MAIL ME oganmicheal@gmail.com

How to Hack Graboid to Get Unlimited Movies for Free

So if some of you may have heard, Graboid offers free movies, TV shows and more to download. It is subscription based on bandwidth. In this post i am going to show you how to download as much as you want videos, movies, and TV shows through Graboid for free.

First, download the program HERE.

Then after you open the program you will have the option to create and account.


Create it and log in. You will notice your bandwidth restriction, and your account will expire in a month, when you have to buy a subscription.


Once your account has expired, I have discovered a new way to make accounts (NOTE: After your account is created, you will never be able to create a free account again, nor through the program or website).

Make this batch script:

cd %appdata%
del MozillaControl /F /q
cd “%LOCALAPPDATA%\Graboid_Inc\”
del *.* /F /q

Or download it HERE if you don't know how.

Run the batch file, and behold, the new account button shall appear again. Enter a different email address than previous, and your good to go.


For those with issues creating accounts:

1. Renew your IP address (unplug your modem for about 5mins and then reconnect it).

2. If the problem is not solved by number 2, download Hotspot Shield HERE

3. If it still doesn't work, wait a week. This will give a chance for your ISP to reset your IP.

How To Hack Into Computers Through WiFi

The internet is ever growing and you and I are truly pebbles in a vast ocean of information. They say what you don’t know can’t hurt you. When it comes to the Internet believe quite the opposite. On the Internet there a millions and millions of computer users logging on and off on a daily basis. Information is transferred from one point to another in a heartbeat. Amongst those millions upon millions of users, there’s you.

In this tutorial i am going to show you how to to access someone's facebook, youtube, and many other accounts which is using the same WiFi as you.

You need:

Mozilla Firefox
Firesheep - A Firefox extension that demonstrates HTTP session hijacking attacks.
WinPcap - WinPcap is an open source library for packet capture and network analysis for the Win32 platforms. It includes a kernel-level packet filter, a low-level dynamic link library (packet.dll), and a high-level and system-independent library.


Step 1: Install WinPcap then drag the Firesheep add-on, and put it on the Firefox icon. Firefox will open and will ask you to install the add on. Install it and restart Firefox.

Step 2: Open the add-on (You can do it by clicking on View -> Sidebar -> Firesheep), then click on Start Capturing and it'll start capturing, and as soon as somebody logs in any account it'll show up the logs, and then you can access their account.

Simple, but functional and VERY effective method to hack someones facebook, youtube, myspace, etc. account through WiFi.

Bypassing Facebook Security to Hack Facebook Account Passwords

Ok, here's a new quick tutorial for everyone who has been having to deal with Facebook blocking your entrance into someone's account due to logging in from a different location.

Ever since I had been problems constantly having to deal with Facebook leaving me out off people's accounts I began to think that I should write over my experiences to help others.

I will go over specific techniques and ideas to eventually grant you entrance to their accounts without having to deal with that Facebook problem having logging in from different location.

1. Before you even begin reading this, you must already have their passwords or e-mails. If not, I will tell you a few ideas of how to acquire them.

If you only want to log in without changing passwords, I would suggest that you steal their passwords through Phishing, Keylogging, or Social Engineering.

2. Bypassing Facebook security can be done through black hat methods, however I will not go over those methods, instead I will be touching the social engineering methods which are more effective and you can get faster results.

3. You will need to use your brain to think and have patience. If you don't have either a brain to think or the patience to wait, please don't continue reading this tutorial because you will not get any success.

Ok, let's move on to the actual information.

-This method is a cheap shot method, but you never know if it might work or not.

1. If a person uses a particular computer to log in to their accounts on a regular basis, THAT computer alone should be your focus.

You should infect that computer with a keylogger and have it linked together with a FTP to send you the logs or linked to send you e-mails.

2. Another method is to use your OWN computer to acquire the password by infecting yourself with a keylogger and let the slave use your computer. Gain their trust to the point of where they can log in to different websites.

You can say for instance "My account is not working, I think Facebook banned me. Can you test your account to see if yours is working?"

And of course, they will log in and you will gain the information. After they successfully log in, you can login to your account and say "Oh, there we go! It worked"

Now, you will attempt to log in in the future and the problem of Logging in from another location will disappear.

3. Let's say that they aren't stupid enough to use your computer to log in, you might think, what then? Well, here's my next suggestion to you.

Considering that you will already have the password through the methods I mentioned earlier, but you will have the problem of Logging in from another location.

Here's what you do:

Watch and study your slave, if you know he/she uses a location to use a computer, you should attempt to log in at that same location as well. It could be school, library, another friend's house, etc...

Most people will use any computer to log in to Social Networks or E-mails to check on updates. Considering that the IP you log in at that particular is the same within their network, the problem of Logging in from another location will not come up.

4. So, you don't have the choice of either offering your computer as a trap or the chance to "stalk" your slave. You wonder, what do I do then?

Well, this is where it gets more tricky considering that Facebook finally came up with an ingenious method to avoid intruders of taking over accounts easily.

Here's what Facebook did, in case if you don't already know. Facebook implemented a feature where you must visually recognize the friends on that account. They will show you pictures of random people within that account and ask you to select the name of that person.


If you don't recognize any of those people, you're screwed.

When will this happen? That will only happen when you attempt to change their passwords, so Facebook makes sure that you do in fact own that account. I personally wouldn't attempt to change the passwords, but if you do try, here's what I would recommend to you.

-If you know the person in person, notice who he/she is friends with to try to recognize the faces and physically ask the other persons their names.

If you do not know the person, you can use websites like:

www.com.lullar.com
www.pipl.com


To search their names, e-mails, phone numbers to see whether if you can find them on other Social networks. You can search the person's name manually by going to Myspace, Facebook, etc...To see who they have added as friends.

Your next step will be to add a friend of the slave or the slave directly. Adding the slave directly would probably be the best plan because you would have access directly to all the victims' friends and their pictures.

Now, all you have to do is match the pictures that Facebook asks you when you attempt to change their passwords by going to the victims friends and match them.

If you don't want to change their passwords, you can mask the slave's IP using other methods in which I will not go over. To find out their IP, you will need a RAT to manually whois them or any other method other there to find their IP.

A quick method I will suggest to you is to send the slave an e-mail if they have a hotmail account. When they reply you can right click on the e-mail and view source. You will see an IP from sender and use that to mask.

Mask their IP and facebook will not give you the problem of Logging in from another location.

If you follow the suggestions I have given you, you will surely gain entrance to their accounts and Facebook won't be able to do crap.

Their security is strong, but good ol' Social engineering never fails.

Recover Deleted Data Using FreeUndelete Software

Many times it happens that we accidentally delete some important data from our computer. In such cases data recovery softwares are very helpful but most of them are paid softwares. There are only few Free data recovery softwares available on the the internet and one of them is FreeUndelete.

Before you use FreeUndelete I advise you not to transfer any data to that particular drive from which you have to recover data as it can reduce your chances of data recovery.

Now In post I will give you download link for the Freeundelete software and also highlight some of its main features.

File systems that are supported by freeundelete Software are:

* NTFS 1.0 and 2.0 (Filesystems of windows NT,Xp,Vista,2000 and Windows 7)
* FAT 12,FAT 16,FAT 32 (Windows 98)

Where are the recovered files stored?

The recovered files will be stored at the user specified destination

Click Here To Download FreeUndelete Data Recovery Software

Advance Reading Technology (ART)

This company claims that a person using this software can speed up his reading speed.Atleast 10 times that of its original.I personally tested this software and found very efficient in their claim.
So test it if you are a student or a person having physical contact with reading in daily life.


Click Here To Download Software




Overview


Welcome to ART. Advanced Reading Technology lets you read documents
at a speed and level of comprehension you never would have thought
possible. ART is designed to supplement your reading skills by allowing
you to read emails, news items, memos, reports and other electronic
documents that you come across extremely quickly by letting you focus
on a single word at a time, rather than waste time moving your eyes
across a printout or going back to read something again. Your goal
when using ART should be to glean the essence of a piece with only a
few seconds of reading.

We recommend that you begin by trying out ART on documents that don't
require detailed reading, and then gradually trying longer and more
difficult pieces. It is not recommended that you use ART to read documents
that require a careful, in depth reading, such as legal documents,
contracts, business plans, etc. But you may wish to preview them with
ART in preparation for a more careful reading later.

Finding a speed that is comfortable for you to read at and still retain
comprehension is important, but don't be afraid to push your envelope.
In fact, to get the maximum benefit of this program, we recommend that
you read on a level just beyond what you think you are capable of.
You will be surprised at how much you retain after just a few minutes
of reading with ART, and how quickly you can improve your
reading speed.

Concentration is the key to using ART successfully: try not to let
yourself be distracted while you are reading. Remember, it is the
essence of the material, not the exact wording, that you should try
to retain. Don't be concerned if you miss a few words here and there,
the meaning of the whole is what matters.



Click Here To Download Software