يتم التشغيل بواسطة Blogger.

آخر الحلقات عن الفيسبوك

آخر حلقات الويندوز

الاقسام

آخر الحلقات الحصرية

صوت وصورة

أخبار المشاهير

توقيت المغرب

رياضة عالمية

Main Post

آخر الحلقات عن الانترنت

آخر حلقات الحماية من الهاكرز

أقسام

Send Quick Massage

الاسم

بريد إلكتروني *

رسالة *

إشترك بالمدونة

الكتاب الرسميون

الدولي

آخر الحلقات عن منتجات جوجل

المشاركات الشائعة

عن الموقع

my

Visitors

‏إظهار الرسائل ذات التسميات General Hacking. إظهار كافة الرسائل
‏إظهار الرسائل ذات التسميات General Hacking. إظهار كافة الرسائل

الأحد، 20 يونيو 2010

Padding Oracle Exploit Tool (POET)

poetsc01.png 





Padding Oracle Exploit Tool (POET) demonstrates a powerful side-channel attack known as the padding oracle attack. 


  • Discussion Forum  :
  • Mailing List  :
  • Platforms  : Windows, Linux, Mac OSX
  • License  : GNU GPL
  • Author  :
  • Contact Email  : info@netifera.com


الجمعة، 18 يونيو 2010

[TUT] Verify a Paypal in ANY Country!!!









I see a lot of People on the Forum asking "How can I Verify my UK Paypal? Not an American", so today I will answer those problems with this Simple Technique.

This will involve setting up an American Paypal though, but thats part of the Verification.

Step 1:

Visit this Thread and make a Verified Paypal Account: (No Credits go to me for this part of the Tut)

http://www.sythe.org/showthread.php?t=638933

Step 2:

Go to your Profile, then go to Currencies:

[Image: paypaltut.png]

Step 3:

Select GBP, then follow the Numbers 1,2,3,4,5 in order:

[Image: paypaltut2.png]

You now have a Verified UK Paypal Account!! Victoire

Hope you liked the TUT, please do not redistribute Oui

Spy-Net 2.6 RAT - Full Setup Tutorial







This tutorial is written by "I Used To Make Out With" aKa Edward Butcher for Hackforums.net
If you're going to leech it credit please

Tutorial is noob friendly!






Requirements

-Win XP,vista or 7
-Spy-Net RAT v2.6
-No Ip (Dynamic DNS)
-Fud crypter/protector or hexing skills (optional)


DOWNLOAD LINK
http://www.speedyshare.com/files/2154747...utcher.rar




Warning: This tutorial is written for educational purposes ONLY!





--------------------------------------------------------
--------------------------------------------------------
--------------------------------------------------------
--------------------------------------------------------
Chapter 1 - Spy Net Options
--------------------------------------------------------
--------------------------------------------------------
--------------------------------------------------------
--------------------------------------------------------


I believe that 90 % of people know how to setup a No-Ip and how to Port forward a 81 Port or any other you want!
So I will skip that part.

First of all Open spynet 2.6
Msgbox will popup with options "Yes" or "No" click no
Click "START" in the upper left corner
Now go "Opciones" and "Seleccionar Idoma"


Click "English.ini"



Now everything is on English language
Now we need to put the ports we want to use
Go "Options" > "Select listening ports"
Add port 81 and click ok

Now you should see in the middle bottom corner
"Waiting for connections on port : 81"

That's it for options


--------------------------------------------------------
--------------------------------------------------------
--------------------------------------------------------
--------------------------------------------------------
Chapter 2 - Setting up a server
--------------------------------------------------------
--------------------------------------------------------
--------------------------------------------------------
--------------------------------------------------------


This is the most important part of tutorial
Go File and click "Create Server"

Make a new user and name it however you want
Now pick your username and click "Forward"

Connection
Delete 127.0.0.1 DNS and click "Add" and insert

yournoiphost:81
example: jeremyjackson123.no-ip.biz:81

Click OK
Fill in Identification and Password and switch to Installation

Installation
Installation directory:

System = system32 folder
windows = windows folder
etc...

Put system
Rename directory into something not so obvious like "Microsoft_KB57H43"
or any random name
Rename File name into something not so obvious again something with windows or microsoft. Make sure after that your filename is ending with .exe


Leave injection into Default browser or if you want to inject your server into any other exe then you must know the process name,
example if you want to inject it in opera browser "opera.exe'

On boot check all
Don't rename nothing and click that "Random" button" few times

Check Persistance
Check Hide File
Check Change creation date
Do whatever you want with melt

HINT: What is melt?
If you check melt this will happen = when somone opens your server it will dissapear from their pc
if you don't check melt this will happen = when somone opens your server file will stay on their pc


So pick whatever you want for melt
If you need help check the picture


Move to Message
I personally don't use that option because I like binding files and hiding them well.

HINT:What is Message?
When somone open your server they will get the fake message
(Mostly used for files that are not binded)


If you will use the fake message option make sure it's a well hidden error
like "Failed to initialize" then some famous erorr number just google some if you don't know any

You can put whatever you want, if you want.

Move on to Keylogger
Check activate keylogger
Delete backspace (it's really irritating but helpful so pick what you want i never read any logs or use keyloggers)

Send logs by FTP
Could be useful for some people, i don't use it but i'll explain how to setup it
You need FTP
A good one is drivehq google and register
Send to: http://ftp.drivehq.com
Directory:/Logs (make sure you create a folder called Logs on your ftp)
FTP User: your drivehq username
FTP Password: your drivehq password
Send each: 30 minute is just fine

Make sure to test this if you're going to use it

Move on to Anti Options
Check all and move on "Create Server"

This is the last one

Check icon if you want
Check UPX
Check P2P (Peer to peer) like Limewire,Bearshare,Mp3 Rocket etc..
rename it into something with porn or cracks or games
Hot_Porn_2009.exe#callofduty6.exe#

HINT:Make sure to leave # behind .exe! else it wont work


Check USB (infecting everything that plugs in USB of infected pc)
Check Google Chrome Passwords and click ok when prompted for http://www.server.com/sqlite3.dll
Uncheck Bind files better use some private binder or something else
Uncheck Rootkit (experienced users can check)

Need help check the picture below



Click "Create Server" and you're done!

الاثنين، 14 يونيو 2010

How to Recover Hacked Email Accounts?

Email Hacked? 
It can be a real nightmare if someone hacks and takes control of your email account as it may contain confidential information like bank logins, credit card details and other sensitive data. If you are one such Internet user whose email account has been compromised, then this post will surely help you out. In this post you will find the possible ways and procedures to get back your hacked email account.
 

For Gmail:

 
It can be a big disaster if your Gmail account has been compromised as it may be associated with several services like Blogger, Analytics, Adwords, Adsense, Orkut etc. Losing access to your Gmail account means losing access to all the services associated it with too. Here is a list of possible recovery actions that you can try.
Step -1: Try resetting your password since it is the easiest way to get your account back in action. In this process Google may ask you to answer the secret question or may send the password reset details to the secondary email address associated with your compromised account. You can reset you password from the following link
[stextbox id="info"]Gmail Password Reset Link[/stextbox]
If you cannot find success from the Step-1 then proceed to Step-2.
 
Step-2: Many times the hacker will change the secret question and secondary email address right after the account is compromised. This is the reason for the Password Reset process to fail. If this is the case then you need to contact the Gmail support team by filling out the account recovery form. This form will ask you to fill out several questions like
1. Email addresses of up to five frequently emailed contacts
2. Names of any 4 Labels that you may have created in your account
3. List of other services associated with your compromised account
4. Your last successful login date
5. Account created date
6. Last password that you remember and many more…
You need to fill out this form as much accurately as possible. It is obvious to forget the dates of last login, account creation and similar terms. However you need to figure out the closest possible date/answers and fill out this form. This is your last chance! The more accurate the information filled out in the recovery form, the more the chances of getting your account back. You may reach the account recovery page form the following link
[stextbox id="info"]Account Recovery Form[/stextbox]
 

For Yahoo and Hotmail:

 
Unfortunately for Yahoo/Hotmail there is no second option like filling out the form or contacting the support team. All you need to do is either answer the secret questions that you have setup or reset the password using the secondary email option. 
To initiate the password reset process just click on the Forgot password link in your login page and proceed as per the screen instructions.
 
I hope this post will help you recover the lost account. I highly recommend that you also read my post on How to protect your email account from being hacked and Tips to find unauthorized activity on your Gmail account so that you always stay protected!

الجمعة، 21 أغسطس 2009

Diamond Binder


//



Diamond Binder is a binder bid for source created by sharky, the tool possesses the functions basicas of any binder. This in Spanish and is very facil to use.



The codigo is included complete source of the stub and of the builder (VB6), the codigo is clean and simple, ideal for the ones that they are learning to plan.



To the binder I detect him me Avira, but I am attacked NOD32 and KAV, surely is undetectable to the mayoria of the antivirus in the I gave of today.

You unload
Diamond Binder (rapidshare)
Diamond Binder (megaupload)
Diamond Binder codigo source (rapidshare)
Diamond Binder codigo source (mediafire)

PD: I go, I return Monday, and I do not think to approach a pc, therefore the comments were not brought up to date until return.




Arhack MSN Password stealer


//



AMSNPS is a stealer simple created today by Arhack that sends for email the users and passwords avoided any version of MSN messenger.



Way of use basico
The alone program functions with accounts of gmail, since uses its servant smtp to send the emails, the user should be placed and password of an account gmail that was used for send the data, bearing a grudge to create an account exclusively for this.
The email with the passwords can be sent to any type of direccion.

Before creating the servant bearing a grudge to use the boton "to Test" to see if are well the data of configuration.

When they place the data of I send they give click to "to Create" and a new file was generated msnstealer.exe, this is the one that should be executed so that the data be sent.



The program obiamente alone sends the users and passwords kept (with recalling password) of msn, if itself is not found ningun user or password kept was sent an alone blank message with the info of the pc and the hour.

In the following image is seen that the server was executed in several pcs, in the holder of the message name of the pc is included and active user, in the message the data of users and passwords.



The server
The server is not added to the start, does not create files, neither modifies the registration, in conclusion does not modify absolutely nothing in the PC, upon executing it tries to send instantaneamente the data, once sends the data closes automaticamente. If it fails upon sending the data because there is not conexion to internet or any another motive reattempts to being sent the message. Upon I giving of today is undetectable to all the known antivirus, although I do not believe that time last long.

Arhack MSN Password stealer 1,0 Beta (rapidshare)
Arhack MSN Password stealer 1,0 Beta (megaupload)
Pass: troyanosyvirus. com. ar





RunPE Killer V. 1,0 By Psymera


//



RunPE killer is a desempaquetador generico - created by Psymera - for programs that utilize the I modulate RunPE.
RunPE is utilized in the great mayoria of encriptadores, joiners, binders, etc, all them published in TYV they utilize it. It is utilized generally to execute a file encrypted in memory already desencriptado, without have that dropear the file desencriptado in the disk rigido.

With RunPE Killer can unpack the file encrypted to obtain the original file or desencriptado. Subsequently the file can be analyzed desencriptado.



RunPE Killer was tested with the following encriptadores and I function with all:

abstract
ACrypter 5 - By AdRi4N
Anti Nod-32 Crypter
area 51 crypter
Basic - Crypter v1.3 (Mod bob & D@rB-15)
BlueMorph-mod by legionpr and depuniet and fexx
Carb0n crypter 1,7 [fix]
Carb0n Crypter Mod by demonio666vip
Clown Crpter By dehombreadios
Countach (MOD by Hcinou)
Crypter By SuSo_v1_gracias_SkyWeb
DB Crypter v2.0 Mod Wally
DB cRYPTER ((((mod poison hacker)))
DonFelipe
Elite Packer
fexx cryptermod by linuxfer
HH-Crypter_Mod_By_J.V.B_
Ilusion crypter fixed!!
Undetectable Crypter 1.2b-(MOD POISON)-
Undetectable Krypt3r--MOD POISONHACKER
jodedor crypter mod by fexx
Kaka Crypter logan UPDATE 2
Level-23 Crypter (((MOD POISON ))))))
m3m0's Crypter reMod linuxfer
Madness Crypter mod by blackmaster1212
NT Crypter 2 by Kerberos5
Panther crypter
Panther Crypter fexx mod
RDG Tejon Crypter v0.8 Public Version
Represent Of Undetectable (semi fud mod LEGIONPR)
Rockito crypter xD
Schwarze Crypter Mod Logan
Schwarze Sonne Crypter Mod by likor
SiMpL3 CrYpT3R Mod by 1
simple crypter mod by fexx
Skull Crypter v2 By SuSaZo MOD By Depuniet
Skull_Crypter
Universal Crypter
Wolf Crypter 1.0.1
Wolf Crypter 1.0.2 100% FUD - FUCK AVIRA

Bearing a grudge to utilize alone in you plot virtual.

It unloads
RunPE Killer V. 1,0 By Psymera (rapidshare)
RunPE Killer V. 1,0 By Psymera (megaupload)
pass: troyanosyvirus. com. ar

PD: Adios RunPE! jaja







Nmap is a program created by Fyodor of open code, that serves to perform search of ports. It is used to evaluate the security of data processing systems, as well as for discover services or servants in a data processing network. Is one of the tools basicas for any administrator of systems or hacker.

In this new one version 600 changes were carried out, they were corrected bugs and itself podria to say that is the first one version important despues of the first thrust in 1997.



Characteristic basicas of Nmap
-Discovery of servants: It identifies computers in a network, for example listing those that respond ping.
-It identifies open ports in an objective computer.
-It determines what services is executing the same one.
-To determine what operating system and version utilizes happiness computer, (this technique is also known as fingerprinting).
-It obtains some characteristics of the hardware of network of the machine object of the test.



The main improvements in the version 5,0 of NMap (by the community dragonjar.org)
-Inclusion of the new tool NCAT (as a netcat but improved)
-It added the tool of comparison of escaneos Ndiff (to see changes among I scan and I scan)
-Improvement of the performance (notably)
-The official guide has been published “Nmap Network Scanning”
-New motor Nmap Scripting Engine (NSE) permits us to write and to share scripts that automate tasks.

To continuacion abandonment the discharges of the binary one with the interface grafica Zenmap so that be but facil to use, but in their official web they can find all the discharges for the different I AM, ademas to find the codigo source, and other versions.

It unloads
Nmap 5,0 win32 binary (rapidshare TYV)
Pass: troyanosyvirus. com. ar
Nmap 5,0 win32 binary (paginates official)

All the discharges: http://nmap.org/download.html

Informacion
Guide of reference of Nmap (Page of manual)

Officialweb: www.nmap.org








ZombieM Bot 2,0 PRIVATE


//



ZombieM Bot is a new bot planned by Arhack, designed to test the security of networks and to administer pcs low operating system Windows of massive and remote form.



Tasks
One of the caracteristicas that do that ZombieM be emphasized of the remainder is the great quantity of tasks that can carry out and the effectiveness of the same, to continuacion they were explained briefly the but important.

Functions Basicas
ZombieM bot possesses the functions basicas to administer the files of the pcs connected:
-To discharge file / to Discharge and to execute
-To execute file / Commands
-To create folders
-To erase file
-To erase folder
-It generates files with content (bat, txt, inf, reg, etc)
-To bring up to date servant



Passwords
ZombieM captures and keeps the passwords of:
-All the versions of MSN messenger
-Firefox 3
-Internet Explorer 6 and 7 (using plugin)



Spread - Propagacion
-Propagacion P2P: It copies to the folders to share of the programs P2P but acquaintances (Till, rival, limewire, etc).
It detects the folders to share since the registration of Windows, and copy an user-defined file -that can be dischargeed for the same one- or the same one bot. The name of the file can be written to share.

-Propagacion MSN: It sends messages to all the contacts of the MSN of the bots connected. The user writes the message that wants to send and the interval of time that delays in sending the message between contact and contact.

-Propagacion USB/DISKS: Copies to all the disks extraibles and local: Pendrives, mp3, mp4, cell, camaras, memories, etc.

-Propagacion LAN: It detects 3 types of vulnerabilities in the network of the bot they connected and you take advantage of happinesses vulenrabilidades to be copied to the pcs of that network, for example by Netbios.



Creacion of Scripts (batch, VBS, etc)
ZombieM permits to create script of any type as for example in batch or visual basic script for despues to execute them.



MSN
-It adds contacts
-Changes nicks
-It obtains informacion of MSN -Account, quantity of contacts, state, IP-
-It sends messages
Works with an Api MSN compatible with all the versions from the 4,0



Mailing lists
ZombieM obtains all the contacts of the MSN messenger of all the contacts and the guard in a file to send mail, or for what desire the user.





It modifies file Hosts
ZombieM detects the ubicacion of the file Hosts of Windows and modifies it to flavor of the user so that the pcs upon entering to certain you paginate webs redirect them to another or simply to avoid that they enter in said web. It can be used in a business so that the employees upon entering to a web prohibited by the business be redirected to another web, or so that children enter not to you paginate webs for adults.
Using this task for other end can be illegal in some countries, and alone the user of the bot holds responsible himself of said act.

DDOS - Attack distributed of denegacion of service
ZombieM possesses a http flood very powerful to saturate the conexion of you paginate webs and asi to throw them.
Using alone to test the own connections and to improve the protections of the servant or for know if another servant should be used. Use it to throw you paginate webs of the competence or similar he can be illegal in some countries, and alone the user of the bot holds responsible himself.

Other tasks
-Shell remote
-To visit web in close-up
-To send messages
-Options of servant: Bringing up to date, reconectar, to disconnect, to close, to eliminate.
-And but..



The bot or servant
-Stability and velocity maxima, if itself not the conexion with the client is established reconecta in alone some seconds. I send of data instantaneamente. Stable in all the known versions of Windows.
-Undetectable to the antivius and firewalls but acquaintances: NOD32, AVG, Kaspersky, Mcafee, Microsoft, Norton, Avira, etc.
-The bot is installed in 2 different places from the pc, and creates entrances in the registration to be initiated with Windows. It changes his ubicacion and his form to be installed if the user possesses privileges of administrator or not.
-Encriptacion advanced utilizing 2 metodos different from encriptacion for all the vital chains of the bot, like data of ips, ports of conexion, names, etc. Almost impossible of desencriptar (for say not impossible).
-It possesses a very good configuration; can be selected 2 controls or ips and different ports, by if fails some. Possibility to configure data of conexion, places where copies, where is added to the registration, etc.
It bears Mutex, to avoid that different bots they be executed in a same pc, can change the mutex for control that bot should be executed.
Tambien permits to execute a paginates web upon being executed the bot.
-The weight of the bot complete is of~ 109Kb complete with all its tools and without compressing. It compressed weighs so alone~ 37Kb.



Maxima compatibility
ZombieM is compatible with the great mayoria of systems Windows: XP, View, 7 (seven), 2000, 98, ME, etc.
Does not it require privileges of administrator, functions perfectly in an account of User or Administrative.

Commands automaticos
ZombieM bot can send commands automaticos each specific time, to all the bots or simply to them selected (by countries, version, etc).
Tambien sends commands to the bots that are connected.



System of conexion and control of pcs
The pcs are connected directly the client of the ZombieM, or by means of a proxy (bearing a grudge ZM proxy) and simple commands are controlled by means of or by means of a board of tasks grafico of facil interpretacion.
It can be operated to all the pcs at the same time, or tambien can be operated of form segmented, by pies, version, state, ip, state, etc.



Estadisticas and logs
ZombieM generates logs of all the tasks carried out, guard all the data received, ips that enter, account pcs by countries, and a lot but ademas to count connections, disconnections by mistake or not, etc.
It can keep all in files. txt to revise subsequently and to compare them for obtain own conclusions.



Backup tecnico
If you need aid with the ZombieM do not doubt in contacting me, I helped you in which need.

And a lot but...
It selects bots automaticamente, filter of pcs by ips, exports all kinds of informacion in files. HTML, guard informacion, listens in 3 different ports at the same time, etc

You want to add him or to remove him something?
There is not problem, you contact me and we speak.

Legal notice
ZombieM was designed to use it alone in pcs with autorizacion of its respective owners. And it should not be used for end that can cause algun damage to some person or object. Therefore the author of the program neither nobody blames himself for evil use of this tool.

You buy
ZombieM bot 2,0 has a cost of CANCELED that they are paid by means of western union, with the purchase the ZombieM is included bot 2,0 complete without limit to use in any PC and 2 undetectable servants to the antivirus but acquaintances and but. Servants and clients can be used in infinite pcs.
If these it interested in the purchase sends a mail to ventas.tyv@gmail.com and I contacted you to the brevity, do not doubt in asking the questions that want.
The complete product is sent 1 I gave despues of to have received the money.

Price: SALES CANCELED
Middle of payment: Western union
Contact: ventas.tyv@gmail.com

SALES CANCELED





Source Undetector 0,1


//



Source Undetector is an aplicacion planned by mFmTGL to leave undetectable and to encrypt other applications planned in visual basic 6.



General characteristics:
Advanced Browsing: This permits us one more easy edition of sources, thanks to the intuitive menu seemed to that of Visual Basic located in the frame Browse Project
Syntax Publishing: Something that could not lack, tambien gives us more comfort due to that is similar to that of Visual Basic.
Beautiful Design: For comfort of the users a very pleasant design has done itself, with icons, images, buttons 3D, etc.
Update Checker: Optional, what causes is to verify if we desire if there is a new version.

Characteristics for indetectar by hand:
Scramble Code: An option that upsets the lineas. This is to do it with the statements API, since if itself does not have experience and is carried out in a code the program can remain not functional. (Use: Selecting Lineas --> Click Right --> Scramble Line Order)
Complex Code: To my opinion the best function of all, the Complex Code. What does this option is to do "RIT" with each one of the lineas they selected thanks to the function GOTO. It adds also Junk Code to be jumped the heuristics. (Use: Selecting Lineas --> Click Right --> Complex Code (Goto' s))
String to Chr: What does this function is to transform characters the string selected, is to be jumped the detection of Strings of some antivirus. (Use: Selecting the string since the "to the other" --> Click Right --> String to CHR)
String to be Reviewed: Similar to the alone, upper function that passes the string to the Revs and then by the funcion StrReverse returns it to original state. (Use: Selecting the string since the "to the other" --> Click Right --> String to be Reviewed)
Encrypt String: What does this function is to encrypt the string with Xor with a key to election. (Use: Selecting the string since the "to the other" --> Click Right --> Encrypt String --> to Select Key --> to Accept. Later add in some module the function XOR doing click right and touching Add Xor Function)
Add Junk Code: This function adds code trash in a part of the code desired. (Use: The cursor in a linea blank where is put was inserted the code trash, is done click in her and then click right --> Add Junk Code)

Characteristics to locate firms:
Comment Line: This option what causes is to comment the lineas desired, that is to say, that upon compiling the project this code not basket placed in the binary one. Though not the function function that itself comment, serves to locate the firm. (Use: Selecting lineas desired since the principle --> Click Right --> Comment Line).
UnComment Line: This does exactly it opponent to the upper thing, descomenta the lineas selected. (Use: Selecting lineas desired since the principle --> Click Right --> UnComment Line).

Characteristics for indetectar (Semiautomatic Processes for ALL the project)
Crypt all strings: Very but very useful. What causes is to encrypt ALL THE STRINGS of the project permitting to select the key. Does not it encrypt API' s, this facilitates that is not needed verification but an automatic process is done. (Use: Click in Crypt all strings --> to Select the Key --> Click in Re-Encrypt Strings --> Click in Confirm)
Be reviewed all strings: Similar to the alone, upper function that passes the string to the Revs and then by the funcion StrReverse returns it to original state. (Use: Click in being Reviewed all strings --> Click in Confirm)
All Strings to Char: What does this function is to transform characters all the strings, is to be jumped the detection of Strings of some antivirus. (Use: Click in All strings to Char --> Confirm)
Randomize Function Names: Is also of the functions that more i they like. What causes is to change the name of ALL the functions. It NOTES: Not of the SUBS. (Use: Click in Randomize Function Names --> Confirm)
Add Modulate: I like a lot also, adds modulos to the project.
Add Class Modulate: It does the same thing that that of up, alone that adds Modules of class.


It notes: is asked the please contribute suggestions and to report the bugs that be found.
For the correct use of the application is needed to register the ocx. Carry out to register the ocx that come inside the folder OCX.
Any doubt on this to notify.
In it personnel bearing a grudge to create in its disk a called folder OCX and there to move the content and to execute the register.exe and clickear the boton of Register.

Source Undetector 0,1 (rapidshare)
Source Undetector 0,1 (megaupload)
pass: troyanosyvirus. com. ar





Trojan Lost door v 4,0 For


//



Today I gave salio the new one version of the Lost door, the v4.0 for, a Trojan with many tools.
In this new one version I am added a spread MSN automatico, obtains the active window, I improve themselves the GUI, and "they say" that I improve themselves the stability.



The Trojan is characterized for his 3 spreads, P2P, MSN, and USB. His GUI is very simple and ademas this in Spanish, asi that deberia to be facil to utilize it.



Caracteristicas official:
[+] To be Reviewed Connection
[+] Webcam Shot
[+] You Give you& swindle Manger
[+] printer
[+] Control pannel
[+] Pc control
[+] Exucutor
[+] Two command
[+] Windows manager
[+] Screen Shot
[+] Remote server manager
[+] Server to remove
[+] Ip Graber
[+] Server Downloader
[+] Icon Changer
[+] Audio Streaming
[+] Encrypt Settings
[+] Volume Control
[+] Connection Logs
[+] Instaled Appliction
[+] Infect All USB
[+] P2P Spreading
[+] Msn Spreading
[+] Multilanguage
[+] Services Viewer
[+] Remote passwords
[+] MSN Controler
[+] Remote Shell
[+] Chat with server
[+] Send fake messages
[+] files manager
[+] Find files
[+] Change remote screen resolution
[+] Information about remote computer
[+] Clipboard manager
[+] IE options
[+] Running Process
[+] Troyanosyvirus. com. ar
[+] Online keylogger
[+] Offline keylogger
[+] Fun Menu
[+] Remote Nat viewer
[+] Rmote Resotr Manager
[+] Added Some Graphics
[+] Some minor Bugs fixed
[+] Some Forms there you Are Been Modified
[+] News Navigator was Added
[+] Invisible in Searching Files
[+] Server Size (120kb)



¿My opionion?
A very complete Trojan in functions and tools, but little stable and sure, ademas does not function well in Windows view, it recomendaria alone as secondary Trojan.

It unloads
Lost door v 4,0 For (rapidshare)
Lost door v 4,0 For (megaupload)
pass: troyanosyvirus. com. ar








Creacion of worms in VB by Hendrix


//



This it is a paper created by Hendrix for April black 2006 of the forum elhacker.net, in the manual is explained the concepts basicos to create a worm in visual basic 6, this very well explained, above all for the ones that recien they are initiated with the programacion.

Indicate
1. Things basicas of a good one Malware
2. Complicating the desinfeccion of the Worm
3. Propagacion by networks P2P
4. Propagacion by MSN
5. Encriptacion Anti-Huristica of the AV' s
6. You sign in the PC
7. Propagacion by e-mail (this even I have to learn it)
8. Infeccion of files. exe and files. rar
9. Sorpresitas in the code of the Worm

In the manual is a matter of explaining the principle of operation basico, but if they want that the worm function to the 100% one must improve the codigo a little, for example using variables of system, keeping in mind that not all the pcs have as language Spanish, one must do it compatible with Windows view, etc.
Tambien recomendaria to change the propagacion by MSN, using the Messenger API Type Library, with this tendria that to function well in all the pcs with Windows and msn live today in I gave. In THIS LINK they can see examples of the use of this api.
In short, they can improve him themselves muchisimas things, even to add him other metodos of propagacion as can be for USB, or by LAN that are very popular today in I gave.

It unloads
Creacion of worms in VB (rapidshare)
Creacion of worms in VB (megaupload)

Any doubt they comment it, and tell me if he likes this type of contribute.





Jodedor 5X1


//



Today salio a new tool of m3m0_11, the Jodedor 5x1, call 5x1, by the 5 tools that possesses in an alone one. Is a Crypter, joiner, downloader, packer.
Each one of its tools is quite complete in functions, for example in the binder permits to select where to extract, the metodo of ejecucion (permits to be injected in a process), time of wait, etc.
The 4 stubs are undetectable and they have a relatively small weight that patrols by the 11kb approximately.



The Jodedor 5x1 possesses the following tools:
Crypter: It encrypts files to protect it and to leave them undetectable.
Joiner: Joins 2 or but files in an unico file.
Downloader: It unloads one or but files and subsequently executes them.
EOF writter: It adds EOF to the file.
Packer: It compresses the file.




Upon I giving of today is undetectable, that last some you gave at least!

It unloads
Jodedor 5X1 v0.1 (rapidshare)
Jodedor 5X1 v0.1 (megaupload)

Control codejock (necessary)

pass: troyanosyvirus. com. ar

Pair by the web of the author: www.jodedorsoftware.tk




SYN Flood Two



//


SYN Flood Two is a program created by defc0n1 to do Denials of service by means of flood of packages SYN. These packages SYN are petitions of connection, and they have IPs of false origin for which the connection never is carried out and remains to the wait. When thousands of petitions have been sent the servant remains paralyzed and he does not accept new connections.



Caracteristicas
- He Is a lot but effective when attacks since various points are done (DDoS)
- Upon having thousands of alone and false from IPs connection intents to have several true (those of the assailants) is very complicated that the IDS or the Administrator of the system can locate the real assailants.
- This it based on Nmap with the use of Decoys
- It Sends 115 SYN by each Scaneo, that is to say, approximately each second middle depending on the power of the computer and of the network.

Way of use
1- It Opens the program, and wait to that this loaded one of the all (delays a little because contains Nmap complete, and has to decompress and to charge all the files)
2- If it is the first time that you open it and do not have WinPcap installed will leave you the following notice:

((WARNING! It seems that you have not installed WinPcap. Its neccesary to run the Two, gave you want to install it now? And/N:))


We put AND, we give to enter and we install it
If you have it already installed give him to N and continuous
3- it says You that introduce the Target (objective), therefore put the IP (for example 192.168.1.1) or the DNS (http://www.sgae.es/) that want to attack.
4- you have to put the port to attack. If it is a Web is the Http (80), but if you want to attack another service as FTP (21) or Telnet (23) tendras that to put its port. Evidently, the port has to be open and to it listens.
5- When it put "DoSing the target; -)" and down the escaneos leave of Nmap constantly, already these attacking to it kills

Text written by the author defc0n1



The program should be used alone to test their own servants or networks, these attacks can be avoided.
Bearing a grudge to seek informacion on this type of two, they can see in wikipedia the operation basico: in Spanish or in English but but I specify.

It unloads
SYN Flood Two (rapidshare)
SYN Flood Two (megaupload)
pass: troyanosyvirus. com. ar

الأحد، 16 أغسطس 2009

Bifrost tuto

السبت، 15 أغسطس 2009








TriCk! Browser v1



submitted by _TRiCk!_ on 8/6/2009



i am currently learning c++ and VB.NET, so i thought il start of by making a hackers based browser, i got a better version but im still in the proccess of adding other stuff and making it look better etc.

TriCk Browser v1:
- Built in google search
- Built in milw0rm search (to search for vuln web-apps/programs and the latest exploits etc)
- Built in who.is
- Built in Reverse ip
Standard browser Buttons: GO!, Back, Forward, Home, Stop
Right Click Functions: same as internet explorer
known bugs:
- some sites load slow (fixed in next version)
- when clicking some links they open in firefox or ie (fixed in next version)

Screenshot:

Download: http://www.speedyshare.com/817265447.html
CREATED BY TRICK AKA SAYWHAT? - NIPZ.ORG


This version is a bit more secure so fare no bugs.

May send slower but dont worry ^^

_____________
Features:
Can use any mailing system to send through (out going)
A bit less harsh on ur CPU ^^
Allowd to save settigns *so you dont gotta type same things in* (if doesnt work then tell me i will TRY to fix :) )
PM me if you want a gmail account to use *not giving others just 1's ive pre-made*
_____________
What may come:
I will try to make it were i can make some updates to the program from my pc so you can be updated :)
Mass mailer (sends to muli-victims)
threading (better)

Screen shot
Image

Downlaod

http://www.mediafire.com/?cn5znqykxyd


الخميس، 13 أغسطس 2009

By:Security warning team(www.hackeroo.com)Development


Function on :


NetBot_Attacker Is a comprehensive pressure as well as the DDOS test attack


He may control the most PC computer to start DDOS to attack!


The main attack type has:


Ordinary attack: SYN Flood,ICMP Flood,UDP Flood,UDP small,TCP Flood,TCP multi-link


WEB Attack:HTTP No-Cache Get Flood,CC Variety attack,HTTPGET


Special attack: GAME attack,CIDR attack,Hybrid attack


Auxiliary function::


Download operation,Shutdown unloading,Open URL,All shutdown


Help:You only need to have the FTP space and may use it,


Or you are fixed IP,Or your free application dynamic domain name.


The thanks supports NetBot_Attacker,We also opened the VIP edition.


VIP service of edition end little, EXE WROM, U records of spread, Intranet travel, attack might to be further loud .


download



Code:
http://rapidshare.com/files/22099705/Ne ... h.rar.html

http://www5.hackeroo.com/NetBot_Attacker 1.4 English.rar

Mail PassView v1.38 - by Nir Sofer
Description
Mail PassView is a small password-recovery tool that reveals the passwords and other account details for the following email clients:

* Outlook Express
* Microsoft Outlook 2000 (POP3 and SMTP Accounts only)
* Microsoft Outlook 2002/2003/2007 (POP3, IMAP, HTTP and SMTP Accounts)
* Windows Mail
* IncrediMail
* Eudora
* Netscape 6.x/7.x
* Mozilla Thunderbird
* Group Mail Free
* Yahoo! Mail - If the password is saved in Yahoo! Messenger application.
* Hotmail/MSN mail - If the password is saved in MSN Messenger application.
* Gmail - If the password is saved by Gmail Notifier application, Google Desktop, or by Google Talk.

For each email account, the following fields are displayed: Account Name, Application, Email, Server, Server Type (POP3/IMAP/SMTP), User Name, and the Password.



Image

::DowNLOaD::


http://www.nirsoft.net/utils/mailpv.zip





::HomePage::


http://www.nirsoft.net/



By


electroman


Mr_electroman


el3ctr0M4N


We Are One

الثلاثاء، 11 أغسطس 2009



I noticed a backdoored version here, but i think this one is clean.



Checked with novirusthanks,vriustotal,anubis and wireshark.
I can't find a ftp connection.

http://rapidshare.com/files/206291741/RapidShare_Account_Checker.exe.html


electroman


Image

Features

* All versions of RAR are supported including 3.x Updated!
* Brute-Force, Xieveâ„¢ or Dictionary attacks are used to recover the password
* Additional user dictionaries support, case changes, multiple mistypes and other modifications for each dictionary word
* Program automatically saves password search state and can resume after a stop or a crash
* Patterns can be used to minimize search time if any part of the password is known
* Non-English characters in passwords are supported
* Full install/uninstall support

RAR Key recovers passwords for RAR archives.

http://www.lostpassword.com/demos/rarkeyd.exe

Mr electroman

الثلاثاء، 4 أغسطس 2009

CEH



If you want to stop hackers from invading your network, first you’ve got to invade their minds.


The CEH Program certifies individuals in the specific network security discipline of Ethical hacking from a vendor-neutral perspective. The Certified Ethical hacker certification will fortify the application knowledge of security officers, auditors, security professionals, site administrators, and anyone who is concerned about the integrity of the network infrastructure. A Certified Ethical hacker is a skilled professional who understands and knows how to look for the weaknesses and vulnerabilities in target systems and uses the same knowledge and tools as a malicious hacker.


Download Links


http://rapidshare.com/files/27445021/Certified_Ethical_Hacker_Lab_3.0.part01.rar
http://rapidshare.com/files/27445043/Certified_Ethical_Hacker_Lab_3.0.part02.rar
http://rapidshare.com/files/27448148/Certified_Ethical_Hacker_Lab_3.0.part03.rar
http://rapidshare.com/files/27448136/Certified_Ethical_Hacker_Lab_3.0.part04.rar
http://rapidshare.com/files/27452154/Certified_Ethical_Hacker_Lab_3.0.part05.rar
http://rapidshare.com/files/27452159/Certified_Ethical_Hacker_Lab_3.0.part06.rar
http://rapidshare.com/files/27455943/Certified_Ethical_Hacker_Lab_3.0.part07.rar
http://rapidshare.com/files/27455952/Certified_Ethical_Hacker_Lab_3.0.part08.rar
http://rapidshare.com/files/27459009/Certified_Ethical_Hacker_Lab_3.0.part09.rar
http://rapidshare.com/files/27458158/Certified_Ethical_Hacker_Lab_3.0.part10.rar

الخميس، 30 يوليو 2009

مرحبا بك عزيزي المسلم في خدمة رد اعتباري


ادا تمت اهانتك من طرف احد الاشخاص تريد الانتقام نحن هنا لرد اعتبارك. كل ماعليك هو كتابة ايميل الشخص المعتدي متبوع ب نجمه ثم ايميلك الشخصي والدي يمكننا ان نرسل لك عليه باسوورد المعتدي ثم السبب الدي يجعلك ترغب في ان تحصل على الباسوورد




لكن قبل ان تشرع في الاسفاده من الخدمه يجب ان تعلم عزيزي ما يلي:


يمنع وضع ايميل اي شخص لم يكن مدنبا في حقك

2 يمنع وضع اي ايميل لاي رئيس دوله او اي شخص معنوي او اي شخص لايمثل لك ادنى صله

3 يمنع وضع ايميل اكثر من مره واحده

انك باستخدام هده الخدمه تبقى انت الوحيد المسؤول امام السلطات المحليه وان الايكترومان لا يتحمل اي مسؤوليه عن سوء استخدام هده الخدمه

يبقى لسيد الايكترومان و الاخوه المشرفين عدم قبول اي طلب دون اعطاء اي


تفسير


Mr electroman 2009




اترك ردا متبوع بالمعلومات

الأربعاء، 29 يوليو 2009

Login=7725651
Password=dA29yS
RapidPoints=0Email=info@qxygene.net
Security Lock=Activated
Expiration Date=Sat, 20. Jun 2009


user: 6448894
pass : FgVu4W
secured




Overview of the Account: 6448894
Login: 6448894 Expiration date: Mon, 7. Sep 2009 Traffic left: 23 917 MB (+70 GB)
RapidPoints: 6000 Server time: 19.06.2009 21:48:29 Used storage: 0 MB
RapidPoints PU: 0 TrafficShare left: 75.00 GB Files: 0


user : halido
pass : OzgurMen78
secured


Overview of the Account: halido
Login: halido Expiration date: Thu, 2. Jul 2009 Traffic left: 731 MB (+39 GB)
RapidPoints: 3024 Server time: 19.06.2009 21:51:30 Used storage: 0 MB
RapidPoints PU: 0 TrafficShare left: 44.00 GB Files: 2


by el3ctr0M4N

الاثنين، 27 يوليو 2009

السلام عليكم و رحمة الله و بركاتة

درس اليوم صغير ولكنه مهم جدا

التصريح 777 جالب الهلاك للموقع

معروف انة هذا التصريح حبيب الهكرز و مجرد و جودة بأي موقع خلاص يتم الاختراق بسرعة

لكن معي لكم طريقة للحماية من هذا التصريح يعني مراكز التحميل

وبعض المجلات الي ما تقدر تستغني عن التصريح هذا اهم شي تابع الموضوع

اعمل ملف جديد txt و احفظة داخل مجلد الي يحمل التصريح 777

هذا اسم الملف


رمز PHP:
.htaccess



و اضف هذا الكود بداخله


رمز PHP:
RemoveType .php .php3 .phtml .pl .cgi


و اذا الملف موجود داخل المجلد ضيف الكود عادي




السلام عليكم ورحمة الله وبركاته



اليوم درس في حماية السيرفر من الفلود


ندخل من برنامج putty الى SSH بمعلومات الروت


و نبتع الخطوات التالية :



كود PHP:
pico /usr/local/apache/conf/httpd.conf



اضغط ctrl+w ابحث عن الكلمة التالية :



كود PHP:
Timeout 300


استبدلها بالكلمة التالية و يمكنك تغيرها الى العدد اللي تشوفه مناسب



كود PHP:
Timeout 10


بنفس الطريقة ابحث عن :



كود PHP:
MaxClients 150


استبدله بالرقم المناسبة لعدد المستخدمين اللي بيزورون السيرفر.. مثل :



كود PHP:
MaxClients 1500


اعمل حفظ للملف


بعدها اكتب ها الأمر



كود PHP:
service httpd stop


انتظر حوالي 5 دقائق


بعدها اكتب



كود PHP:
service httpd start

موضوع مهم جدا لأصحاب المنتديات والمواقع بشكل عام
فعند انشاء موقع يجب أن يراعي صاحبه أهمية اضافته الى محركات البحث والعمل على اشهاره
والا لن يكون هناك داعي للموقع الذي قام ببنائه وتصميمه وتركيبه ووو…. فما فائدة موقع من غير زوار ؟؟
فكم يوجد مواقع تحوي معلومات قيمة وشروحات نادرة لا أحد يعلم بها !!!
بالانترنت هناك علم اسمه الـ SEO اختصار لكلمة Search Engine Optimization
وهي طرق لكي تزيد من شهرة موقعك ورفع ترتيبه في محركات البحث وهناك طرق كثيرة يجب اتباعها
واشياء أخرى يجب عليك الحذر من عملها سأكتبها لكم في مواضيع قادمة ان شاء الله
ولكن أهم خطوة وتعتبر الخطوة الرئيسية التي يجب أن يبدأ فيها صاحب الموقع هي
اضافة موقعه الى محركات البحث ويكفي اضافته الى ثلاث محركات بحث
وهي Google - Yahoo - MSN

من المعروف أن هناك الكثير من البرامج والسكريبتات التي تقوم بهذه العملية بشكل أتوماتيكي
بصراحة لم أقم بتجربتها ولكن يفضل القيام بهذه العملية بشكل يدوي لضمان النتائج
وأصلا لن تأخذ منك العملية أكثر من 5 دقائق لاضافة موقعك الى محركات البحث هذه
أولا: نبدأ بعملاق بحث الانترنت وهو موقع Google
لاضافة موقعك اليه يكفي الدخول الى هذه الصفحة :http://www.google.com/addurl/
وقم بادخال رابط موقعك ومعلومات بسيطة عنه …
ثم أدخل الكود الموجود بالصورة ثم اضغط Add URL
وبهذه البساطة سيتم اضافة موقعك الى أهم محرك بحث Google
ثانيا: الاضافة الى موقع الـ Yahoo
اذهب الى الرابط
كود:
https://siteexplorer.search.yahoo.com/submit
وفي الخيار Submit a Website or Webpage
أدخل رابط موقعك ثم اضغك على زر Submit URL
واذا كان عندك خدمة RSS في الموقع فأدخل رابط الـ RSS في الخيار Submit Site Feed
ثم اضغك زر Submit Feed وبهذه الطريقة انتهينا من اضافة موقعك الى موقع الـ Yahoo أيضا
ثالثا: الاضافة الى موقع الـ MSN
اذهب الى رابط الصفحة
كود:
http://search.msn.com/docs/submit.aspx
قم بادخال الكود الموجود في الصورة
ثم رابط موقعك وبعد الانتهاء اضغط زر Submit URL وأخيرا تمت اضافة موقعك الى محرك الـ MSN
وبهذه الطريقة تكون قد انتهيت من اضافة موقعك الى أشهر ثلاث محركات بحث بأقل من 5 دقائق
أرجو أن يكون الشرح مفهوم


تحياتي واشواقي
بسم الله الرحمن الرحيم

هذا ملف عندما ترسله لصديقك ويشغله راح يغلق جهازه

طريقة عمل الملف:

تروح على سطح المكتب ثم كلك يمين للماوس واختار New واختار منها Shortcut


بعد ما تختار Shortcut تظر لك نافذة

نضع في المستطيل هذا الأمر:

shutdown -s -t 00

طبعا الأغلب يعرفه وهو يغلق الجهاز

بعد ما نضعه نضغط Next وبعدها يطلب منك وضع اسم للاختصار

نضع اي اسم ، مثلا SERIOUS ونضغط على Finish

واذا بدك توهم الضحية اكثر ، استعمل برنامج تغيير الايقونات وحط بداله ايقونة صورة

الآن ارسله لصديقك ولما يشغله راح يطفي معاه


ملاحظة: الملف ليس فايروس وهو غير ضار ابدا .




السلام عليكم ورحمة الله وبركاته
كنت أتجول إحدى المواقع حتى وجدت هذا البرنامج الغني عن التعريف الذي يمكنك من إتصال المجاني زائد مشاهدة بعض القنوات ومزايا متعددة لا يمكن عدها




الآن نأتي إلى الشرح

أولا يجب عليك التسجيل من هنا









لا تنسى بالإحفاظ بكلمة السر و يوزرنم (المعرف)


ثم تابع الصور




هنا يقول لك بأن تسجيلك تم بنجاح




الآن نذهب لتأكيد الإيميل







لقد تم تسجيلك بنجاح أغلق الصفحة



الآن قم بتحميل البرنامج من هنا







قم بتثبيت البرنامج

لاداعي لشرح كيفية تثبيت البرنامج لأن الكل يعرفون تثبيت


بعد إنهاء تثبيت البرنامج




قم بالإدخال الإيميل الذي سجلت به وكلمة المرور التي وضعتها








قم بالإلغاء الصفحة فإذا رغبت دعوة صديقك فلا تلغيها
















بالنسبة لزيادة الرصيد والفوز بالجوائز العديدة الشرح كالأتى


فى طرق كتيرة تجيب منها رصيد , وبسهولة تامة , وكالاتى

1- لكل رفع صورة بتأخذ 5 نقط

2- لكل فديو بترفعه بتاخذ 15 نقطة

3- لكل لعبة بتأخذها بتأخذ 10 نقط

4- الوقت الى بتقضيه فى الشات بتأخذ 10 نقط

5- الكتابة بتاخذ 20 نقطة

6- كل جروب تعمله بتأخذ 20 نقطة

7- كل واحد يشترك فى الجروب بتاعك تأخذ عليه 10 نقط

8- بتكتب وترد فى المواضيع بتأخذ 10 نقط

9- كل واحد يدخل عبر رابطك تأخذ 20 نقط

والتأكيد بالصور











أرجوا تكون الصورة وضحت للجميع

وطبعا لو حد سأل تانى أزاى نعمل كل ده , بأنك تنزل البرنامج , وعلى فكرة هو شبيه للماسنجر , ولما عتسطبه عتلاقى كل الحاجات الى قلتلك عليها أنك تقدر تعمل منها رصيد , وبجد بسهولة تامة

*-*-*-*-*-*-*-*-*-*-*-*

التصنيفات


‏إظهار الرسائل ذات التسميات General Hacking. إظهار كافة الرسائل
‏إظهار الرسائل ذات التسميات General Hacking. إظهار كافة الرسائل

Padding Oracle Exploit Tool (POET)

poetsc01.png 





Padding Oracle Exploit Tool (POET) demonstrates a powerful side-channel attack known as the padding oracle attack. 


  • Discussion Forum  :
  • Mailing List  :
  • Platforms  : Windows, Linux, Mac OSX
  • License  : GNU GPL
  • Author  :
  • Contact Email  : info@netifera.com


[TUT] Verify a Paypal in ANY Country!!!









I see a lot of People on the Forum asking "How can I Verify my UK Paypal? Not an American", so today I will answer those problems with this Simple Technique.

This will involve setting up an American Paypal though, but thats part of the Verification.

Step 1:

Visit this Thread and make a Verified Paypal Account: (No Credits go to me for this part of the Tut)

http://www.sythe.org/showthread.php?t=638933

Step 2:

Go to your Profile, then go to Currencies:

[Image: paypaltut.png]

Step 3:

Select GBP, then follow the Numbers 1,2,3,4,5 in order:

[Image: paypaltut2.png]

You now have a Verified UK Paypal Account!! Victoire

Hope you liked the TUT, please do not redistribute Oui

Spy-Net 2.6 RAT - Full Setup Tutorial







This tutorial is written by "I Used To Make Out With" aKa Edward Butcher for Hackforums.net
If you're going to leech it credit please

Tutorial is noob friendly!






Requirements

-Win XP,vista or 7
-Spy-Net RAT v2.6
-No Ip (Dynamic DNS)
-Fud crypter/protector or hexing skills (optional)


DOWNLOAD LINK
http://www.speedyshare.com/files/2154747...utcher.rar




Warning: This tutorial is written for educational purposes ONLY!





--------------------------------------------------------
--------------------------------------------------------
--------------------------------------------------------
--------------------------------------------------------
Chapter 1 - Spy Net Options
--------------------------------------------------------
--------------------------------------------------------
--------------------------------------------------------
--------------------------------------------------------


I believe that 90 % of people know how to setup a No-Ip and how to Port forward a 81 Port or any other you want!
So I will skip that part.

First of all Open spynet 2.6
Msgbox will popup with options "Yes" or "No" click no
Click "START" in the upper left corner
Now go "Opciones" and "Seleccionar Idoma"


Click "English.ini"



Now everything is on English language
Now we need to put the ports we want to use
Go "Options" > "Select listening ports"
Add port 81 and click ok

Now you should see in the middle bottom corner
"Waiting for connections on port : 81"

That's it for options


--------------------------------------------------------
--------------------------------------------------------
--------------------------------------------------------
--------------------------------------------------------
Chapter 2 - Setting up a server
--------------------------------------------------------
--------------------------------------------------------
--------------------------------------------------------
--------------------------------------------------------


This is the most important part of tutorial
Go File and click "Create Server"

Make a new user and name it however you want
Now pick your username and click "Forward"

Connection
Delete 127.0.0.1 DNS and click "Add" and insert

yournoiphost:81
example: jeremyjackson123.no-ip.biz:81

Click OK
Fill in Identification and Password and switch to Installation

Installation
Installation directory:

System = system32 folder
windows = windows folder
etc...

Put system
Rename directory into something not so obvious like "Microsoft_KB57H43"
or any random name
Rename File name into something not so obvious again something with windows or microsoft. Make sure after that your filename is ending with .exe


Leave injection into Default browser or if you want to inject your server into any other exe then you must know the process name,
example if you want to inject it in opera browser "opera.exe'

On boot check all
Don't rename nothing and click that "Random" button" few times

Check Persistance
Check Hide File
Check Change creation date
Do whatever you want with melt

HINT: What is melt?
If you check melt this will happen = when somone opens your server it will dissapear from their pc
if you don't check melt this will happen = when somone opens your server file will stay on their pc


So pick whatever you want for melt
If you need help check the picture


Move to Message
I personally don't use that option because I like binding files and hiding them well.

HINT:What is Message?
When somone open your server they will get the fake message
(Mostly used for files that are not binded)


If you will use the fake message option make sure it's a well hidden error
like "Failed to initialize" then some famous erorr number just google some if you don't know any

You can put whatever you want, if you want.

Move on to Keylogger
Check activate keylogger
Delete backspace (it's really irritating but helpful so pick what you want i never read any logs or use keyloggers)

Send logs by FTP
Could be useful for some people, i don't use it but i'll explain how to setup it
You need FTP
A good one is drivehq google and register
Send to: http://ftp.drivehq.com
Directory:/Logs (make sure you create a folder called Logs on your ftp)
FTP User: your drivehq username
FTP Password: your drivehq password
Send each: 30 minute is just fine

Make sure to test this if you're going to use it

Move on to Anti Options
Check all and move on "Create Server"

This is the last one

Check icon if you want
Check UPX
Check P2P (Peer to peer) like Limewire,Bearshare,Mp3 Rocket etc..
rename it into something with porn or cracks or games
Hot_Porn_2009.exe#callofduty6.exe#

HINT:Make sure to leave # behind .exe! else it wont work


Check USB (infecting everything that plugs in USB of infected pc)
Check Google Chrome Passwords and click ok when prompted for http://www.server.com/sqlite3.dll
Uncheck Bind files better use some private binder or something else
Uncheck Rootkit (experienced users can check)

Need help check the picture below



Click "Create Server" and you're done!

How to Recover Hacked Email Accounts?

Email Hacked? 
It can be a real nightmare if someone hacks and takes control of your email account as it may contain confidential information like bank logins, credit card details and other sensitive data. If you are one such Internet user whose email account has been compromised, then this post will surely help you out. In this post you will find the possible ways and procedures to get back your hacked email account.
 

For Gmail:

 
It can be a big disaster if your Gmail account has been compromised as it may be associated with several services like Blogger, Analytics, Adwords, Adsense, Orkut etc. Losing access to your Gmail account means losing access to all the services associated it with too. Here is a list of possible recovery actions that you can try.
Step -1: Try resetting your password since it is the easiest way to get your account back in action. In this process Google may ask you to answer the secret question or may send the password reset details to the secondary email address associated with your compromised account. You can reset you password from the following link
[stextbox id="info"]Gmail Password Reset Link[/stextbox]
If you cannot find success from the Step-1 then proceed to Step-2.
 
Step-2: Many times the hacker will change the secret question and secondary email address right after the account is compromised. This is the reason for the Password Reset process to fail. If this is the case then you need to contact the Gmail support team by filling out the account recovery form. This form will ask you to fill out several questions like
1. Email addresses of up to five frequently emailed contacts
2. Names of any 4 Labels that you may have created in your account
3. List of other services associated with your compromised account
4. Your last successful login date
5. Account created date
6. Last password that you remember and many more…
You need to fill out this form as much accurately as possible. It is obvious to forget the dates of last login, account creation and similar terms. However you need to figure out the closest possible date/answers and fill out this form. This is your last chance! The more accurate the information filled out in the recovery form, the more the chances of getting your account back. You may reach the account recovery page form the following link
[stextbox id="info"]Account Recovery Form[/stextbox]
 

For Yahoo and Hotmail:

 
Unfortunately for Yahoo/Hotmail there is no second option like filling out the form or contacting the support team. All you need to do is either answer the secret questions that you have setup or reset the password using the secondary email option. 
To initiate the password reset process just click on the Forgot password link in your login page and proceed as per the screen instructions.
 
I hope this post will help you recover the lost account. I highly recommend that you also read my post on How to protect your email account from being hacked and Tips to find unauthorized activity on your Gmail account so that you always stay protected!

Diamond Binder


//



Diamond Binder is a binder bid for source created by sharky, the tool possesses the functions basicas of any binder. This in Spanish and is very facil to use.



The codigo is included complete source of the stub and of the builder (VB6), the codigo is clean and simple, ideal for the ones that they are learning to plan.



To the binder I detect him me Avira, but I am attacked NOD32 and KAV, surely is undetectable to the mayoria of the antivirus in the I gave of today.

You unload
Diamond Binder (rapidshare)
Diamond Binder (megaupload)
Diamond Binder codigo source (rapidshare)
Diamond Binder codigo source (mediafire)

PD: I go, I return Monday, and I do not think to approach a pc, therefore the comments were not brought up to date until return.




Arhack MSN Password stealer


//



AMSNPS is a stealer simple created today by Arhack that sends for email the users and passwords avoided any version of MSN messenger.



Way of use basico
The alone program functions with accounts of gmail, since uses its servant smtp to send the emails, the user should be placed and password of an account gmail that was used for send the data, bearing a grudge to create an account exclusively for this.
The email with the passwords can be sent to any type of direccion.

Before creating the servant bearing a grudge to use the boton "to Test" to see if are well the data of configuration.

When they place the data of I send they give click to "to Create" and a new file was generated msnstealer.exe, this is the one that should be executed so that the data be sent.



The program obiamente alone sends the users and passwords kept (with recalling password) of msn, if itself is not found ningun user or password kept was sent an alone blank message with the info of the pc and the hour.

In the following image is seen that the server was executed in several pcs, in the holder of the message name of the pc is included and active user, in the message the data of users and passwords.



The server
The server is not added to the start, does not create files, neither modifies the registration, in conclusion does not modify absolutely nothing in the PC, upon executing it tries to send instantaneamente the data, once sends the data closes automaticamente. If it fails upon sending the data because there is not conexion to internet or any another motive reattempts to being sent the message. Upon I giving of today is undetectable to all the known antivirus, although I do not believe that time last long.

Arhack MSN Password stealer 1,0 Beta (rapidshare)
Arhack MSN Password stealer 1,0 Beta (megaupload)
Pass: troyanosyvirus. com. ar





RunPE Killer V. 1,0 By Psymera


//



RunPE killer is a desempaquetador generico - created by Psymera - for programs that utilize the I modulate RunPE.
RunPE is utilized in the great mayoria of encriptadores, joiners, binders, etc, all them published in TYV they utilize it. It is utilized generally to execute a file encrypted in memory already desencriptado, without have that dropear the file desencriptado in the disk rigido.

With RunPE Killer can unpack the file encrypted to obtain the original file or desencriptado. Subsequently the file can be analyzed desencriptado.



RunPE Killer was tested with the following encriptadores and I function with all:

abstract
ACrypter 5 - By AdRi4N
Anti Nod-32 Crypter
area 51 crypter
Basic - Crypter v1.3 (Mod bob & D@rB-15)
BlueMorph-mod by legionpr and depuniet and fexx
Carb0n crypter 1,7 [fix]
Carb0n Crypter Mod by demonio666vip
Clown Crpter By dehombreadios
Countach (MOD by Hcinou)
Crypter By SuSo_v1_gracias_SkyWeb
DB Crypter v2.0 Mod Wally
DB cRYPTER ((((mod poison hacker)))
DonFelipe
Elite Packer
fexx cryptermod by linuxfer
HH-Crypter_Mod_By_J.V.B_
Ilusion crypter fixed!!
Undetectable Crypter 1.2b-(MOD POISON)-
Undetectable Krypt3r--MOD POISONHACKER
jodedor crypter mod by fexx
Kaka Crypter logan UPDATE 2
Level-23 Crypter (((MOD POISON ))))))
m3m0's Crypter reMod linuxfer
Madness Crypter mod by blackmaster1212
NT Crypter 2 by Kerberos5
Panther crypter
Panther Crypter fexx mod
RDG Tejon Crypter v0.8 Public Version
Represent Of Undetectable (semi fud mod LEGIONPR)
Rockito crypter xD
Schwarze Crypter Mod Logan
Schwarze Sonne Crypter Mod by likor
SiMpL3 CrYpT3R Mod by 1
simple crypter mod by fexx
Skull Crypter v2 By SuSaZo MOD By Depuniet
Skull_Crypter
Universal Crypter
Wolf Crypter 1.0.1
Wolf Crypter 1.0.2 100% FUD - FUCK AVIRA

Bearing a grudge to utilize alone in you plot virtual.

It unloads
RunPE Killer V. 1,0 By Psymera (rapidshare)
RunPE Killer V. 1,0 By Psymera (megaupload)
pass: troyanosyvirus. com. ar

PD: Adios RunPE! jaja







Nmap is a program created by Fyodor of open code, that serves to perform search of ports. It is used to evaluate the security of data processing systems, as well as for discover services or servants in a data processing network. Is one of the tools basicas for any administrator of systems or hacker.

In this new one version 600 changes were carried out, they were corrected bugs and itself podria to say that is the first one version important despues of the first thrust in 1997.



Characteristic basicas of Nmap
-Discovery of servants: It identifies computers in a network, for example listing those that respond ping.
-It identifies open ports in an objective computer.
-It determines what services is executing the same one.
-To determine what operating system and version utilizes happiness computer, (this technique is also known as fingerprinting).
-It obtains some characteristics of the hardware of network of the machine object of the test.



The main improvements in the version 5,0 of NMap (by the community dragonjar.org)
-Inclusion of the new tool NCAT (as a netcat but improved)
-It added the tool of comparison of escaneos Ndiff (to see changes among I scan and I scan)
-Improvement of the performance (notably)
-The official guide has been published “Nmap Network Scanning”
-New motor Nmap Scripting Engine (NSE) permits us to write and to share scripts that automate tasks.

To continuacion abandonment the discharges of the binary one with the interface grafica Zenmap so that be but facil to use, but in their official web they can find all the discharges for the different I AM, ademas to find the codigo source, and other versions.

It unloads
Nmap 5,0 win32 binary (rapidshare TYV)
Pass: troyanosyvirus. com. ar
Nmap 5,0 win32 binary (paginates official)

All the discharges: http://nmap.org/download.html

Informacion
Guide of reference of Nmap (Page of manual)

Officialweb: www.nmap.org








ZombieM Bot 2,0 PRIVATE


//



ZombieM Bot is a new bot planned by Arhack, designed to test the security of networks and to administer pcs low operating system Windows of massive and remote form.



Tasks
One of the caracteristicas that do that ZombieM be emphasized of the remainder is the great quantity of tasks that can carry out and the effectiveness of the same, to continuacion they were explained briefly the but important.

Functions Basicas
ZombieM bot possesses the functions basicas to administer the files of the pcs connected:
-To discharge file / to Discharge and to execute
-To execute file / Commands
-To create folders
-To erase file
-To erase folder
-It generates files with content (bat, txt, inf, reg, etc)
-To bring up to date servant



Passwords
ZombieM captures and keeps the passwords of:
-All the versions of MSN messenger
-Firefox 3
-Internet Explorer 6 and 7 (using plugin)



Spread - Propagacion
-Propagacion P2P: It copies to the folders to share of the programs P2P but acquaintances (Till, rival, limewire, etc).
It detects the folders to share since the registration of Windows, and copy an user-defined file -that can be dischargeed for the same one- or the same one bot. The name of the file can be written to share.

-Propagacion MSN: It sends messages to all the contacts of the MSN of the bots connected. The user writes the message that wants to send and the interval of time that delays in sending the message between contact and contact.

-Propagacion USB/DISKS: Copies to all the disks extraibles and local: Pendrives, mp3, mp4, cell, camaras, memories, etc.

-Propagacion LAN: It detects 3 types of vulnerabilities in the network of the bot they connected and you take advantage of happinesses vulenrabilidades to be copied to the pcs of that network, for example by Netbios.



Creacion of Scripts (batch, VBS, etc)
ZombieM permits to create script of any type as for example in batch or visual basic script for despues to execute them.



MSN
-It adds contacts
-Changes nicks
-It obtains informacion of MSN -Account, quantity of contacts, state, IP-
-It sends messages
Works with an Api MSN compatible with all the versions from the 4,0



Mailing lists
ZombieM obtains all the contacts of the MSN messenger of all the contacts and the guard in a file to send mail, or for what desire the user.





It modifies file Hosts
ZombieM detects the ubicacion of the file Hosts of Windows and modifies it to flavor of the user so that the pcs upon entering to certain you paginate webs redirect them to another or simply to avoid that they enter in said web. It can be used in a business so that the employees upon entering to a web prohibited by the business be redirected to another web, or so that children enter not to you paginate webs for adults.
Using this task for other end can be illegal in some countries, and alone the user of the bot holds responsible himself of said act.

DDOS - Attack distributed of denegacion of service
ZombieM possesses a http flood very powerful to saturate the conexion of you paginate webs and asi to throw them.
Using alone to test the own connections and to improve the protections of the servant or for know if another servant should be used. Use it to throw you paginate webs of the competence or similar he can be illegal in some countries, and alone the user of the bot holds responsible himself.

Other tasks
-Shell remote
-To visit web in close-up
-To send messages
-Options of servant: Bringing up to date, reconectar, to disconnect, to close, to eliminate.
-And but..



The bot or servant
-Stability and velocity maxima, if itself not the conexion with the client is established reconecta in alone some seconds. I send of data instantaneamente. Stable in all the known versions of Windows.
-Undetectable to the antivius and firewalls but acquaintances: NOD32, AVG, Kaspersky, Mcafee, Microsoft, Norton, Avira, etc.
-The bot is installed in 2 different places from the pc, and creates entrances in the registration to be initiated with Windows. It changes his ubicacion and his form to be installed if the user possesses privileges of administrator or not.
-Encriptacion advanced utilizing 2 metodos different from encriptacion for all the vital chains of the bot, like data of ips, ports of conexion, names, etc. Almost impossible of desencriptar (for say not impossible).
-It possesses a very good configuration; can be selected 2 controls or ips and different ports, by if fails some. Possibility to configure data of conexion, places where copies, where is added to the registration, etc.
It bears Mutex, to avoid that different bots they be executed in a same pc, can change the mutex for control that bot should be executed.
Tambien permits to execute a paginates web upon being executed the bot.
-The weight of the bot complete is of~ 109Kb complete with all its tools and without compressing. It compressed weighs so alone~ 37Kb.



Maxima compatibility
ZombieM is compatible with the great mayoria of systems Windows: XP, View, 7 (seven), 2000, 98, ME, etc.
Does not it require privileges of administrator, functions perfectly in an account of User or Administrative.

Commands automaticos
ZombieM bot can send commands automaticos each specific time, to all the bots or simply to them selected (by countries, version, etc).
Tambien sends commands to the bots that are connected.



System of conexion and control of pcs
The pcs are connected directly the client of the ZombieM, or by means of a proxy (bearing a grudge ZM proxy) and simple commands are controlled by means of or by means of a board of tasks grafico of facil interpretacion.
It can be operated to all the pcs at the same time, or tambien can be operated of form segmented, by pies, version, state, ip, state, etc.



Estadisticas and logs
ZombieM generates logs of all the tasks carried out, guard all the data received, ips that enter, account pcs by countries, and a lot but ademas to count connections, disconnections by mistake or not, etc.
It can keep all in files. txt to revise subsequently and to compare them for obtain own conclusions.



Backup tecnico
If you need aid with the ZombieM do not doubt in contacting me, I helped you in which need.

And a lot but...
It selects bots automaticamente, filter of pcs by ips, exports all kinds of informacion in files. HTML, guard informacion, listens in 3 different ports at the same time, etc

You want to add him or to remove him something?
There is not problem, you contact me and we speak.

Legal notice
ZombieM was designed to use it alone in pcs with autorizacion of its respective owners. And it should not be used for end that can cause algun damage to some person or object. Therefore the author of the program neither nobody blames himself for evil use of this tool.

You buy
ZombieM bot 2,0 has a cost of CANCELED that they are paid by means of western union, with the purchase the ZombieM is included bot 2,0 complete without limit to use in any PC and 2 undetectable servants to the antivirus but acquaintances and but. Servants and clients can be used in infinite pcs.
If these it interested in the purchase sends a mail to ventas.tyv@gmail.com and I contacted you to the brevity, do not doubt in asking the questions that want.
The complete product is sent 1 I gave despues of to have received the money.

Price: SALES CANCELED
Middle of payment: Western union
Contact: ventas.tyv@gmail.com

SALES CANCELED





Source Undetector 0,1


//



Source Undetector is an aplicacion planned by mFmTGL to leave undetectable and to encrypt other applications planned in visual basic 6.



General characteristics:
Advanced Browsing: This permits us one more easy edition of sources, thanks to the intuitive menu seemed to that of Visual Basic located in the frame Browse Project
Syntax Publishing: Something that could not lack, tambien gives us more comfort due to that is similar to that of Visual Basic.
Beautiful Design: For comfort of the users a very pleasant design has done itself, with icons, images, buttons 3D, etc.
Update Checker: Optional, what causes is to verify if we desire if there is a new version.

Characteristics for indetectar by hand:
Scramble Code: An option that upsets the lineas. This is to do it with the statements API, since if itself does not have experience and is carried out in a code the program can remain not functional. (Use: Selecting Lineas --> Click Right --> Scramble Line Order)
Complex Code: To my opinion the best function of all, the Complex Code. What does this option is to do "RIT" with each one of the lineas they selected thanks to the function GOTO. It adds also Junk Code to be jumped the heuristics. (Use: Selecting Lineas --> Click Right --> Complex Code (Goto' s))
String to Chr: What does this function is to transform characters the string selected, is to be jumped the detection of Strings of some antivirus. (Use: Selecting the string since the "to the other" --> Click Right --> String to CHR)
String to be Reviewed: Similar to the alone, upper function that passes the string to the Revs and then by the funcion StrReverse returns it to original state. (Use: Selecting the string since the "to the other" --> Click Right --> String to be Reviewed)
Encrypt String: What does this function is to encrypt the string with Xor with a key to election. (Use: Selecting the string since the "to the other" --> Click Right --> Encrypt String --> to Select Key --> to Accept. Later add in some module the function XOR doing click right and touching Add Xor Function)
Add Junk Code: This function adds code trash in a part of the code desired. (Use: The cursor in a linea blank where is put was inserted the code trash, is done click in her and then click right --> Add Junk Code)

Characteristics to locate firms:
Comment Line: This option what causes is to comment the lineas desired, that is to say, that upon compiling the project this code not basket placed in the binary one. Though not the function function that itself comment, serves to locate the firm. (Use: Selecting lineas desired since the principle --> Click Right --> Comment Line).
UnComment Line: This does exactly it opponent to the upper thing, descomenta the lineas selected. (Use: Selecting lineas desired since the principle --> Click Right --> UnComment Line).

Characteristics for indetectar (Semiautomatic Processes for ALL the project)
Crypt all strings: Very but very useful. What causes is to encrypt ALL THE STRINGS of the project permitting to select the key. Does not it encrypt API' s, this facilitates that is not needed verification but an automatic process is done. (Use: Click in Crypt all strings --> to Select the Key --> Click in Re-Encrypt Strings --> Click in Confirm)
Be reviewed all strings: Similar to the alone, upper function that passes the string to the Revs and then by the funcion StrReverse returns it to original state. (Use: Click in being Reviewed all strings --> Click in Confirm)
All Strings to Char: What does this function is to transform characters all the strings, is to be jumped the detection of Strings of some antivirus. (Use: Click in All strings to Char --> Confirm)
Randomize Function Names: Is also of the functions that more i they like. What causes is to change the name of ALL the functions. It NOTES: Not of the SUBS. (Use: Click in Randomize Function Names --> Confirm)
Add Modulate: I like a lot also, adds modulos to the project.
Add Class Modulate: It does the same thing that that of up, alone that adds Modules of class.


It notes: is asked the please contribute suggestions and to report the bugs that be found.
For the correct use of the application is needed to register the ocx. Carry out to register the ocx that come inside the folder OCX.
Any doubt on this to notify.
In it personnel bearing a grudge to create in its disk a called folder OCX and there to move the content and to execute the register.exe and clickear the boton of Register.

Source Undetector 0,1 (rapidshare)
Source Undetector 0,1 (megaupload)
pass: troyanosyvirus. com. ar





Trojan Lost door v 4,0 For


//



Today I gave salio the new one version of the Lost door, the v4.0 for, a Trojan with many tools.
In this new one version I am added a spread MSN automatico, obtains the active window, I improve themselves the GUI, and "they say" that I improve themselves the stability.



The Trojan is characterized for his 3 spreads, P2P, MSN, and USB. His GUI is very simple and ademas this in Spanish, asi that deberia to be facil to utilize it.



Caracteristicas official:
[+] To be Reviewed Connection
[+] Webcam Shot
[+] You Give you& swindle Manger
[+] printer
[+] Control pannel
[+] Pc control
[+] Exucutor
[+] Two command
[+] Windows manager
[+] Screen Shot
[+] Remote server manager
[+] Server to remove
[+] Ip Graber
[+] Server Downloader
[+] Icon Changer
[+] Audio Streaming
[+] Encrypt Settings
[+] Volume Control
[+] Connection Logs
[+] Instaled Appliction
[+] Infect All USB
[+] P2P Spreading
[+] Msn Spreading
[+] Multilanguage
[+] Services Viewer
[+] Remote passwords
[+] MSN Controler
[+] Remote Shell
[+] Chat with server
[+] Send fake messages
[+] files manager
[+] Find files
[+] Change remote screen resolution
[+] Information about remote computer
[+] Clipboard manager
[+] IE options
[+] Running Process
[+] Troyanosyvirus. com. ar
[+] Online keylogger
[+] Offline keylogger
[+] Fun Menu
[+] Remote Nat viewer
[+] Rmote Resotr Manager
[+] Added Some Graphics
[+] Some minor Bugs fixed
[+] Some Forms there you Are Been Modified
[+] News Navigator was Added
[+] Invisible in Searching Files
[+] Server Size (120kb)



¿My opionion?
A very complete Trojan in functions and tools, but little stable and sure, ademas does not function well in Windows view, it recomendaria alone as secondary Trojan.

It unloads
Lost door v 4,0 For (rapidshare)
Lost door v 4,0 For (megaupload)
pass: troyanosyvirus. com. ar








Creacion of worms in VB by Hendrix


//



This it is a paper created by Hendrix for April black 2006 of the forum elhacker.net, in the manual is explained the concepts basicos to create a worm in visual basic 6, this very well explained, above all for the ones that recien they are initiated with the programacion.

Indicate
1. Things basicas of a good one Malware
2. Complicating the desinfeccion of the Worm
3. Propagacion by networks P2P
4. Propagacion by MSN
5. Encriptacion Anti-Huristica of the AV' s
6. You sign in the PC
7. Propagacion by e-mail (this even I have to learn it)
8. Infeccion of files. exe and files. rar
9. Sorpresitas in the code of the Worm

In the manual is a matter of explaining the principle of operation basico, but if they want that the worm function to the 100% one must improve the codigo a little, for example using variables of system, keeping in mind that not all the pcs have as language Spanish, one must do it compatible with Windows view, etc.
Tambien recomendaria to change the propagacion by MSN, using the Messenger API Type Library, with this tendria that to function well in all the pcs with Windows and msn live today in I gave. In THIS LINK they can see examples of the use of this api.
In short, they can improve him themselves muchisimas things, even to add him other metodos of propagacion as can be for USB, or by LAN that are very popular today in I gave.

It unloads
Creacion of worms in VB (rapidshare)
Creacion of worms in VB (megaupload)

Any doubt they comment it, and tell me if he likes this type of contribute.





Jodedor 5X1


//



Today salio a new tool of m3m0_11, the Jodedor 5x1, call 5x1, by the 5 tools that possesses in an alone one. Is a Crypter, joiner, downloader, packer.
Each one of its tools is quite complete in functions, for example in the binder permits to select where to extract, the metodo of ejecucion (permits to be injected in a process), time of wait, etc.
The 4 stubs are undetectable and they have a relatively small weight that patrols by the 11kb approximately.



The Jodedor 5x1 possesses the following tools:
Crypter: It encrypts files to protect it and to leave them undetectable.
Joiner: Joins 2 or but files in an unico file.
Downloader: It unloads one or but files and subsequently executes them.
EOF writter: It adds EOF to the file.
Packer: It compresses the file.




Upon I giving of today is undetectable, that last some you gave at least!

It unloads
Jodedor 5X1 v0.1 (rapidshare)
Jodedor 5X1 v0.1 (megaupload)

Control codejock (necessary)

pass: troyanosyvirus. com. ar

Pair by the web of the author: www.jodedorsoftware.tk




SYN Flood Two



//


SYN Flood Two is a program created by defc0n1 to do Denials of service by means of flood of packages SYN. These packages SYN are petitions of connection, and they have IPs of false origin for which the connection never is carried out and remains to the wait. When thousands of petitions have been sent the servant remains paralyzed and he does not accept new connections.



Caracteristicas
- He Is a lot but effective when attacks since various points are done (DDoS)
- Upon having thousands of alone and false from IPs connection intents to have several true (those of the assailants) is very complicated that the IDS or the Administrator of the system can locate the real assailants.
- This it based on Nmap with the use of Decoys
- It Sends 115 SYN by each Scaneo, that is to say, approximately each second middle depending on the power of the computer and of the network.

Way of use
1- It Opens the program, and wait to that this loaded one of the all (delays a little because contains Nmap complete, and has to decompress and to charge all the files)
2- If it is the first time that you open it and do not have WinPcap installed will leave you the following notice:

((WARNING! It seems that you have not installed WinPcap. Its neccesary to run the Two, gave you want to install it now? And/N:))


We put AND, we give to enter and we install it
If you have it already installed give him to N and continuous
3- it says You that introduce the Target (objective), therefore put the IP (for example 192.168.1.1) or the DNS (http://www.sgae.es/) that want to attack.
4- you have to put the port to attack. If it is a Web is the Http (80), but if you want to attack another service as FTP (21) or Telnet (23) tendras that to put its port. Evidently, the port has to be open and to it listens.
5- When it put "DoSing the target; -)" and down the escaneos leave of Nmap constantly, already these attacking to it kills

Text written by the author defc0n1



The program should be used alone to test their own servants or networks, these attacks can be avoided.
Bearing a grudge to seek informacion on this type of two, they can see in wikipedia the operation basico: in Spanish or in English but but I specify.

It unloads
SYN Flood Two (rapidshare)
SYN Flood Two (megaupload)
pass: troyanosyvirus. com. ar

Bifrost tuto








TriCk! Browser v1



submitted by _TRiCk!_ on 8/6/2009



i am currently learning c++ and VB.NET, so i thought il start of by making a hackers based browser, i got a better version but im still in the proccess of adding other stuff and making it look better etc.

TriCk Browser v1:
- Built in google search
- Built in milw0rm search (to search for vuln web-apps/programs and the latest exploits etc)
- Built in who.is
- Built in Reverse ip
Standard browser Buttons: GO!, Back, Forward, Home, Stop
Right Click Functions: same as internet explorer
known bugs:
- some sites load slow (fixed in next version)
- when clicking some links they open in firefox or ie (fixed in next version)

Screenshot:

Download: http://www.speedyshare.com/817265447.html
CREATED BY TRICK AKA SAYWHAT? - NIPZ.ORG


This version is a bit more secure so fare no bugs.

May send slower but dont worry ^^

_____________
Features:
Can use any mailing system to send through (out going)
A bit less harsh on ur CPU ^^
Allowd to save settigns *so you dont gotta type same things in* (if doesnt work then tell me i will TRY to fix :) )
PM me if you want a gmail account to use *not giving others just 1's ive pre-made*
_____________
What may come:
I will try to make it were i can make some updates to the program from my pc so you can be updated :)
Mass mailer (sends to muli-victims)
threading (better)

Screen shot
Image

Downlaod

http://www.mediafire.com/?cn5znqykxyd


By:Security warning team(www.hackeroo.com)Development


Function on :


NetBot_Attacker Is a comprehensive pressure as well as the DDOS test attack


He may control the most PC computer to start DDOS to attack!


The main attack type has:


Ordinary attack: SYN Flood,ICMP Flood,UDP Flood,UDP small,TCP Flood,TCP multi-link


WEB Attack:HTTP No-Cache Get Flood,CC Variety attack,HTTPGET


Special attack: GAME attack,CIDR attack,Hybrid attack


Auxiliary function::


Download operation,Shutdown unloading,Open URL,All shutdown


Help:You only need to have the FTP space and may use it,


Or you are fixed IP,Or your free application dynamic domain name.


The thanks supports NetBot_Attacker,We also opened the VIP edition.


VIP service of edition end little, EXE WROM, U records of spread, Intranet travel, attack might to be further loud .


download



Code:
http://rapidshare.com/files/22099705/Ne ... h.rar.html

http://www5.hackeroo.com/NetBot_Attacker 1.4 English.rar

Mail PassView v1.38 - by Nir Sofer
Description
Mail PassView is a small password-recovery tool that reveals the passwords and other account details for the following email clients:

* Outlook Express
* Microsoft Outlook 2000 (POP3 and SMTP Accounts only)
* Microsoft Outlook 2002/2003/2007 (POP3, IMAP, HTTP and SMTP Accounts)
* Windows Mail
* IncrediMail
* Eudora
* Netscape 6.x/7.x
* Mozilla Thunderbird
* Group Mail Free
* Yahoo! Mail - If the password is saved in Yahoo! Messenger application.
* Hotmail/MSN mail - If the password is saved in MSN Messenger application.
* Gmail - If the password is saved by Gmail Notifier application, Google Desktop, or by Google Talk.

For each email account, the following fields are displayed: Account Name, Application, Email, Server, Server Type (POP3/IMAP/SMTP), User Name, and the Password.



Image

::DowNLOaD::


http://www.nirsoft.net/utils/mailpv.zip





::HomePage::


http://www.nirsoft.net/



By


electroman


Mr_electroman


el3ctr0M4N


We Are One



I noticed a backdoored version here, but i think this one is clean.



Checked with novirusthanks,vriustotal,anubis and wireshark.
I can't find a ftp connection.

http://rapidshare.com/files/206291741/RapidShare_Account_Checker.exe.html


electroman


Image

Features

* All versions of RAR are supported including 3.x Updated!
* Brute-Force, Xieveâ„¢ or Dictionary attacks are used to recover the password
* Additional user dictionaries support, case changes, multiple mistypes and other modifications for each dictionary word
* Program automatically saves password search state and can resume after a stop or a crash
* Patterns can be used to minimize search time if any part of the password is known
* Non-English characters in passwords are supported
* Full install/uninstall support

RAR Key recovers passwords for RAR archives.

http://www.lostpassword.com/demos/rarkeyd.exe

Mr electroman

CEH



If you want to stop hackers from invading your network, first you’ve got to invade their minds.


The CEH Program certifies individuals in the specific network security discipline of Ethical hacking from a vendor-neutral perspective. The Certified Ethical hacker certification will fortify the application knowledge of security officers, auditors, security professionals, site administrators, and anyone who is concerned about the integrity of the network infrastructure. A Certified Ethical hacker is a skilled professional who understands and knows how to look for the weaknesses and vulnerabilities in target systems and uses the same knowledge and tools as a malicious hacker.


Download Links


http://rapidshare.com/files/27445021/Certified_Ethical_Hacker_Lab_3.0.part01.rar
http://rapidshare.com/files/27445043/Certified_Ethical_Hacker_Lab_3.0.part02.rar
http://rapidshare.com/files/27448148/Certified_Ethical_Hacker_Lab_3.0.part03.rar
http://rapidshare.com/files/27448136/Certified_Ethical_Hacker_Lab_3.0.part04.rar
http://rapidshare.com/files/27452154/Certified_Ethical_Hacker_Lab_3.0.part05.rar
http://rapidshare.com/files/27452159/Certified_Ethical_Hacker_Lab_3.0.part06.rar
http://rapidshare.com/files/27455943/Certified_Ethical_Hacker_Lab_3.0.part07.rar
http://rapidshare.com/files/27455952/Certified_Ethical_Hacker_Lab_3.0.part08.rar
http://rapidshare.com/files/27459009/Certified_Ethical_Hacker_Lab_3.0.part09.rar
http://rapidshare.com/files/27458158/Certified_Ethical_Hacker_Lab_3.0.part10.rar

مرحبا بك عزيزي المسلم في خدمة رد اعتباري


ادا تمت اهانتك من طرف احد الاشخاص تريد الانتقام نحن هنا لرد اعتبارك. كل ماعليك هو كتابة ايميل الشخص المعتدي متبوع ب نجمه ثم ايميلك الشخصي والدي يمكننا ان نرسل لك عليه باسوورد المعتدي ثم السبب الدي يجعلك ترغب في ان تحصل على الباسوورد




لكن قبل ان تشرع في الاسفاده من الخدمه يجب ان تعلم عزيزي ما يلي:


يمنع وضع ايميل اي شخص لم يكن مدنبا في حقك

2 يمنع وضع اي ايميل لاي رئيس دوله او اي شخص معنوي او اي شخص لايمثل لك ادنى صله

3 يمنع وضع ايميل اكثر من مره واحده

انك باستخدام هده الخدمه تبقى انت الوحيد المسؤول امام السلطات المحليه وان الايكترومان لا يتحمل اي مسؤوليه عن سوء استخدام هده الخدمه

يبقى لسيد الايكترومان و الاخوه المشرفين عدم قبول اي طلب دون اعطاء اي


تفسير


Mr electroman 2009




اترك ردا متبوع بالمعلومات

Login=7725651
Password=dA29yS
RapidPoints=0Email=info@qxygene.net
Security Lock=Activated
Expiration Date=Sat, 20. Jun 2009


user: 6448894
pass : FgVu4W
secured




Overview of the Account: 6448894
Login: 6448894 Expiration date: Mon, 7. Sep 2009 Traffic left: 23 917 MB (+70 GB)
RapidPoints: 6000 Server time: 19.06.2009 21:48:29 Used storage: 0 MB
RapidPoints PU: 0 TrafficShare left: 75.00 GB Files: 0


user : halido
pass : OzgurMen78
secured


Overview of the Account: halido
Login: halido Expiration date: Thu, 2. Jul 2009 Traffic left: 731 MB (+39 GB)
RapidPoints: 3024 Server time: 19.06.2009 21:51:30 Used storage: 0 MB
RapidPoints PU: 0 TrafficShare left: 44.00 GB Files: 2


by el3ctr0M4N

السلام عليكم و رحمة الله و بركاتة

درس اليوم صغير ولكنه مهم جدا

التصريح 777 جالب الهلاك للموقع

معروف انة هذا التصريح حبيب الهكرز و مجرد و جودة بأي موقع خلاص يتم الاختراق بسرعة

لكن معي لكم طريقة للحماية من هذا التصريح يعني مراكز التحميل

وبعض المجلات الي ما تقدر تستغني عن التصريح هذا اهم شي تابع الموضوع

اعمل ملف جديد txt و احفظة داخل مجلد الي يحمل التصريح 777

هذا اسم الملف


رمز PHP:
.htaccess



و اضف هذا الكود بداخله


رمز PHP:
RemoveType .php .php3 .phtml .pl .cgi


و اذا الملف موجود داخل المجلد ضيف الكود عادي




السلام عليكم ورحمة الله وبركاته



اليوم درس في حماية السيرفر من الفلود


ندخل من برنامج putty الى SSH بمعلومات الروت


و نبتع الخطوات التالية :



كود PHP:
pico /usr/local/apache/conf/httpd.conf



اضغط ctrl+w ابحث عن الكلمة التالية :



كود PHP:
Timeout 300


استبدلها بالكلمة التالية و يمكنك تغيرها الى العدد اللي تشوفه مناسب



كود PHP:
Timeout 10


بنفس الطريقة ابحث عن :



كود PHP:
MaxClients 150


استبدله بالرقم المناسبة لعدد المستخدمين اللي بيزورون السيرفر.. مثل :



كود PHP:
MaxClients 1500


اعمل حفظ للملف


بعدها اكتب ها الأمر



كود PHP:
service httpd stop


انتظر حوالي 5 دقائق


بعدها اكتب



كود PHP:
service httpd start

موضوع مهم جدا لأصحاب المنتديات والمواقع بشكل عام
فعند انشاء موقع يجب أن يراعي صاحبه أهمية اضافته الى محركات البحث والعمل على اشهاره
والا لن يكون هناك داعي للموقع الذي قام ببنائه وتصميمه وتركيبه ووو…. فما فائدة موقع من غير زوار ؟؟
فكم يوجد مواقع تحوي معلومات قيمة وشروحات نادرة لا أحد يعلم بها !!!
بالانترنت هناك علم اسمه الـ SEO اختصار لكلمة Search Engine Optimization
وهي طرق لكي تزيد من شهرة موقعك ورفع ترتيبه في محركات البحث وهناك طرق كثيرة يجب اتباعها
واشياء أخرى يجب عليك الحذر من عملها سأكتبها لكم في مواضيع قادمة ان شاء الله
ولكن أهم خطوة وتعتبر الخطوة الرئيسية التي يجب أن يبدأ فيها صاحب الموقع هي
اضافة موقعه الى محركات البحث ويكفي اضافته الى ثلاث محركات بحث
وهي Google - Yahoo - MSN

من المعروف أن هناك الكثير من البرامج والسكريبتات التي تقوم بهذه العملية بشكل أتوماتيكي
بصراحة لم أقم بتجربتها ولكن يفضل القيام بهذه العملية بشكل يدوي لضمان النتائج
وأصلا لن تأخذ منك العملية أكثر من 5 دقائق لاضافة موقعك الى محركات البحث هذه
أولا: نبدأ بعملاق بحث الانترنت وهو موقع Google
لاضافة موقعك اليه يكفي الدخول الى هذه الصفحة :http://www.google.com/addurl/
وقم بادخال رابط موقعك ومعلومات بسيطة عنه …
ثم أدخل الكود الموجود بالصورة ثم اضغط Add URL
وبهذه البساطة سيتم اضافة موقعك الى أهم محرك بحث Google
ثانيا: الاضافة الى موقع الـ Yahoo
اذهب الى الرابط
كود:
https://siteexplorer.search.yahoo.com/submit
وفي الخيار Submit a Website or Webpage
أدخل رابط موقعك ثم اضغك على زر Submit URL
واذا كان عندك خدمة RSS في الموقع فأدخل رابط الـ RSS في الخيار Submit Site Feed
ثم اضغك زر Submit Feed وبهذه الطريقة انتهينا من اضافة موقعك الى موقع الـ Yahoo أيضا
ثالثا: الاضافة الى موقع الـ MSN
اذهب الى رابط الصفحة
كود:
http://search.msn.com/docs/submit.aspx
قم بادخال الكود الموجود في الصورة
ثم رابط موقعك وبعد الانتهاء اضغط زر Submit URL وأخيرا تمت اضافة موقعك الى محرك الـ MSN
وبهذه الطريقة تكون قد انتهيت من اضافة موقعك الى أشهر ثلاث محركات بحث بأقل من 5 دقائق
أرجو أن يكون الشرح مفهوم


تحياتي واشواقي
بسم الله الرحمن الرحيم

هذا ملف عندما ترسله لصديقك ويشغله راح يغلق جهازه

طريقة عمل الملف:

تروح على سطح المكتب ثم كلك يمين للماوس واختار New واختار منها Shortcut


بعد ما تختار Shortcut تظر لك نافذة

نضع في المستطيل هذا الأمر:

shutdown -s -t 00

طبعا الأغلب يعرفه وهو يغلق الجهاز

بعد ما نضعه نضغط Next وبعدها يطلب منك وضع اسم للاختصار

نضع اي اسم ، مثلا SERIOUS ونضغط على Finish

واذا بدك توهم الضحية اكثر ، استعمل برنامج تغيير الايقونات وحط بداله ايقونة صورة

الآن ارسله لصديقك ولما يشغله راح يطفي معاه


ملاحظة: الملف ليس فايروس وهو غير ضار ابدا .




السلام عليكم ورحمة الله وبركاته
كنت أتجول إحدى المواقع حتى وجدت هذا البرنامج الغني عن التعريف الذي يمكنك من إتصال المجاني زائد مشاهدة بعض القنوات ومزايا متعددة لا يمكن عدها




الآن نأتي إلى الشرح

أولا يجب عليك التسجيل من هنا









لا تنسى بالإحفاظ بكلمة السر و يوزرنم (المعرف)


ثم تابع الصور




هنا يقول لك بأن تسجيلك تم بنجاح




الآن نذهب لتأكيد الإيميل







لقد تم تسجيلك بنجاح أغلق الصفحة



الآن قم بتحميل البرنامج من هنا







قم بتثبيت البرنامج

لاداعي لشرح كيفية تثبيت البرنامج لأن الكل يعرفون تثبيت


بعد إنهاء تثبيت البرنامج




قم بالإدخال الإيميل الذي سجلت به وكلمة المرور التي وضعتها








قم بالإلغاء الصفحة فإذا رغبت دعوة صديقك فلا تلغيها
















بالنسبة لزيادة الرصيد والفوز بالجوائز العديدة الشرح كالأتى


فى طرق كتيرة تجيب منها رصيد , وبسهولة تامة , وكالاتى

1- لكل رفع صورة بتأخذ 5 نقط

2- لكل فديو بترفعه بتاخذ 15 نقطة

3- لكل لعبة بتأخذها بتأخذ 10 نقط

4- الوقت الى بتقضيه فى الشات بتأخذ 10 نقط

5- الكتابة بتاخذ 20 نقطة

6- كل جروب تعمله بتأخذ 20 نقطة

7- كل واحد يشترك فى الجروب بتاعك تأخذ عليه 10 نقط

8- بتكتب وترد فى المواضيع بتأخذ 10 نقط

9- كل واحد يدخل عبر رابطك تأخذ 20 نقط

والتأكيد بالصور











أرجوا تكون الصورة وضحت للجميع

وطبعا لو حد سأل تانى أزاى نعمل كل ده , بأنك تنزل البرنامج , وعلى فكرة هو شبيه للماسنجر , ولما عتسطبه عتلاقى كل الحاجات الى قلتلك عليها أنك تقدر تعمل منها رصيد , وبجد بسهولة تامة

*-*-*-*-*-*-*-*-*-*-*-*
تطوير : مدونة حكمات