BLOGGER TEMPLATES AND Blogger Templates »

Tuesday, June 1, 2010

Number of Visitors Free Hit Counter

Friday, February 12, 2010

KILL SHORT URL

Learn how to kill short URL's



Short URL Redirection services are favorite tools for many spammers and internet marketers. The anonymity and mysteriousness of those short URLs seems to invoke curiosity and many have succumbed to their intriguing qualities. Many innocent victims have been scammed and lost lots of money because of those who abused short URLs.

Thanks to Long URL Please, internet users today can practically lengthen, see-through and kill those short URLs once and for all. Long URL Please is based upon a clever Firefox Extension created by Darragh Curran but it is also can be used on other browsers (doesn’t seems to work on Google Chrome though) via bookmarklets. As of time of writing, Long URL Please demystifies short URLs provided by more than 30 short URL Redirection service providers; adjix.com, bit.ly, dwarfurl.com, ff.im, idek.net, is.gd, ln-s.net, loopt.us, ping.fm, piurl.com, piurl.com, poprl.com, qlnk.net, reallytinyurl.com, rubyurl.com, short.ie, smallr.com, snipr.com, snipurl.com, snurl.com, tinyurl.com, tr.im, twurl.nl, ub0.cc, ur1.ca, url.ie, urlx.ie, xrl.us, yep.it, zi.ma, zurl.ws.
Personally, I consider Long URL Please

SQL INJUCTION ATTACK

SQL injection attack



WEBS73X62AZ3

The Target Intranet

This appeared to be an entirely custom application, and we had no prior knowledge of the application nor access to the source code: this was a "blind" attack. A bit of poking showed that this server ran Microsoft's IIS 6 along with ASP.NET, and this suggested that the database was Microsoft's SQL server: we believe that these techniques can apply to nearly any web application backed by any SQL server.

The login page had a traditional username-and-password form, but also an email-me-my-password link; the latter proved to be the downfall of the whole system.

When entering an email address, the system presumably looked in the user database for that email address, and mailed something to that address. Since my email address is not found, it wasn't going to send me anything.

So the first test in any SQL-ish form is to enter a single quote as part of the data: the intention is to see if they construct an SQL string literally without sanitizing. When submitting the form with a quote in the email address, we get a 500 error (server failure), and this suggests that the "broken" input is actually being parsed literally. Bingo.

We speculate that the underlying SQL code looks something like this:

SELECT fieldlist
FROM table
WHERE field = '$EMAIL';

Here, $EMAIL is the address submitted on the form by the user, and the larger query provides the quotation marks that set it off as a literal string. We don't know the specific names of the fields or table involved, but we do know their nature, and we'll make some good guesses later.

When we enter steve@unixwiz.net' - note the closing quote mark - this yields constructed SQL:

SELECT fieldlist
FROM table
WHERE field = 'steve@unixwiz.net'';

when this is executed, the SQL parser find the extra quote mark and aborts with a syntax error. How this manifests itself to the user depends on the application's internal error-recovery procedures, but it's usually different from "email address is unknown". This error response is a dead giveaway that user input is not being sanitized properly and that the application is ripe for exploitation.

Since the data we're filling in appears to be in the WHERE clause, let's change the nature of that clause in an SQL legal way and see what happens. By entering anything' OR 'x'='x, the resulting SQL is:

SELECT fieldlist
FROM table
WHERE field = 'anything' OR 'x'='x';

Because the application is not really thinking about the query - merely constructing a string - our use of quotes has turned a single-component WHERE clause into a two-component one, and the 'x'='x' clause is guaranteed to be true no matter what the first clause is (there is a better approach for this "always true" part that we'll touch on later).

But unlike the "real" query, which should return only a single item each time, this version will essentially return every item in the members database. The only way to find out what the application will do in this circumstance is to try it. Doing so, we were greeted with:


Your login information has been mailed to random.person@example.com.

Our best guess is that it's the first record returned by the query, effectively an entry taken at random. This person really did get this forgotten-password link via email, which will probably come as surprise to him and may raise warning flags somewhere.

We now know that we're able to manipulate the query to our own ends, though we still don't know much about the parts of it we cannot see. But we have observed three different responses to our various inputs:

  • "Your login information has been mailed to email"
  • "We don't recognize your email address"
  • Server error

The first two are responses to well-formed SQL, while the latter is for bad SQL: this distinction will be very useful when trying to guess the structure of the query.

Schema field mapping

The first steps are to guess some field names: we're reasonably sure that the query includes "email address" and "password", and there may be things like "US Mail address" or "userid" or "phone number". We'd dearly love to perform a SHOW TABLE, but in addition to not knowing the name of the table, there is no obvious vehicle to get the output of this command routed to us.

So we'll do it in steps. In each case, we'll show the whole query as we know it, with our own snippets shown specially. We know that the tail end of the query is a comparison with the email address, so let's guess email as the name of the field:

SELECT fieldlist
FROM table
WHERE field = 'x' AND email IS NULL; --';

The intent is to use a proposed field name (email) in the constructed query and find out if the SQL is valid or not. We don't care about matching the email address (which is why we use a dummy 'x'), and the -- marks the start of an SQL comment. This is an effective way to "consume" the final quote provided by application and not worry about matching them.

If we get a server error, it means our SQL is malformed and a syntax error was thrown: it's most likely due to a bad field name. If we get any kind of valid response, we guessed the name correctly. This is the case whether we get the "email unknown" or "password was sent" response.

Note, however, that we use the AND conjunction instead of OR: this is intentional. In the SQL schema mapping phase, we're not really concerned with guessing any particular email addresses, and we do not want random users inundated with "here is your password" emails from the application - this will surely raise suspicions to no good purpose. By using the AND conjunction with an email address that couldn't ever be valid, we're sure that the query will always return zero rows and never generate a password-reminder email.

Submitting the above snippet indeed gave us the "email address unknown" response, so now we know that the email address is stored in a field email. If this hadn't worked, we'd have tried email_address or mail or the like. This process will involve quite a lot of guessing.

Next we'll guess some other obvious names: password, user ID, name, and the like. These are all done one at a time, and anything other than "server failure" means we guessed the name correctly.

SELECT fieldlist
FROM table
WHERE email = 'x' AND userid IS NULL; --';

As a result of this process, we found several valid field names:

  • email
  • passwd
  • login_id
  • full_name

There are certainly more (and a good source of clues is the names of the fields on forms), but a bit of digging did not discover any. But we still don't know the name of the table that these fields are found in - how to find out?

Finding the table name

The application's built-in query already has the table name built into it, but we don't know what that name is: there are several approaches for finding that (and other) table names. The one we took was to rely on a subselect.

A standalone query of

SELECT COUNT(*) FROM tabname

Returns the number of records in that table, and of course fails if the table name is unknown. We can build this into our string to probe for the table name:

SELECT email, passwd, login_id, full_name
FROM table
WHERE email = 'x' AND 1=(SELECT COUNT(*) FROM tabname); --';

We don't care how many records are there, of course, only whether the table name is valid or not. By iterating over several guesses, we eventually determined that members was a valid table in the database. But is it the table used in this query? For that we need yet another test using table.field notation: it only works for tables that are actually part of this query, not merely that the table exists.

SELECT email, passwd, login_id, full_name
FROM members
WHERE email = 'x' AND members.email IS NULL; --';

When this returned "Email unknown", it confirmed that our SQL was well formed and that we had properly guessed the table name. This will be important later, but we instead took a different approach in the interim.

Finding some users

At this point we have a partial idea of the structure of the members table, but we only know of one username: the random member who got our initial "Here is your password" email. Recall that we never received the message itself, only the address it was sent to. We'd like to get some more names to work with, preferably those likely to have access to more data.

The first place to start, of course, is the company's website to find who is who: the "About us" or "Contact" pages often list who's running the place. Many of these contain email addresses, but even those that don't list them can give us some clues which allow us to find them with our tool.

The idea is to submit a query that uses the LIKE clause, allowing us to do partial matches of names or email addresses in the database, each time triggering the "We sent your password" message and email. Warning: though this reveals an email address each time we run it, it also actually sends that email, which may raise suspicions. This suggests that we take it easy.

We can do the query on email name or full name (or presumably other information), each time putting in the % wildcards that LIKE supports:

SELECT email, passwd, login_id, full_name
FROM members
WHERE email = 'x' OR full_name LIKE '%Bob%';

Keep in mind that even though there may be more than one "Bob", we only get to see one of them: this suggests refining our LIKE clause narrowly.

Ultimately, we may only need one valid email address to leverage our way in.

Brute-force password guessing

One can certainly attempt brute-force guessing of passwords at the main login page, but many systems make an effort to detect or even prevent this. There could be logfiles, account lockouts, or other devices that would substantially impede our efforts, but because of the non-sanitized inputs, we have another avenue that is much less likely to be so protected.

We'll instead do actual password testing in our snippet by including the email name and password directly. In our example, we'll use our victim, bob@example.com and try multiple passwords.

SELECT email, passwd, login_id, full_name
FROM members
WHERE email = 'bob@example.com' AND passwd = 'hello123';

This is clearly well-formed SQL, so we don't expect to see any server errors, and we'll know we found the password when we receive the "your password has been mailed to you" message. Our mark has now been tipped off, but we do have his password.

This procedure can be automated with scripting in perl, and though we were in the process of creating this script, we ended up going down another road before actually trying it.

The database isn't readonly

So far, we have done nothing but query the database, and even though a SELECT is readonly, that doesn't mean that SQL is. SQL uses the semicolon for statement termination, and if the input is not sanitized properly, there may be nothing that prevents us from stringing our own unrelated command at the end of the query.

The most drastic example is:

SELECT email, passwd, login_id, full_name
FROM members
WHERE email = 'x'; DROP TABLE members; --'; -- Boom!

The first part provides a dummy email address -- 'x' -- and we don't care what this query returns: we're just getting it out of the way so we can introduce an unrelated SQL command. This one attempts to drop (delete) the entire members table, which really doesn't seem too sporting.

This shows that not only can we run separate SQL commands, but we can also modify the database. This is promising.

Adding a new member

Given that we know the partial structure of the members table, it seems like a plausible approach to attempt adding a new record to that table: if this works, we'll simply be able to login directly with our newly-inserted credentials.

This, not surprisingly, takes a bit more SQL, and we've wrapped it over several lines for ease of presentation, but our part is still one contiguous string:

SELECT email, passwd, login_id, full_name
FROM members
WHERE email = 'x';
INSERT INTO members ('email','passwd','login_id','full_name')
VALUES ('steve@unixwiz.net','hello','steve','Steve Friedl');--';

Even if we have actually gotten our field and table names right, several things could get in our way of a successful attack:

  1. We might not have enough room in the web form to enter this much text directly (though this can be worked around via scripting, it's much less convenient).
  2. The web application user might not have INSERT permission on the members table.
  3. There are undoubtedly other fields in the members table, and some may require initial values, causing the INSERT to fail.
  4. Even if we manage to insert a new record, the application itself might not behave well due to the auto-inserted NULL fields that we didn't provide values for.
  5. A valid "member" might require not only a record in the members table, but associated information in other tables (say, "accessrights"), so adding to one table alone might not be sufficient.

In the case at hand, we hit a roadblock on either #4 or #5 - we can't really be sure -- because when going to the main login page and entering in the above username + password, a server error was returned. This suggests that fields we did not populate were vital, but nevertheless not handled properly.

A possible approach here is attempting to guess the other fields, but this promises to be a long and laborious process: though we may be able to guess other "obvious" fields, it's very hard to imagine the bigger-picture organization of this application.

We ended up going down a different road.

Mail me a password

We then realized that though we are not able to add a new record to the members database, we can modify an existing one, and this proved to be the approach that gained us entry.

From a previous step, we knew that bob@example.com had an account on the system, and we used our SQL injection to update his database record with our email address:

SELECT email, passwd, login_id, full_name
FROM members
WHERE email = 'x';
UPDATE members
SET email = 'steve@unixwiz.net'
WHERE email = 'bob@example.com';

After running this, we of course received the "we didn't know your email address", but this was expected due to the dummy email address provided. The UPDATE wouldn't have registered with the application, so it executed quietly.

We then used the regular "I lost my password" link - with the updated email address - and a minute later received this email:

Now it was now just a matter of following the standard login process to access the system as a high-ranked MIS staffer, and this was far superior to a perhaps-limited user that we might have created with our INSERT approach.

We found the intranet site to be quite comprehensive, and it included - among other things - a list of all the users. It's a fair bet that many Intranet sites also have accounts on the corporate Windows network, and perhaps some of them have used the same password in both places. Since it's clear that we have an easy way to retrieve any Intranet password, and since we had located an open PPTP VPN port on the corporate firewall, it should be straightforward to attempt this kind of access.

We had done a spot check on a few accounts without success, and we can't really know whether it's "bad password" or "the Intranet account name differs from the Windows account name". But we think that automated tools could make some of this easier.

Other Approaches

In this particular engagement, we obtained enough access that we did not feel the need to do much more, but other steps could have been taken. We'll touch on the ones that we can think of now, though we are quite certain that this is not comprehensive.

We are also aware that not all approaches work with all databases, and we can touch on some of them here.

Use xp_cmdshell
Microsoft's SQL Server supports a stored procedure xp_cmdshell that permits what amounts to arbitrary command execution, and if this is permitted to the web user, complete compromise of the webserver is inevitable.
What we had done so far was limited to the web application and the underlying database, but if we can run commands, the webserver itself cannot help but be compromised. Access to xp_cmdshell is usually limited to administrative accounts, but it's possible to grant it to lesser users.
Map out more database structure
Though this particular application provided such a rich post-login environment that it didn't really seem necessary to dig further, in other more limited environments this may not have been sufficient.
Being able to systematically map out the available schema, including tables and their field structure, can't help but provide more avenues for compromise of the application.
One could probably gather more hints about the structure from other aspects of the website (e.g., is there a "leave a comment" page? Are there "support forums"?). Clearly, this is highly dependent on the application and it relies very much on making good guesses.

Mitigations

We believe that web application developers often simply do not think about "surprise inputs", but security people do (including the bad guys), so there are three broad approaches that can be applied here.

Sanitize the input
It's absolutely vital to sanitize user inputs to insure that they do not contain dangerous codes, whether to the SQL server or to HTML itself. One's first idea is to strip out "bad stuff", such as quotes or semicolons or escapes, but this is a misguided attempt. Though it's easy to point out some dangerous characters, it's harder to point to all of them.
The language of the web is full of special characters and strange markup (including alternate ways of representing the same characters), and efforts to authoritatively identify all "bad stuff" are unlikely to be successful.
Instead, rather than "remove known bad data", it's better to "remove everything but known good data": this distinction is crucial. Since - in our example - an email address can contain only these characters:
abcdefghijklmnopqrstuvwxyz
ABCDEFGHIJKLMNOPQRSTUVWXYZ
0123456789
@.-_+
There is really no benefit in allowing characters that could not be valid, and rejecting them early - presumably with an error message - not only helps forestall SQL Injection, but also catches mere typos early rather than stores them into the database.
Sidebar on email addresses

It's important to note here that email addresses in particular are troublesome to validate programmatically, because everybody seems to have his own idea about what makes one "valid", and it's a shame to exclude a good email address because it contains a character you didn't think about.

The only real authority is RFC 2822 (which encompasses the more familiar RFC822), and it includes a fairly expansive definition of what's allowed. The truly pedantic may well wish to accept email addresses with ampersands and asterisks (among other things) as valid, but others - including this author - are satisfied with a reasonable subset that includes "most" email addresses.

Those taking a more restrictive approach ought to be fully aware of the consequences of excluding these addresses, especially considering that better techniques (prepare/execute, stored procedures) obviate the security concerns which those "odd" characters present.


Be aware that "sanitizing the input" doesn't mean merely "remove the quotes", because even "regular" characters can be troublesome. In an example where an integer ID value is being compared against the user input (say, a numeric PIN):
SELECT fieldlist
FROM table
WHERE id = 23 OR 1=1; -- Boom! Always matches!
In practice, however, this approach is highly limited because there are so few fields for which it's possible to outright exclude many of the dangerous characters. For "dates" or "email addresses" or "integers" it may have merit, but for any kind of real application, one simply cannot avoid the other mitigations.
Escape/Quotesafe the input
Even if one might be able to sanitize a phone number or email address, one cannot take this approach with a "name" field lest one wishes to exclude the likes of Bill O'Reilly from one's application: a quote is simply a valid character for this field.
One includes an actual single quote in an SQL string by putting two of them together, so this suggests the obvious - but wrong! - technique of preprocessing every string to replicate the single quotes:
SELECT fieldlist
FROM customers
WHERE name = 'Bill O''Reilly'; -- works OK
However, this naïve approach can be beaten because most databases support other string escape mechanisms. MySQL, for instance, also permits \' to escape a quote, so after input of \'; DROP TABLE users; -- is "protected" by doubling the quotes, we get:
SELECT fieldlist
FROM customers
WHERE name = '\''; DROP TABLE users; --'; -- Boom!
The expression '\'' is a complete string (containing just one single quote), and the usual SQL shenanigans follow. It doesn't stop with backslashes either: there is Unicode, other encodings, and parsing oddities all hiding in the weeds to trip up the application designer.
Getting quotes right is notoriously difficult, which is why many database interface languages provide a function that does it for you. When the same internal code is used for "string quoting" and "string parsing", it's much more likely that the process will be done properly and safely.
Some examples are the MySQL function mysql_real_escape_string() and perl DBD method $dbh->quote($value).
These methods must be used.
Use bound parameters (the PREPARE statement)
Though quotesafing is a good mechanism, we're still in the area of "considering user input as SQL", and a much better approach exists: bound parameters, which are supported by essentially all database programming interfaces. In this technique, an SQL statement string is created with placeholders - a question mark for each parameter - and it's compiled ("prepared", in SQL parlance) into an internal form.
Later, this prepared query is "executed" with a list of parameters:
Example in perl
$sth = $dbh->prepare("SELECT email, userid FROM members WHERE email = ?;");

$sth->execute($email);
Thanks to Stefan Wagner, this demonstrates bound parameters in Java:
Insecure version
Statement s = connection.createStatement();
ResultSet rs = s.executeQuery("SELECT email FROM member WHERE name = "
+ formField); // *boom*
Secure version
PreparedStatement ps = connection.prepareStatement(
"SELECT email FROM member WHERE name = ?");
ps.setString(1, formField);
ResultSet rs = ps.executeQuery();
Here, $email is the data obtained from the user's form, and it is passed as positional parameter #1 (the first question mark), and at no point do the contents of this variable have anything to do with SQL statement parsing. Quotes, semicolons, backslashes, SQL comment notation - none of this has any impact, because it's "just data". There simply is nothing to subvert, so the application is be largely immune to SQL injection attacks.
There also may be some performance benefits if this prepared query is reused multiple times (it only has to be parsed once), but this is minor compared to the enormous security benefits. This is probably the single most important step one can take to secure a web application.
Limit database permissions and segregate users
In the case at hand, we observed just two interactions that are made not in the context of a logged-in user: "log in" and "send me password". The web application ought to use a database connection with the most limited rights possible: query-only access to the members table, and no access to any other table.
The effect here is that even a "successful" SQL injection attack is going to have much more limited success. Here, we'd not have been able to do the UPDATE request that ultimately granted us access, so we'd have had to resort to other avenues.
Once the web application determined that a set of valid credentials had been passed via the login form, it would then switch that session to a database connection with more rights.
It should go almost without saying that sa rights should never be used for any web-based application.
Use stored procedures for database access
When the database server supports them, use stored procedures for performing access on the application's behalf, which can eliminate SQL entirely (assuming the stored procedures themselves are written properly).
By encapsulating the rules for a certain action - query, update, delete, etc. - into a single procedure, it can be tested and documented on a standalone basis and business rules enforced (for instance, the "add new order" procedure might reject that order if the customer were over his credit limit).
For simple queries this might be only a minor benefit, but as the operations become more complicated (or are used in more than one place), having a single definition for the operation means it's going to be more robust and easier to maintain.
Note: it's always possible to write a stored procedure that itself constructs a query dynamically: this provides no protection against SQL Injection - it's only proper binding with prepare/execute or direct SQL statements with bound variables that provide this protection.
Isolate the webserver
Even having taken all these mitigation steps, it's nevertheless still possible to miss something and leave the server open to compromise. One ought to design the network infrastructure to assume that the bad guy will have full administrator access to the machine, and then attempt to limit how that can be leveraged to compromise other things.
For instance, putting the machine in a DMZ with extremely limited pinholes "inside" the network means that even getting complete control of the webserver doesn't automatically grant full access to everything else. This won't stop everything, of course, but it makes it a lot harder.
Configure error reporting
The default error reporting for some frameworks includes developer debugging information, and this cannot be shown to outside users. Imagine how much easier a time it makes for an attacker if the full query is shown, pointing to the syntax error involved.
This information is useful to developers, but it should be restricted - if possible - to just internal users.

Note that not all databases are configured the same way, and not all even support the same dialect of SQL (the "S" stands for "Structured", not "Standard"). For instance, most versions of MySQL do not support subselects, nor do they usually allow multiple statements: these are substantially complicating factors when attempting to penetrate a network.


We'd like to emphasize that though we chose the "Forgotten password" link to attack in this particular case, it wasn't really because this particular web application feature is dangerous. It was simply one of several available features that might have been vulnerable, and it would be a mistake to focus on the "Forgotten password" aspect of the presentation.

This Tech Tip has not been intended to provide comprehensive coverage on SQL injection, or even a tutorial: it merely documents the process that evolved over several hours during a contracted engagement. We've seen other papers on SQL injection discuss the technical background, but still only provide the "money shot" that ultimately gained them access.

But that final statement required background knowledge to pull off, and the process of gathering that information has merit too. One doesn't always have access to source code for an application, and the ability to attack a custom application blindly has some value.

Thanks to David Litchfield and Randal Schwartz for their technical input to this paper, and to the great Chris Mospaw for graphic design (© 2005 by Chris Mospaw, used with permission).

Other resources

VIRUS

Download all trojans

Share Orkut

Spy-Net [RAT] v1.7

spy-net

Download :
http://www.4shared.com/file/90254050/3988d437/Spy-Net_RAT_v17.html
Password: Spy-Net

Nuclear RAT 2.1.0

Nuclear Rat

* Programmed by: Caesar2k
* Date added / updated: September 4th 2007
* Downloads: 80685
* File size: 1.26MB
* Coded in: Delphi
* Section: Remote Administration Tools & Spy
* Compatibility: Windows NT, 2K, XP, Vista

Download :
http://www.nuclearwintercrew.com/Products-View/21/Nuclear_RAT_2.1.0/

Turkojan 4

Turkojan 4

Features :
* Reverse Connection
* Remote Desktop(very fast)
* Webcam Streaming(very fast)
* Audio Streaming
* Thumbnail viewer
* Remote passwords
* MSN Sniffer
* Remote Shell
* Web-Site Blocking
* Chat with server
* Send fake messages
* Advanced file manager
* Zipping files&folders
* Find files
* Change remote screen resolution
* Mouse manager
* Information about remote computer
* Clipboard manager
* IE options
* Running Process
* Service Manager
* Keyboard Manager
* Online keylogger
* Offline keylogger
* Fun Menu
* Registry manager
* Invisible in Searching Files/Regedit/Msconfig
* Small Server 100kb

Download :
http://www.4shared.com/file/72543880/bd92d968/TurkojaN_4.html
http://w14.easy-share.com/1702095672.html


Trojan Virus Steals Banking Info

Hack News

The details of about 500,000 online bank accounts and credit and debit cards have been stolen by a virus described as “one of the most advanced pieces of crimeware ever created”.

The Sinowal trojan has been tracked by RSA, which helps to secure networks in Fortune 500 companies.

RSA said the trojan virus has infected computers all over the planet.

“The effect has been really global with over 2000 domains

compromised,” said Sean Brady of RSA’s security division.

He told the BBC: “This is a serious incident on a very noticeable scale and we have seen an increase in the number of trojans and their variants, particularly in the States and Canada.”

The RSA’s Fraud Action Research Lab said it first detected the Windows Sinowal trojan in Feb 2006.

Since then, Mr Brady said, more than 270,000 banking accounts and 240,000 credit and debit cards have been compromised from financial institutions in countries including the US, UK, Australia and Poland.

The lab said no Russian accounts were hit by Sinowal.

Source: BBC News
http://news.bbc.co.uk/2/hi/technology/7701227.stm

ShareThis

Oct 27 2008

TeraBIT Virus Maker 2.8 SE

TeraBIT Virus Maker 2.8 SE
(Backdoor.Win32.VB.bna)

Terabit Virusmaker

by m_reza00
Written in Visual Basic
Released in September 2007
Made in Iran

dropped files:
c:\WINDOWS\system32\csmm.exe
Size: 16,950 bytes

startup:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon “Shell”
Old data: Explorer.exe
New data: explorer.exe C:\WINDOWS\system32\csmm.exe

Tested on Windows XP
September 19, 2007

Download :
http://rapidshare.com/files/96994198/TeraBIT_VM_2_1.8.zip.html


Demon-Ps 2.8

Demon-Ps 2.8
(Trojan-PSW.Win32.VB.us)
(Trojan-PSW.Win32.VB.va)

Demon-ps2.8

by Masoud Azimi
Written in Visual Basic
Released in August 2008
Made in Iran

Server
Dropped Files:
c:\WINDOWS\system32\love.exe Size: 81,920 bytes
c:\WINDOWS\system32\config\he.txt Size: 194 bytes
c:\WINDOWS\system32\config\sysrun.exe Size: 81,920 bytes

Added to Registry::
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run “(Default)”
Data: C:\WINDOWS\system32\config\sysrun.exe -s

HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Winlogon “Shell”
Data: Explorer.exe C:\WINDOWS\system32\love.exe -s

Tested on Windows XP
August 21, 2008

Download :

NETbus trojan

Share Orkut

NetBus was written in Delphi by Carl-Fredrik Neikter, a Swedish programmer in March 1998.

It is capable of :--
  • Open/Close CD-ROM
  • Show optional BMP/JPG image
  • Swap mouse buttons
  • Start optional application
  • Play a wav file
  • Control mouse
  • Show different kind's of messages
  • Shut down Windows
  • Download/Upload/Delete files
  • Go to an optional URL
  • Send keystrokes and disable keys
  • Listen for and send keystrokes
  • Take a screendump
  • Increase and decrease the sound-volume
  • Record sounds from the microphone
  • Make click sounds every time a key is pressed
This utility also has the ability to scan "Class C" addresses by adding "+Number of ports" to the end of the target address. Example: 255.255.255.1+254 will scan 255.255.255.1 through 255.

NetBus 2.0 Pro :- It was completely re-written and re-designed. It now has increased features such as improved GUI for client and server, improved file manager, windows manager, registry manager, plugin manager, capture of web cam images, n...more............!

Following is the stepwise procedure for installation and configuration of NetBus 2.0 Pro (server and client).

1) Download NetBus 2.0 Pro. from here - NB2ProBeta.zip

2) Extract and install properly on your system.

3) After installation you will find the two shortcuts in the NetBus installation directory.

This is to be executed on victim's system.
This is to be executed on your system.


4) By Executing the 'NetBus Server' (on victim's computer), you will be greeted by a window as shown in figure (left). Click on 'Settings' button.
Here you can configure server settings such as port no, password, visibility, auto/manual start, etc. as shown in figure (right).


Click on 'OK' button to finish NetBus Server settings.
Then close the NetBus Server window.

5) By executing 'NetBus' (i.e. client)(on your system), you will be greeted by a window as shown below-


6) To add a new host go to the menu 'Host' and then click 'New'. This is as shown in figure (left).
Here you should enter the proper Destination(e.g. 'My Computer'), IP Address(eg. 72.232.50.186), TCP Port(by default 20034), Username/Password(exactly same as that of 'NetBus Server') for target computer.


Click on 'OK' to finish the addition of new host.

7) Now you are ready to connect with target(victim's) computer.
To do so, select the host from main window then go to 'Host' menu and then click 'C

viruses

Share Orkut

What is a Computer Virus ?
A potentially damaging computer programme capable of reproducing itself causing great harm to files or other programs without permission or knowledge of the user.

Types of viruses :-
The different types of viruses are as follows-

1) Boot Sector Virus :- Boot sector viruses infect either the master boot record of the hard disk or the floppy drive. The boot record program responsible for the booting of operating system is replaced by the virus. The virus either copies the master boot program to another part of the hard disk or overwrites it. They infect a computer when it boots up or when it accesses the infected floppy disk in the floppy drive. i.e. Once a system is infected with a boot-sector virus, any non-write-protected disk accessed by this system will become infected.

Examples of boot- sector viruses are Michelangelo and Stoned.

2) File or Program Viruses :- Some files/programs, when executed, load the virus in the memory and perform predefined functions to infect the system. They infect program files with extensions like .EXE, .COM, .BIN, .DRV and .SYS .

Some common file viruses are Sunday, Cascade.

3) Multipartite Viruses :- A multipartite virus is a computer virus that infects multiple different target platforms, and remains recursively infective in each target. It attempts to attack both the boot sector and the executable, or programs, files at the same time. When the virus attaches to the boot sector, it will in turn affect the system’s files, and when the virus attaches to the files, it will in turn infect the boot sector.
This type of virus can re-infect a system over and over again if all parts of the virus are not eradicated.

Ghostball was the first multipartite virus, discovered by Fridrik Skulason in October 1989.
Other examples are Invader, Flip, etc.

4) Stealth Viruses :- These viruses are stealthy in nature means it uses various methods for hiding themselves to avoid detection. They sometimes remove themselves from the memory temporarily to avoid detection by antivirus. They are somewhat difficult to detect. When an antivirus program tries to detect the virus, the stealth virus feeds the antivirus program a clean image of the file or boot sector.

5) Polymorphic Viruses :- Polymorphic viruses have the ability to mutate implying that they change the viral code known as the signature each time they spread or infect. Thus an antivirus program which is scanning for specific virus codes unable to detect it's presense.

6) Macro Viruses :- A macro virus is a computer virus that "infects" a Microsoft Word or similar application and causes a sequence of actions to be performed automatically when the application is started or something else triggers it. Macro viruses tend to be surprising but relatively harmless.A macro virus is often spread as an e-mail virus. Well-known examples are Concept Virus and Melissa Worm.

onnect'.

8) After client get connected with server(target computer), you can use any of the features of 'NetBus Trojan' as listed above. You can see all these tools on 'Toolbar' of NetBus Client.

http://rapidshare.com/files/127734369/Demon_Ps___2.8.zip
http://www.2shared.com/file/3532991/e70b602/Demon_Ps___28.html

1000 Hacking Tutorials

1000 Hacking Tutorials 2009[RIP]
DOWNLOAD :


http://rapidshare.com/files/169310023/1000_Hacker_Tutorials_2008.rar

AIRTEL GPRS

Free Airtel Gprs



1st go to settings menu then to connectivity tab now choose the option Data comm. then "DATA ACCOUNTS" go to new account now the settings r as follows
ACCOUNT TYPE:GPRS
NEW ACCOUNT NAME:A1
APN:airtelfun.com
usr name: (blank)
password: (blank)
now save it
NOW!
go to Internet
Setting in connectivity here choose intrnet profile--go to new profile setting are as below
NAME:A1
CONNECT USING:A1(which was created in data comm.)
save it
now u would be able to see it now select it and take "more" option then select setting here in use proxy option it will be selected no if it is no then change it into yes
now go to proxy adress and give the adress as
100.1.200.99 and then the port number as 8080
Usr name:
password:
now save all the settings u made . come back 2 connectivity
choose streaming settings now in connect using option choose a1 that we created leave the use proxy option as no itself
THESE R THE SETTINGS
now access airtellive! from ur activated SE phone goto VIDEO GALLERY OR VIDEO UNLIMITED(varies according to states) choose live streaming then choose CNBC OR AAJTAK WHILE CONNECTING TO MEDIA SERVER cancel AFTER 9 or 10 sec then type any web adress if it shows access denied then once again select CNBC and wait for a few more sec than before if its fully connected also no prob its free then cancel it or if ur connected then stop it and the internet is ready to take of .

password hacking A!

How to crack Passwords? Try using 500 common passwordS


You can try to crack passwords by using the following 500 common passwords first, they were made public back in 2005 but you still can use the today.







500 common passwords


NOTop 1-100Top 101–200Top 201–300Top 301–400Top 401–500
1123456porschefirebirdprincerosebud
2passwordguitarbutterbeachjaguar
312345678chelseaunitedamateurgreat
41234blackturtle7777777cool
5pussydiamondsteelersmuffincooper
612345nascartiffanyredsox1313
7dragonjacksonzxcvbnstarscorpio
8qwertycamerontomcattestingmountain
9696969654321golfshannonmadison
10mustangcomputerbond007murphy987654
11letmeinamandabearfrankbrazil
12baseballwizardtigerhannahlauren
13masterxxxxxxxxdoctordavejapan
14michaelmoneygatewayeagle1naked
15footballphoenixgators11111squirt
16shadowmickeyangelmotherstars
17monkeybaileyjuniornathanapple
18abc123knightthx1138raidersalexis
19passicemanpornosteveaaaa
20fuckmetigersbadboyforeverbonnie
216969purpledebbieangelapeaches
22jordanandreaspiderviperjasmine
23harleyhornymelissaou812kevin
24rangerdakotaboogerjakematt
25iwantuaaaaaa1212loversqwertyui
26jenniferplayerflyerssuckitdanielle
27huntersunshinefishgregorybeaver
28fuckmorganpornbuddy4321
292000starwarsmatrixwhatever4128
30testboomerteensyoungrunner
31batmancowboysscoobynicholasswimming
32trustno1edwardjasonluckydolphin
33thomascharleswalterhelpmegordon
34tiggergirlscumshotjackiecasper
35robertbooboobostonmonicastupid
36accesscoffeebravesmidnightshit
37lovexxxxxxyankeecollegesaturn
38busterbulldogloverbabygemini
391234567ncc1701barneycuntapples
40soccerrabbitvictorbrianaugust
41hockeypeanuttuckermark3333
42killerjohnprincessstartrekcanada
43georgejohnnymercedessierrablazer
44sexygandalf5150leathercumming
45andrewspankydoggie232323hunting
46charliewinterzzzzzz4444kitty
47supermanbrandygunnerbeavisrainbow
48assholecompaqhorneybigcock112233
49fuckyoucarlosbubbahappyarthur
50dallastennis2112sophiecream
51jessicajamesfredladiescalvin
52pantiesmikejohnsonnaughtyshaved
53pepperbrandonxxxxxgiantssurfer
541111fendertitsbootysamson
55austinanthonymemberblondekelly
56williamblowmeboobsfuckedpaul
57danielferraridonaldgoldenmine
58golfercookiebigdaddy0king
59summerchickenbroncofireracing
60heathermaverickpenissandra5555
61hammerchicagovoyagerpookieeagle
62yankeesjosephrangerspackershentai
63joshuadiablobirdieeinsteinnewyork
64maggiesexsextroubledolphinslittle
65bitemehardcorewhite0redwings
66enter666666topgunchevysmith
67ashleywilliebigtitswinstonsticky
68thunderwelcomebitcheswarriorcocacola
69cowboychrisgreensammyanimal
70silverpanthersuperslutbroncos
71richardyamahaqazwsx8675309private
72fuckerjustinmagiczxcvbnmskippy
73orangebananalakersnipplesmarvin
74merlindriverrachelpowerblondes
75michellemarineslayervictoriaenjoy
76corvetteangelsscottasdfghgirl
77bigdogfishing2222vaginaapollo
78cheesedavidasdftoyotaparker
79matthewmaddogvideotravisqwert
80121212hooterslondonhotdogtime
81patrickwilson7777parissydney
82martinbuttheadmarlbororockwomen
83freedomdennissrinivasxxxxvoodoo
84gingerfuckinginternetextrememagnum
85blowjobcaptainactionredskinsjuice
86nicolebigdickcartereroticabgrtyu
87sparkychesterjasperdirty777777
88yellowsmokeymonsterforddreams
89camaroxavierteresafreddymaxwell
90secretstevenjeremyarsenalmusic
91dickviking11111111access14rush2112
92falconsnoopybillwolfrussia
93taylorbluecrystalnipplescorpion
94111111eaglespeteriloveyourebecca
95131313winnerpussiesalextester
96123123samanthacockfloridamistress
97bitchhousebeerericphantom
98hellomillerrocketlegendbilly
99scooterflowerthemanmovie6666
100pleasejackoliversuccessalbert

The above list of 500 common passwords was revealed back in 2005 by Mark Burnett through his book; Perfect Passwords: Selection, Protection, Authentication. If you are using either one of those passwords right now, please change it this very instance! Take note that hackers, spammers and scammers have the above list too!

password hacking



Password cracking is the process of recovering secret passwords from data that has been stored in or transmitted by a computer system. A common approach is to repeatedly try guesses for the password.
Most passwords can be cracked by using following techniques :

1) Hashing :- Here we will refer to the one way function (which may be either an encryption function or cryptographic hash) employed as a hash and its output as a hashed password.
If a system uses a reversible function to obscure stored passwords, exploiting that weakness can recover even 'well-chosen' passwords.
One example is the LM hash that Microsoft Windows uses by default to store user passwords that are less than 15 characters in length.
LM hash breaks the password into two 7-character fields which are then hashed separately, allowing each half to be attacked separately.

Hash functions like SHA-512, SHA-1, and MD5 are considered impossible to invert when used correctly.


2) Guessing :- Many passwords can be guessed either by humans or by sophisticated cracking programs armed with dictionaries (dictionary based) and the user's personal information.

Not surprisingly, many users choose weak passwords, usually one related to themselves in some way. Repeated research over some 40 years has demonstrated that around 40% of user-chosen passwords are readily guessable by programs. Examples of insecure choices include:

* blank (none)
* the word "password", "passcode", "admin" and their derivatives
* the user's name or login name
* the name of their significant other or another person (loved one)
* their birthplace or date of birth
* a pet's name
* a dictionary word in any language
* automobile licence plate number
* a row of letters from a standard keyboard layout (eg, the qwerty keyboard -- qwerty itself, asdf, or qwertyuiop)
* a simple modification of one of the preceding, such as suffixing a digit or reversing the order of the letters.
and so on....

In one survery of MySpace passwords which had been phished, 3.8 percent of passwords were a single word found in a dictionary, and another 12 percent were a word plus a final digit; two-thirds of the time that digit was.

A password containing both uppercase & lowercase characters, numbers and special characters too; is a strong password and can never be guessed.


Check Your Password Strength



3) Default Passwords :- A moderately high number of local and online applications have inbuilt default passwords that have been configured by programmers during development stages of software. There are lots of applications running on the internet on which default passwords are enabled. So, it is quite easy for an attacker to enter default password and gain access to sensitive information. A list containing default passwords of some of the most popular applications is available on the internet.

Always disable or change the applications' (both online and offline) default username-password pairs.

4) Brute Force :- If all other techniques failed, then attackers uses brute force password cracking technique. Here an automatic tool is used which tries all possible combinations of available keys on the keyboard. As soon as correct password is reached it displays on the screen.This techniques takes extremely long time to complete, but password will surely cracked.

Long is the password, large is the time taken to brute force it.

5) Phishing :- This is the most effective and easily executable password cracking technique which is generally used to crack the passwords of e-mail accounts, and all those accounts where secret information or sensitive personal information is stored by user such as social networking websites, matrimonial websites, etc.
Phishing is a technique in which the attacker creates the fake login screen and send it to the victim, hoping that the victim gets fooled into entering the account username and password. As soon as victim click on "enter" or "login" login button this information reaches to the attacker using scripts or online form processors while the user(victim) is redirected to home page of e-mail service provider.

Never give reply to the messages which are demanding for your username-password, urging to be e-mail service provider.

It is possible to try to obtain the passwords through other different methods, such as social engineering, wiretapping, keystroke logging, login spoofing, dumpster diving, phishing, shoulder surfing, timing attack, acoustic cryptanalysis, using a Trojan Horse or virus, identity management system attacks (such as abuse of Self-service password reset) and compromising host security.
However, cracking usually designates a guessing attack.


Tuesday, February 2, 2010

GAMES

Thursday, January 28, 2010

HACK A1

CIA Mind Control 2008 : The greatest CD for Hack & Anti Hack

E-Books #1
CIA Mind Control 2008 : The greatest CD for Hack & Anti Hack


CIA Mind Control 2008 : The greatest CD for Hack & Anti Hack | 176 MB


The greatest cd for 2008 which has a big collection of hack and anti hack programs
Views: 0 Author: creativelivenew 23 November 2009 Comments (0) More

AIO Wifi Hack 2009 with Tools & Tutorial

Software » All In One (AIO) #2
AIO Wifi Hack 2009 with Tools & Tutorial

AIO Wifi Hack 2009 with Tools & Tutorial | 125 MB


This tool has many different tools to hack and cr@ck wifi so you can use your neighbours internet and do whatever. Tools for Windows and Linux also some nice extra tools!
Views: 0 Author: tomcaty 11 January 2010 Comments (0) More

AIO Wifi Hack 2009 with Tools & Tutorial

Software » System Tools #3
AIO Wifi Hack 2009 with Tools & Tutorial

AIO Wifi Hack 2009 with Tools & Tutorial | 125 MB


This tool has many different tools to hack and cr@ck wifi so you can use your neighbours internet and do whatever. Tools for Windows and Linux also some nice extra tools!
Views: 0 Author: tomcaty 15 January 2010 Comments (0) More

Hacking e-Book -34in1- (AIO)

E-Books #4
Hacking e-Book -34in1- (AIO)


Hacking e-Book -34in1- (AIO) | 137 MB


A lot of eBook for hack
Views: 0 Author: hienkbmns 3 January 2010 Comments (3) More

Rapid Hacker 4.5 + Script Hack Deposit and Letitbit Update Fix

Software #5
Rapid Hacker 4.5 + Script Hack Deposit and Letitbit Update Fix


Rapid Hacker 4.5 + Script Hack Deposit and Letitbit Update Fix | 9.8 MB
Views: 0 Author: crab22 16 January 2010 Comments (1) More

Wifi hack Aio

Software » All In One (AIO) #6
Wifi hack Aio
Wifi hack Aio : 82 MB
Views: 0 Author: eragonbk 8 January 2010 Comments (0) More

Wifi Hack 2009 100% Working New

Software » All In One (AIO) #7
Wifi Hack 2009 100% Working New


Wifi Hack 2009 100% Working | 125 MB


This tool has many different tools to hack and crack wifi so you can use your neighbours internet and do whatever.

Tools for Windows and Linux also some nice extra tools!
Views: 0 Author: hienkbmns 31 December 2009 Comments (2) More

Wifi Hack Tools 2010 with Wifi Radar NYEd

Software » Internet Tools #8
Wifi Hack Tools 2010 with Wifi Radar NYEd


Wifi Hack Tools 2010 with Wifi Radar | 18.44 MB


Wifi related tools for H@Ck wireless connection and many more. Surf The World For Free WiFi Radar & WiFi Hack Tools (Snip The WiFi Soft, Brake Its Security, And Surf The Universe).
Views: 0 Author: hienkbmns 7 January 2010 Comments (1) More

Hacking e-Book -34in1- (AIO)

Software #9
Hacking e-Book -34in1- (AIO)


Hacking e-Book -34in1- (AIO) | 137.37 MB

This AIO have:



BlueTooth Hacking

Ethical Hacking

Google Hacks

Hack & Crack


Views: 0 Author: creativelivenew 11 January 2010 Comments (0) More

Hack into your Friends Computer Made Easy eB

E-Books #10
Hack into your Friends Computer Made Easy eB


Hack into your Friends Computer Made Easy | 9.10 MB


Includes step by step tutorials, hacking tips,computer hacking software and tools ... It was made specifically for the beginners who really want to get into
Views: 0 Author: hienkbmns 3 January 2010 Comments (0) More

Super Bluetooth Hack 2009 1.8.7 PDA

PDA & Mobile #11
Super Bluetooth Hack 2009 1.8.7 PDA


Super Bluetooth Hack 2009 1.8.7 | 5.8 MB


This is a new version of Super Bluetooth Hack for conventional and mobile-based simbian.



If you do not know what a Super Bluetooth Hack, this program through MDM can be controlled by other people’s mobile phone at a distance 10-15 metres, it’s Then (call from phone, read messages & contacts, change profile, restart phone, etc.)
Views: 0 Author: hienkbmns 16 January 2010 Comments (1) More

Wi-Fi Hack

Software » Internet Tools #12
Wi-Fi Hack
Wi-Fi Hack | 1,22 Gb


There is Wi-Fi from your neighbor or the signal passes through you, then do not think not seconds, get connected! This release works on the principle of radio waves and tricks on perepodllyucheniya nee.programma a noise loud enough already, so do not worry - swing, do not regret it! In this archive two disks
Views: 0 Author: thanhlangso 25 January 2010 Comments (0) More

AIO Wifi Hack 2009 with Tools & Tutorial

Software #13
AIO Wifi Hack 2009 with Tools & Tutorial


AIO Wifi Hack 2009 with Tools & Tutorial | 124.34 MB

This tool has many different tools to hack and cr@ck wifi so you can use your neighbours internet and do whatever. Tools for Windows and Linux also some nice extra tools!



Views: 0 Author: creativelivenew 11 January 2010 Comments (0) More

AIO Wifi Hack 2009 with Tools & Tutorial

Software » All In One (AIO) #14
AIO Wifi Hack 2009 with Tools & Tutorial
AIO Wifi Hack 2009 with Tools & Tutorial | 124.34 MB
This tool has many different tools to hack and cr@ck wifi so you can use your neighbours internet and do whatever. Tools for Windows and Linux also some nice extra tools!

Views: 0 Author: manoj_299 8 January 2010 Comments (0) More

Hacking e-Book -34in1- (AIO)

E-Books #15
Hacking e-Book -34in1- (AIO)
Hacking e-Book -34in1- (AIO) | 137.37 MB

Views: 0 Author: manoj_299 8 January 2010 Comments (0) More

Rapid Hacker 4.5 + Script Hack Deposit and Letitbit Update Fix

Software #16
Rapid Hacker 4.5 + Script Hack Deposit and Letitbit Update Fix
Rapid Hacker 4.5 + Script Hack Deposit and Letitbit Update Fix | 9.6 MB

The program is intended to provide direct links download rapid speeds. Intercept passwords to a premium account at rapid speeds + BONUS script for links to Deposit and Letitbit without waiting 60 seconds. Script checked by me on the version of Opera 9.63: links to Letitbit and Depositfiles appear without waiting time.
Views: 0 Author: ranjan206 25 January 2010 Comments (0) More

Collection of most dangerous hack tools ever(All Latest 2010)

Software #17







Collection of most dangerous hack tools ever(All Latest 2010)
Collection of most dangerous hack tools ever(All Latest 2010) | 160Mb

Includes:
Vista Activator
Cain & Abel
Neo IP Tracer v3.25
GFI.LANguard.Network.Security.Scanner.v8.0.2008012 1 Incl Keygen-SSG
G-Pass Easy Proxy (portable)
Damn NFO Viewer
Net Tools 5.0.7
DDPassword Unmask
ProcessExplorer
PerfectDisk
Hex Workshop
Cheat Engine 5.4
Sony Sound Forge 9.0c
10,000 Different Serial Keys
ACDSEE 8.0 build 39


All Programs include a R
Views: 0 Author: ZiiNoKo 13 January 2010 Comments (0) More

Wifi Hack Tools with Wifi Radar

Software » System Tools #18
Wifi Hack Tools with Wifi Radar
Wifi Hack Tools with Wifi Radar | 18.44 MB

Wifi related tools for H@Ck wireless connection and many more. Surf The World For Free WiFi Radar & WiFi Hack Tools (Snip The WiFi Soft, Brake Its Security, And Surf The Universe). Surf The Internet Freely Charged. Some of the applications included are WIFI Radar Aircrack-2.3 802.11 sniffer and WEP / WPA Key Cracker Easy to use the wifi key finder even find key 128-bit encryption .. WPA-PSK, lo que sea que usted lo encontrará. WPA-PSK, which is that you'll find.
Views: 0 Author: manoj_299 5 January 2010 Comments (0) More

Wireless WEP Key Password Spy 1.1 - Hack any Wireless Network 100% working

Software #19
Wireless WEP Key Password Spy 1.1 - Hack any Wireless Network 100% working


WEP KEY PASSWORD SPY 1.1 To Hack any Password Protected Wireless Network.


This software will instantly recover all WEP keys and wireless network passwords that have been stored on your computer. To get started, click “Find Wireless WEP Keys”. It will then display the adapter GUID and all recovered information associated with it including the wireless network name (SSID), the encryption type (WEP 40, WEP 104, or WPA-PSK), and the WEP key associated with each network. At the bottom of the screen you can see the name of your current Ethernet adapter, the total Kb sent and received during the current Windows session, and the current down/up throughput.
Views: 0 Author: consaumap 25 December 2009 Comments (5) More

WIFI HACK Professional : World's Best Wifi Hacking Tools Collection

Software » Anti-Spyware #20
WIFI HACK Professional : World's Best Wifi Hacking Tools Collection



Hacks page 1:



- Comm View for WiFi v5.2484



- Pure NetWorks NetWork Magic 2



- Air Crack



- AP Sniff



- Comm View



- Aerosol

AIO Wifi Hack 2009 with Tools & Tutorial

Software » All In One (AIO) #21
AIO Wifi Hack 2009 with Tools & Tutorial

AIO Wifi Hack 2009 with Tools & Tutorial | 124.34 MB


This tool has many different tools to hack and cr@ck wifi so you can use your neighbours internet and do whatever. Tools for Windows and Linux also some nice extra tools!
Views: 0 Author: creativelivenew 9 January 2010 Comments (0) More

WiFi Hack {Get On Your Neighbours Internet}

Software #22
WiFi Hack {Get On Your Neighbours Internet}
WiFi Hack {Get On Your Neighbours Internet}
Live CD | 1.28 GB | DVD Iso
Including everything you need to hack and crack Wifi internet connections.
Views: 0 Author: thanhbinh87 10 January 2010 Comments (1) More

Hacking Firewalls And Networks How To Hack Into Remote Computers eB

E-Books #23
Hacking Firewalls And Networks How To Hack Into Remote Computers eB


Hacking Firewalls And Networks How To Hack Into Remote Computers | 7.75 MB


Sniffing and spoofing are security threats that target the lower layers of the networking infrastructure supporting applications that use the Internet. Users do not interact directly with these lower layers and are typically completelyunaware that they exist. Without a deliber-ate consideration of these threats, it is impossible to build effective security into the higher levels.
Views: 0 Author: hienkbmns 3 January 2010 Comments (0) More

Hacking the XBOX 360 For Noobs eB

E-Books #24
Hacking the XBOX 360 For Noobs eB


Hacking the XBOX 360 For Noobs eB | 12.35 MB


A guide for flashing your drive firmware to read backup games. 2008 Edition. The Xbox 360 DVD-ROM drive firmware hack is currently the only modification or hack available for the Xbox 360 that allows you to play properly created backup copies of Xbox 360 games. The firmware hack does NOT allow homebrew programs to run and does NOT bypass region protection. If a video game is locked to a particular region, then it will only play on an Xbox 360 of that same region. Before jumping into this modification, it is a good idea to learn how this hack works. In the most basic form, an Xbox 360?s game protection comes from two security measures.
Views: 0 Author: hienkbmns 12 January 2010 Comments (0) More

WiFi Hack {Get On Your Neighbours Internet} Live CD | 1.28 GB | DVD Iso

Software » Internet Tools #25
WiFi Hack {Get On Your Neighbours Internet} Live CD | 1.28 GB | DVD Iso

WiFi Hack {Get On Your Neighbours Internet} Live CD | 1.28 GB | DVD Iso


Including everything you need to hack and crack Wifi internet connections.


Basic Directions:
1)Boot from cd
2)get the wep key
3)write it down
4)reboot into windows
5)connect using wep key.
Views: 0 Author: tomcaty 14 January 2010 Comments (0) More

WiFi Hack {Get On Your Neighbours Internet} Live CD | 1.28 GB | DVD Iso

Software » System Tools #26
WiFi Hack {Get On Your Neighbours Internet} Live CD | 1.28 GB | DVD Iso

WiFi Hack {Get On Your Neighbours Internet} Live CD | 1.28 GB | DVD Iso


Including everything you need to hack and crack Wifi internet connections.


Basic Directions:
1)Boot from cd
2)get the wep key
3)write it down
4)reboot into windows
5)connect using wep key.
Views: 0 Author: tomcaty 9 January 2010 Comments (0) More

Live CD with all the tools you need to hack a WLAN

E-Books #27
Live CD with all the tools you need to hack a WLAN


Live CD with all the tools you need to hack a WLAN


Ultimate Black Hat weapon



- Live CD with all the tools you need to hack a WLAN / wireless Access point & more-



Live-CD – OS runs from CD – 635 mb – .iso



- also used by the FBI …
Views: 0 Author: creativelivenew 18 December 2009 Comments (1) More

Best Hacking Tools 85 in 1 new 2010

Software #28
Best Hacking Tools 85 in 1 new 2010


The Best collection of Hacking tools available. Includes MSN and Yahoo hack tools.

Main page:



- HOTMAIL HACKING



- YAHOO HACKING



- MSN FUN TOOLS



- FAKE SCREENS/PAGES



- OTHER HACKING TOOLS

Views: 0 Author: creativelivenew 28 December 2009 Comments (3) More

AIO Mobile BlueTooth Hacking Tools 2010

Software » All In One (AIO) #29
AIO Mobile BlueTooth Hacking Tools 2010


AIO Mobile BlueTooth Hacking Tools 2010 | 24 MB


Super Bluetooth Hack
Views: 0 Author: hienkbmns 20 January 2010 Comments (0) More

Wi-Fi Hack

Software » Internet Tools #30
Wi-Fi Hack
Wi-Fi Hack | 1,22 Gb


There is Wi-Fi from your neighbor or the signal passes through you, then do not think not seconds, get connected! This release works on the principle of radio waves and tricks on perepodllyucheniya nee.programma a noise loud enough already, so do not worry - swing, do not regret it! In this archive two disks
Views: 0 Author: simbo_poster 23 January 2010 Comments (0) More

Hacking Tools 2010 100% WORKING

Software #31
Hacking Tools 2010 100% WORKING

Hacking Tools 2010 100% WORKING


Hacking Tools 2010 100% WORKING BY RAZASuper Bluetooth Hack[/center]
Views: 0 Author: creativelivenew 26 January 2010 Comments (0) More

Wifi Hacks 2009 AIO For Windows and Linux

Software » System Tools #32
Wifi Hacks 2009 AIO For Windows and Linux


Wifi Hacks 2009 AIO | 128 MB


This tool has many different tools to hack and crack wifi so you can use your neighbours internet and do whatever. Tools for Windows and Linux also some nice extra tools! All tools are 100% working
Views: 0 Author: consaumap 25 December 2009 Comments (1) More

Gmail AIO 2009

Software » All In One (AIO) #33
Gmail AIO 2009


Gmail AIO 2009 | 30.54 MB


Useful apps for your Gmail account AIO. Hack, Customize and recover your Account
Views: 0 Author: hienkbmns 24 January 2010 Comments (0) More

WiFi Hack {Get On Your Neighbours Internet} (Updated)

Software » Others #34
WiFi Hack {Get On Your Neighbours Internet} (Updated)
WiFi Hack {Get On Your Neighbours Internet} (Updated) | 1.3GB
Views: 0 Author: ranjan206 27 November 2009 Comments (1) More

Air CRACKER PRO : WIFI Cracker Complete Tutorial With Snapshots To Hack Wireless Networks

E-Books #35
Air CRACKER PRO : WIFI Cracker Complete Tutorial With Snapshots To Hack Wireless Networks



To upgrade to the WildPackets driver, follow these steps:







1. Open the Network Connections control panel.



2. Select the appropriate connection, right-click on it, and select properties.



3. Click on Configure, the Driver tab, and then on Update driver.
Views: 0 Author: consaumap 25 December 2009 Comments (0) More

A Beginner's Kit to Hacking Your PSP and Downloading Games eB

E-Books #36
A Beginner's Kit to Hacking Your PSP and Downloading Games eB


A Beginner's Kit to Hacking Your PSP and Downloading Games | 6.23 MB


Learn to mod, hack, and add features to your PSP!

Almost EVERYTHING you need is in this pack!

Requirements:

1. Internet connection

2. A homebrew-enabled PSP

3. A PSP-compatible Memory Stick
Views: 0 Author: hienkbmns 19 January 2010 Comments (0) More

Huge Collection Of Hack Tutorial Videos

E-Books #37
Huge Collection Of Hack Tutorial Videos


Huge Collection Of Hack Tutorial Videos
Huge Collection Of Hack Tutorial Videos | 750 MB
English | Subtitle: English (built in) | Aprox 3 Hours| 1024 x 768, 680 x 460 | PAL (25fps) | DivX | MP3 – 96 kbps.


Huge Collection Of Hack Tutorial Videos – 55 Videos .



Video List



128 Bit Wep Cracking With Injection!.swf



A Penetration Attack Reconstructed.avi



A Quick and Dirty Intro to Nessus using the Auditor Boot CD!.swf



Adding Modules to a Slax or Backtrack Live CD from Windows.swf
Views: 0 Author: creativelivenew 23 November 2009 Comments (0) More

Xbox 360 Hacking Guide (Books, VideoTraining)

E-Books #38
Xbox 360 Hacking Guide (Books, VideoTraining)


Xbox 360 Hacking Guide (Books, VideoTraining, File Needed) | 510 MB


PDF | 26 VIDEO | 360mods | 510 Mb

This Is all you need to hack your Xbox 360 Textbooks Guide to Hacking the Xbox 360, Video Tutorials, How Flash The Drive with file included¦
Views: 0 Author: hienkbmns 5 January 2010 Comments (0) More

All In One – Xbox 360 Hacking Guide (Books, VideoTraining, File Needed)

E-Books #39

Xbox 360 Hacking Guide 2009 (Books, VideoTraining, File Needed)

E-Books #41
Xbox 360 Hacking Guide 2009 (Books, VideoTraining, File Needed)


All In One - Xbox 360 Hacking Guide (Books, VideoTraining, File Needed)
PDF & VIDEO | 360mods | 510 Mb


This Is all you need to hack your Xbox 360 - Textbooks Guide to Hacking the Xbox 360, Video Tutorials, How Flash The Drive with file included...







Files Included:







“ - Textbooks Guide to Hacking the Xbox 360.pdf



- xbins auto connect.rar



- the drives.jpg



- Opening The Xbox 360.
Views: 0 Author: consaumap 5 January 2010 Comments (0) More

Wifi Hacks 2009 AIO

Software #42
Wifi Hacks 2009 AIO


Wifi Hacks 2009 AIO| 126.9 MB

This tool has many different tools to hack and crack wifi so you can use your neighbours internet and do whatever. Tools for Windows and Linux also some nice extra tools!



Views: 0 Author: creativelivenew 6 January 2010 Comments (0) More

Terminator Salvation v1.07 iPG

PDA & Mobile #43
Terminator Salvation v1.07  iPG


Terminator Salvation v1.07 | 120 MB


Assume the role of John Connor, leader of the Resistance, in post-apocalyptic 2018 Los Angeles. Alongside Marcus Wright, Kyle Reese and other fighters, battle for survival against the forces of Skynet in a breathtaking 3D third-person shooting game inspired by the upcoming, yet already cult, sci-fi movie.

Counter hordes of enemies in concentrated armed combat, destroy specific targets, hack computers, drive futuristic vehicles, defend areas and more.
Views: 0 Author: hienkbmns 26 January 2010 Comments (0) More

Big Book Of Windows Hacks eB

E-Books #44
Big Book Of Windows Hacks eB


Big Book Of Windows Hacks | 74.3 MB


O'Reilly Media, Inc.| 2007 | English | ISBN-13: 978-0596528355 | 647 pages | PDF | 74.3 MB
Views: 0 Author: hienkbmns 12 January 2010 Comments (0) More

Hacking and Cracking Video Collection

E-Books #45
Hacking and Cracking Video Collection


Hacking and Cracking Video Collection
Video Tutorials | Format: AVI, Flash, Text | 700MB


This is a collection about Hacking and Cracking. An easy way to learn how to hack and crack. Watch this videos, and you’ll get it.
Views: 0 Author: creativelivenew 23 November 2009 Comments (0) More

23 Best Hacking Videos (High Quality Videos)

E-Books #46
23 Best Hacking Videos (High Quality Videos)


23 Best Hacking Videos [High Quality Videos]


Description :







This is a whole set of 23 videos showing how to hack!!!!!!!!



Thanks to the makers for their time and effort.You all are awesome.



Please use this videos only for study and research purposes.Don’t harm anyone.
Views: 0 Author: creativelivenew 23 November 2009 Comments (0) More

Folder Lock 6.3.2

Software » Anti-Spyware #47


Folder Lock 6.3.2 | 8 MB

Folder Lock offers fastest way for encrypting and password protecting files and folders. You can either choose to encrypt important files from techies or lock your files, pictures and private data from casual users. Folder Lock comes with locking, encryption, shredding, stealth mode, hack attempt monitoring, portability, plug & play support, history cleaning, and more than 20 privacy features all tailored to special needs for people wanting privacy and security.

Views: 0 Author: consaumap 6 December 2009 Comments (1) More

GREED Black Border 2009 Full ( Repack / Addons Included )

Games #48
GREED Black Border 2009 Full ( Repack / Addons Included )


GREED Black Border 2009 Full ( Repack / Addons Included )
Genre : Action, Shotting | Lang : Eng | Size : 743.61 MB | Multilinks


GREED features all ingredients to create an enthralling hack'n'slash classic. In the tradition of other critically acclaimed and proven genre colleagues you as the player will need to fight your way through masses of critters, robots, aliens and many other exotic adversaries while collecting unique items and skills thus leveling up your character. In contrast to the genre ancestors, the story of GREED takes place in an adult and mature science fiction scenario.
Views: 0 Author: consaumap 9 December 2009 Comments (0) More

Live CD for Wireless hacking (Updated New Tools)

Software » Internet Tools #49
Live CD for Wireless hacking (Updated New Tools)


Ultimate Black Hat weapon
- Live CD with all the tools you need to hack a WLAN / wireless Access point & more-
Live-CD - OS runs from CD - 635 mb - .iso
- also used by the FBI ...


WEP Hacking - The Next Generation



WEP is an encryption scheme, based on the RC-4 cipher, that is available on all 802.11a, b and g wireless products. WEP uses a set of bits called a key to scramble information in the data frames as it leaves the access point or client adapter and the scrambled message is then decrypted by the receiver.
Views: 0 Author: consaumap 11 December 2009 Comments (1) More

WiFi Password Hacking LiveCD New

Software » All In One (AIO) #50
WiFi Password Hacking LiveCD New


WiFi Password Hacking LiveCD | 626 MB


This version is for all systems except systems with the Intel B/G wireless cards (IPW2200).

- Live CD with all the tools you need to hack a WLAN / wireless Access point - Linux Live-CD - OS runs from CD - 635 mb - .iso

- also used by the FBI.
Views: 0 Author: hienkbmns 6 January 2010 Comments (0) More

Folder Lock 6.3.2

Software » System Tools #51
Folder Lock 6.3.2

Folder Lock 6.3.2 l 5.5 MB


Folder Lock offers fastest way for encrypting and password protecting files and folders. You can either choose to encrypt important files from techies or lock your files, pictures and private data from casual users. Folder Lock comes with locking, encryption, shredding, stealth mode, hack attempt monitoring, portability, plug & play support, history cleaning, and more than 20 privacy features all tailored to special needs for people wanting privacy and security.
Folder Lock creates encrypted storages called 'Lockers'. You can keep as many of your private files & folders in your Locker and password protect it with a single click. You can transfer, secure and backup these Lockers. Lockers are portable, you can keep them in USB Drives, CD/DVD, & notebooks or transfer them via email or upload. These Lockers are undeletable on the computer where Folder Lock is installed.
Views: 0 Author: madeinheaven 5 December 2009 Comments (0) More

Wireless Hacking Live – FBI ve

GREED Black Border Full

Games #62
GREED Black Border Full
GREED Black Border Full


Greed: Black Border
Publisher: Headup Games
Platform: PC | English | Bin | 742Mb
Genre: Action
Views: 0 Author: thanhlangso 19 January 2010 Comments (0) More

Folder Lock 6.3.2

Software » Anti-Spyware #63
Folder Lock 6.3.2


Folder Lock 6.3.2 | Size : 5.6 MB
Views: 0 Author: laser 31 December 2009 Comments (0) More

Google Hacks: 100 Industrial-Strength Tips & Tools By Tara Calishain

E-Books #64
Google Hacks: 100 Industrial-Strength Tips & Tools By Tara Calishain


Google Hacks: 100 Industrial-Strength Tips & Tools By Tara Calishain
Publisher: O'Reilly ( 2003-02-01 ) | 325 pages ISBN : 0596004478 | PDF | 6 MB

Views: 3 Author: creativelivenew 21 November 2009 Comments (0) More

Folder Lock 6.3.1

Software » Anti-Spyware #65



Folder Lock 6.3.1 | Size : 3 MB
Views: 4 Author: laser 21 November 2009 Comments (0) More

Soul of the Ultimate Nation (2009/ENG)

Games #66
Soul of the Ultimate Nation (2009/ENG)

Soul of the Ultimate Nation (2009/ENG) | Size: 1.8 GB

Online multiplayer RPG with a console game mehanikoy.Eto an epic medieval tale of a magical world with wise emperors, powerful armies, powerful wizards and annoying monsters
Views: 628 Author: Dodik 17 October 2009 Comments (0) More

Hot Rod - December 2009 (US)

E-Books #67


Name Magazine: Hot Rod | Year: 2009 | Issue: December | Country: US | Language: English | Format: PDF | Pages: 128 pages | Size: 21.2 Mb

This magazine is oriented to high performance and personalized cars and the sport of hot-rodding. It covers performance news, trends, technologies and auto events. It showcases a variety of different cars from custom built street machines to restored muscle cars. In addition, articles provide insight into the human side of the sport.


Views: 11 Author: creativelivenew 14 November 2009 Comments (0) More

GREED Black Border (Portable)

Games #68
GREED Black Border (Portable)


GREED Black Border (Portable) | 750 MB

English | PC | Developer: ClockStone Studio | Publisher: HeadUp Games

Genre: RPG (Rogue / Action) / 3D / 3rd Person
Views: 0 Author: crab22 14 December 2009 Comments (0) More

GREED Black Border

Games #69
GREED Black Border


GREED Black Border | 742 Mb


GREED takes your character, chosen out of three completely different classes, through manifold levels and environments, all playable in three increasing difficulty levels putting even the toughest endgame player to a test – but as always, more pain con-tains more gain! Embedded in various scenarios, GREED throws waves of deadly foes in your way as well as screen filling end bosses.
Views: 0 Author: creativelivenew 10 December 2009 Comments (0) More

Multiboot flash (aGREE) Multiboot quests, conundrums

Software #70
Multiboot flash (aGREE) Multiboot quests, conundrums
Multiboot flash (aGREE) Multiboot quests, conundrums | 1.75GB


Multiboot quests, conundrums based on Grub4Dos and contains a full set of bits and system administrator. Install the image on your USB flash drive, you will be able to download the WinPE with lots of useful software: Acronis, Paragon, Symantec, Active to work with hard disk partitions; utility to reset the password Windows; utilities for disaster recovery, test utilities.
Views: 0 Author: thanhbinh87 12 January 2010 Comments (0) More

Mount and Blade

Games #71


Release: September 16, 2008
Genre: RPG
Developer: Taleworlds
Language: English
Platform: PC

War has come down on Calradia and war attracts its own bunch of misfits. Men ride to war, for one or other reason. Some because they are looking for thrill and excitement, some because they are desperate and know no other way. Some because they are so bitter and hateful that they are willing to unleash doom on earth... And yet some, because they are the very heroes who will step forward to stop that...


Views: 39 Author: creativelivenew 15 November 2009 Comments (1) More

Naruto Shippuuden: Narutimate Accel 2 (JAP)

Games #72
Naruto Shippuuden: Narutimate Accel 2 (JAP)


The next game for Naruto. Added new heroes. Dobavlina chip such as team-mate - you can call him during the battle, and some of them you can even do combos and techniques.
Views: 0 Author: Alex778 31 December 2009 Comments (0) More

Folder Lock 6.3.1

Software #73
Folder Lock 6.3.1


Folder Lock v6.3.1 | 5 Mb


Folder Lock is fast file-security software that can password-protect, lock, hide, and encrypt any number of files, folders, drives, pictures, and documents in seconds. Locked files are undeletable, unrenamable, unmovable, hidden, and inaccessible. You can lock, scramble, or encrypt depending on speed and security. Folder Lock is fully portable, so you can protect your files on USB flash drives, disks, CD-RWs, notebooks, and hard disks, and it doesn't require installation on another PC. Folder Lock protects files in Windows, DOS, and Safe modes, even when you change your OS or boot from a disk. Folder Lock doesn't let you delete its own program folder, and it can't be uninstalled without the correct password. Additional options include Stealth Mode, Hacker Attempt Monitoring, Shred files, AutoLock, Auto Shutdown PC, Lock your PC, Erase PC tracks, 256-bit Blowfish Encryption and Context Menu in Explorer.
Views: 0 Author: creativelivenew 22 November 2009 Comments (0) More

1000 Hacking Tutorials (The Best of 2009)

E-Books #74
1000 Hacking Tutorials (The Best of 2009)


1000 Hacking Tutorials (The Best of 2009) | 6.80 MB


Includes the following:



Create Bootable XP SP integrated CD,Create One-click Shutdown & Reboot Shortcuts

Creating a Board aka Forum on your own PC

Creating Universal Ghost Usb Boot Disk And Cd

Data Capacity of CDs [Tutorial]

Debug, Learn how ***** windows

Delete An undeletable File

Delete Files From The Recent File List In Windows

Digital Camera Guide

Digital Faq -learn Everything About Digital, Capture, Edit, Burning and more

Digital Photo Id Cards, Greate Info

Direct Link To Any Page You Want To In

Directx Explained

Disable Compression On Xp, NTFS partition, Disk Cleanup

Disable The Send Error Report, to Microsoft

Disable Windows Logo Key

Discover New Music You'll Probably Love

Download Free Music legally,, legally

Download from a paypal site without paying a penny!

Download From Ftpz, Using Ftp Search Sitez

Download Mp3's Without Using Filesharing

Download Music And Video With ,edia Player9, quick and easy!



...and much more!!!
Views: 0 Author: hienkbmns 23 December 2009 Comments (0) More

1000 Bestever Great Hacking tutorials 2009

E-Books #75
1000 Bestever Great Hacking tutorials 2009
1000 Bestever Great Hacking tutorials 2009 | 6.80 MB
Views: 0 Author: manoj_299 15 January 2010 Comments (0) More

Multiboot flash (aGREE). Multiboot quests, conundrums (27.12.2009)

Software » Operating System #76


Multiboot flash (aGREE). Multiboot quests, conundrums (27.12.2009) | 1.7GB

Multiboot quests, conundrums based on Grub4Dos and contains a full set of bits and system administrator. Install the image on your USB flash drive, you will be able to download the WinPE with lots of useful software: Acronis, Paragon, Symantec, Active to work with hard disk partitions; utility to reset the password Windows; utilities for disaster recovery, test utilities.

Views: 0 Author: consaumap 29 December 2009 Comments (0) More

GREED Black Border-ViTALiTY GREED Black Border-ViTALiTY

Games #77
GREED Black Border-ViTALiTY  GREED Black Border-ViTALiTY


GREED Black Border-ViTALiTY GREED Black Border-ViTALiT

Size: 742.47 mb (Vitality), 172.08 mb (Backslash



Description:


GREED takes your character, chosen out of three completely different classes, through manifold levels and environments, all playable in three increasing difficulty levels putting even the toughest endgame player to a test – but as always, more pain con-tains more gain! Embedded in various scenarios, GREED throws waves of deadly foes in your way as well as screen filling end bosses.
Views: 0 Author: creativelivenew 10 December 2009 Comments (0) More

Dr Web AntiVirus v5.0.8.11100

Software #78
Dr Web AntiVirus v5.0.8.11100


Dr Web AntiVirus v5.0.8.11100 | Size 26.82 MB


Doctor Web is a Russian IT-security solutions vendor. Dr.Web anti-virus software has been developed since 1992. The leader on the Russian IT
Views: 0 Author: creativelivenew 13 December 2009 Comments (0) More

Dr.Web AntiVirus v5.0.4.6300

Anti-Spyware, Anti-Virus #79
Dr.Web AntiVirus v5.0.4.6300


Doctor Web is a Russian IT-security solutions vendor. Dr.Web anti-virus software has been developed since 1992. The leader on the Russian IT security services market, Doctor Web has been the first vendor that offered an anti-virus as a service in Russia. The company also offers proven anti-virus and anti-spam solutions for businesses, government entities, and personal use.
We have a solid record of detecting malicious programs, and we adhere to all international security standards. Doctor Web has received numerous certificates and awards; our satisfied customers spanning the globe are clear evidence of the complete trust customers have in ourproducts.

Views: 505 Author: qposter 10 August 2009 Comments (0) More

Dr Web AntiVirus v5.0.8.11100

Software #80

Windows XP Corporate SP3 eXtreme Edition VL by c400 English (31.12.2009)

Software » Operating System #81

Windows XP Corporate SP3 eXtreme Edition VL by c400 English (31.12.2009)


Windows XP Corporate SP3 eXtreme Edition VL by c400 English (31.12.2009) | 591MB



Build team s400 in the form of CD and DVD versions. The final version of 12.31.2009 (New version), based on the final version of Windows XP Corporate Service Pack 3. Sew 3000 MB drivers! It is recommended before installing the wind to connect all possible ??????? to PC! Determined almost everything. Multiboot discs are designed to "clean" install from a bootable CD.
Views: 0 Author: creativelivenew 8 January 2010 Comments (0) More

Windows XP SP3 eXtreme Edition

Software #82
Windows XP SP3 eXtreme Edition
Windows XP SP3 eXtreme Edition | 1.87 GB


Build team s400 in the form of CD and DVD versions, the final version of the 12.31.2009 (New version), founded in the final version of Windows XP Corporate Service Pack 3. Sew 3000 MB drivers! It is recommended before installing the wind to connect all possible девайсы to PC! Determined almost everything. Multiboot discs are designed to "clean" install from a bootable CD (in Bios on the menu Boot exhibit, First boot device-CDROM)
Views: 0 Author: thanhbinh87 10 January 2010 Comments (0) More

Windows XP Corporate SP3 eXtreme Edition - VL (13/11/2009)

Software » Operating System #83



Windows XP Corporate SP3 eXtreme Edition - VL (13/11/2009) | Size : 1100 MB
Views: 137 Author: laser 17 November 2009 Comments (0) More

Folder Lock v6.3.0 FULL

Software » File Tools #84
Folder Lock v6.3.0 FULL


Folder Lock v6.3.0 FULL

Windows Vista/2003/XP/2000/NT

Folder Lock is fast file-security software that can password-protect, lock, hide, and encrypt any number of files, folders, drives, pictures, and documents in seconds.
Views: 63 Author: qposter 2 November 2009 Comments (2) More

Windows XP Corporate SP3 eXtreme Edition VL by c400 English (31.12.2009)

Software #85
Windows XP Corporate SP3 eXtreme Edition VL by c400 English (31.12.2009)
Windows XP Corporate SP3 eXtreme Edition VL by c400 English (31.12.2009) | 591MB + 1.21GB


Build team s400 in the form of CD and DVD versions. The final version of 12.31.2009 (New version), based on the final version of Windows XP Corporate Service Pack 3. Sew 3000 MB drivers! It is recommended before installing the wind to connect all possible ??????? to PC! Determined almost everything. Multiboot discs are designed to "clean" install from a bootable CD.
Views: 0 Author: thanhbinh87 10 January 2010 Comments (0) More

Portable Sun xVM VirtualBox 3.1.0 build 55467

Software » System Tools #86
Portable Sun xVM VirtualBox 3.1.0 build 55467
Portable Sun xVM VirtualBox 3.1.0 build 55467 | 40Mb

VirtualBox is a powerful x86 virtualization product for enterprise as well as home use. Not only is VirtualBox an extremely feature rich, high performance product for enterprise customers, it is also the only professional solution that is freely available as Open Source Software under the terms of the GNU General Public License (GPL). Presently, VirtualBox runs on Windows, Linux, Macintosh and OpenSolaris hosts and supports a large number of guest operating systems including but not limited to Windows (NT 4.0, 2000, XP, Server 2003, Vista, Windows 7), DOS/Windows 3.x, Linux (2.4 and 2.6), Solaris and OpenSolaris, and OpenBSD.
Views: 0 Author: ranjan206 2 December 2009 Comments (0) More

Devil May Cry (FRA/GER)

Games #87
Devil May Cry (FRA/GER)


Devil May Cry has been repeatedly named "the most stylish fighter game industry. Advanced special effects, virtuosic level design, and the magnetic personality of the hero made a game this huge hit. The principles of the genre fighters brought to perfection: the countless combinations of unarmed and armed combat, an unlimited number of rounds, and hordes of ferocious demons. In fighting a combination of woven fencing sword, pistol shooting and magic spells.
Views: 0 Author: Alex778 16 January 2010 Comments (0) More

Adobe Illustrator CS4 14.0.0 (EngRus) DVD - Black Label

Software #88
Adobe Illustrator CS4 14.0.0 (EngRus) DVD - Black Label
Adobe Illustrator CS4 14.0.0 (Eng/Rus) DVD - Black Label | 1.13GB


The program Adobe ® Illustrator ® CS4 is a comprehensive environment to work with vector graphics and has a new transparency in gradients and multiple assembly areas, which allow you to open more effective ways of working.
Views: 0 Author: thanhbinh87 3 January 2010 Comments (0) More

aGREE Multiboot Flash - Multiboot quests Conundrums (2010.01.16)

Software » System Tools #89
aGREE Multiboot Flash - Multiboot quests Conundrums (2010.01.16)
aGREE Multiboot Flash - Multiboot quests Conundrums (2010.01.16) | 1.81 GB


Multiboot quests, conundrums based on Grub4Dos and contains a full set of bits and system administrator. Install the image on your USB flash drive, you will be able to download the WinPE with many useful programs, utilities Acronis, Paragon, Symantec, Active @ to work with hard disk partitions; utility to reset the password Windows; utilities for disaster recovery, test utilities.
Views: 0 Author: simbo_poster 20 January 2010 Comments (0) More

VirtualBox 3.1.2r56127 Final

Software #90
VirtualBox 3.1.2r56127 Final


VirtualBox 3.1.2r56127 Final | 71.5 MB

VirtualBox is a general-purpose full virtualizer for x86 hardware. Targeted at server, desktop and embedded use, it is now the only professional-quality virtualization solution that is also Open Source Software.

Views: 0 Author: creativelivenew 23 December 2009 Comments (0) More

Certified Ethical Hacker and Countermeasures V6 (tools)

Software #91
Certified Ethical Hacker and Countermeasures V6 (tools)
Certified Ethical Hacker and Countermeasures V6 (tools) | 13.497 GB


In this DVD also included the instructor slides.enjoy all :buttrock: These are the tools not vids and theres a couple modules missing only like two or so.i dont even have them.also I(WARN)you this is to teach how to countermeasure hacks and in that being said there are live real worms, viruses,trojans.etc.not to destroy your computer(IF USED WITH VMWARE OR OTHER COMPUTER) but to teach you how to get rid of them.so i am not going to be held responsible for any precautions not being taken to prevent a system crash.i have not put any of these trojans,worms,viruses.In this torrent if you look into this course they are already in the tools.So in your best interest i highly recommend not using this on a normal computer that you use all the time.use in vmware or a computer you dont care about messing up.So please use careful common sense when messing with this.but very fun enjoy all.
Views: 0 Author: thanhbinh87 30 December 2009 Comments (0) More

Folder Lock v6.3.2

Software » File Tools #92
Folder Lock v6.3.2


Folder Lock is fast file-security software that can password-protect, lock, hide, and encrypt any number of files, folders, drives, pictures, and documents in seconds. Locked files are undeletable, unrenamable, unmovable, hidden, and inaccessible. You can lock, scramble, or encrypt depending on speed and security. Folder Lock is fully portable, so you can protect your files on USB flash drives, disks, CD-RWs, notebooks, and hard disks, and it doesn't require installation on another PC. Folder Lock protects files in Windows, DOS, and Safe modes, even when you change your OS or boot from a disk. Folder Lock doesn't let you delete its own program folder, and it can't be uninstalled without the correct password. Additional options include Stealth Mode, Hacker Attempt Monitoring, Shred files, AutoLock, Auto Shutdown PC, Lock your PC, Erase PC tracks, 256-bit Blowfish Encryption and Context Menu in Explorer.
Views: 0 Author: samsexy98 26 December 2009 Comments (0) More

Net Tools 5.0 : The Ultimate Hacking Kit

Software #93
Net Tools 5.0 : The Ultimate Hacking Kit
Net Tools 5.0 : The Ultimate Hacking Kit
Views: 68 Author: kormbo 23 October 2009 Comments (0) More

GFI EndPointSecurity 4.2.20091109

Software #94

GFI EndPointSecurity 4.2.20091109
GFI EndPointSecurity 4.2.20091109 | 10,1 Mb


According to the Ponemon Institute, 59% of people who lost their job admitted to taking confidential company information with them either on DVD or using USB drives. The proliferation of consumer devices such as iPods, USB devices, Smart Phones and more, has dramatically increased the risk of intentional and unintentional data leaks and other malicious activity. While most companies have anti-virus software, firewalls, email and web content security to protect against external threats, few realize how easy it is for an employee to simply walk in and copy large amounts of sensitive data onto an iPod or USB stick. Windows 2008There is also an increased risk of malicious and other illegal software introduction to your network through these devices. Of course your administrator could lock down all ports, an ill-advised, difficult and unsustainable solution.
Views: 0 Author: YagamiRaito 26 November 2009 Comments (0) More

Certified Ethical Hacker and Countermeasures V6 (tools)

Software #95
Certified Ethical Hacker and Countermeasures V6 (tools)
Certified Ethical Hacker and Countermeasures V6 (tools) | 13.5 GB


In this DVD also included the instructor slides.enjoy all :buttrock: These are the tools not vids and theres a couple modules missing only like two or so.i dont even have them.also I(WARN)you this is to teach how to countermeasure hacks and in that being said there are live real worms, viruses,trojans.etc.not to destroy your computer(IF USED WITH VMWARE OR OTHER COMPUTER) but to teach you how to get rid of them.so i am not going to be held responsible for any precautions not being taken to prevent a system crash.i have not put any of these trojans,worms,viruses.In this torrent if you look into this course they are already in the tools.So in your best interest i highly recommend not using this on a normal computer that you use all the time.use in vmware or a computer you dont care about messing up.So please use careful common sense when messing with this.but very fun enjoy all.
Views: 0 Author: loveyou4e 22 January 2010 Comments (0) More

Best Softwares MEGA Pack 220 in 1

Software #96


Best Softwares MEGA Pack 220in1 Nov (2009|Eng|Rus) | 4.5 GB

Windows 7 UPDATES - 7600.20510 X86 + X64

Views: 0 Author: consaumap 4 December 2009 Comments (0) More

Best SoftWare 2009 Mini Pack

Software #97
Best SoftWare 2009 Mini Pack
Best SoftWare 2009 Mini Pack | 3,2 GB


Here's a mini pack with new programs in 2009 ... These programs are very useful
Views: 4420 Author: thanhbinh87 18 October 2009 Comments (5) More

WindowsPE Full Edition Codename "SunBear" 2010.01

Software » Operating System #98
WindowsPE Full Edition Codename "SunBear" 2010.01

WindowsPE Full ?D Edition Codename "SunBear" 2010.01 | 693 Mb


At the request of users was made with the full assembly version Hiren's Boot CD, as well as more advanced functionality - WindowsPE full CD Edition * Sun Bear *. From the mini version of it differs, as has been said a full, but not to cut Hiren's Boot CD, and the addition of antivirus NOD32, support for Remote Desktop, the browser Opera, an extended version of Total Commander and changed interface.
Views: 0 Author: gfxcool 25 January 2010 Comments (0) More

SUPREME Collection 1000+ Essential Programs (2009Multi)

Software #99
SUPREME Collection 1000+ Essential Programs (2009Multi)
SUPREME Collection 1000+ Essential Programs (2009/Multi) | 4.9GB

Views: 0 Author: thanhbinh87 26 November 2009 Comments (2) More

Free Mega Games Pack Volume 1

Games #100
Free Mega Games Pack Volume 1
Free Mega Games Pack Volume 1
PC Game | Window | English | 4.28GB
Dr Web AntiVirus v5.0.8.11100


Dr Web AntiVirus v5.0.8.1110

rsion ISO

E-Books #52


Wireless Hacking Live – FBI version ISO | 635.24 MB

Live Cd For Wireless Hacking, Also Used By The FBI
This version is for all systems except systems with the Intel B/G wireless cards (IPW2200).
- Live CD with all the tools you need to hack a WLAN / wireless Access point – Linux Live-CD – OS runs from CD – 635 mb – .iso
- also used by the FBI.
WEP Hacking – The Next Generation

Views: 62 Author: creativelivenew 13 November 2009 Comments (0) More

4 AIO in One Hacking Video Training and Ebooks Collection

Software » All In One (AIO) #53
4 AIO in One Hacking Video Training and Ebooks Collection


4 AIO in One Hacking Video Training and Ebooks Collection | 795 MB


1.Best Ever Hacking Video Collection AiO



A penetration Attack Reconstructed



Bluesnafling a nokia hand set



Breaking WEP in 10 minutes



Buffer Overflow



Buffer Overflow Exploits 3
Views: 125 Author: creativelivenew 21 November 2009 Comments (0) More

Defense Grid: The Awakening [UNLEASED] | PC GameDefense, Grid, The, Awakening, UNLEASED, PC, Game

Games #54
Defense Grid: The Awakening [UNLEASED] | PC GameDefense, Grid, The, Awakening, UNLEASED, PC, Game

Defense Grid: The Awakening [UNLEASED] | PC Game | Genre: Strategy RPG/Arcade

Developer: Hidden Path Entertainment | Publisher: Hidden Path Entertainment | Size: 292 MB | Language: English


Defense Grid: The Awakening is designed to be the definitive tower defense game. The role-playing game lets let up to four players hack, slash and smash their way together through a hand-drawn landscape.
Views: 0 Author: creativelivenew 9 January 2010 Comments (0) More

Enter the Matrix

Games #55


Enter the Matrix| 300MB

Enter the Matrix gives players control of two of the minor characters in that film, Ghost and Niobe, members of the same group of rebels as Morpheus, Trinity, and Neo. Niobe is the Captain of the Logos, the fastest ship in the rebel fleet.

Views: 46 Author: creativelivenew 5 November 2009 Comments (0) More

VirtualBox 3.1.2r56127

Software » Graphics & Design #56
VirtualBox 3.1.2r56127


VirtualBox 3.1.2r56127 | Size : 71 MB
Views: 0 Author: laser 18 December 2009 Comments (0) More

Avernum 6 v1.0 MacOSX

Games #57
Avernum 6 v1.0 MacOSX
Avernum 6 v1.0 MacOSX | 36Mb

As you wander the gigantic world of Avernum, you will experience: An enormous world. Hundreds of quests, dozens of dungeons and enemy fortresses, and multitudes of characters.
Views: 0 Author: ranjan206 26 November 2009 Comments (0) More

VirtualBox 3.1.2-56127

Software #58


VirtualBox 3.1.2-56127

nnoTek VirtualBox is a family of powerful x86 virtualization products for enterprise as well as home use. Targeted at server, desktop and embedded use, it is now the only professional-quality virtualization solution that is also Open Source Software.

Some of the features of VirtualBox are:

Views: 0 Author: consaumap 18 December 2009 Comments (0) More

Folder Lock 6.3.2

Software » File Tools #59
Folder Lock 6.3.2


Folder Lock 6.3.2 | Size: 2.98 MB


Really great program and very important and has many features worth the download and protects the files from the
Theft, breaches and loss of confidential data, and also to the reservation far from the children Ooosedka
At work and viruses, spyware and you can encrypt files Flash Memory
Or floppy disk
Views: 0 Author: mis0gyne 12 January 2010 Comments (0) More

1000 Bestever Great Hacking tutorials 2010

Software » All In One (AIO) #60
1000 Bestever Great Hacking tutorials 2010


1000 Bestever Great Hacking tutorials 2010 | 6.77 Mb


All In One – Xbox 360 Hacking Guide (Books, VideoTraining, File Needed)
PDF & VIDEO | 360mods | 510 Mb

This Is all you need to hack your Xbox 360 – Textbooks Guide to Hacking the Xbox 360, Video Tutorials, How Flash The Drive with file included…

Views: 58 Author: creativelivenew 13 November 2009 Comments (0) More

DVD X Player-V5.4 PORTABLE

Software #40
DVD X Player-V5.4 PORTABLE


DVD X Player-V5.4 PORTABLE | 20.38 MB


- Easy WiFi Radar



- Boingo Wireless