April 2010 | Ksecurity-team

Subscribe & Don,t Miss A Free Hacking Course| Receive Daily Updates

Enter your email address:

Delivered by FeedBurner

Facebook Friend Bomber 2.0.1



Image




1. Mass Facebook Amber Alerts (New)
2. Mass Facebook Friend Requests
3. Mass Facebook Friend Messages
4. Mass Facebook Friend Pokes
5. Mass Facebook Wall Poster
6. 100% CAPTCHA Bypass*
7. Single & Unlimited Licenses



http://uploading.com/files/JYAL0JJC/Facebook_Friend_Bomber_3.0.rar.html


Read More Add your Comment 0 comments


Facebook Blaster Pro 6.0.6 - Facebook Hack Tool



Portable Facebook Blaster Pro 6.0.6

Portable Facebook Blaster Pro 6.0.6 | 19 Mb

FaceBook Blaster Pro is the internets # 1 Facebook friend adder marketing software tool. Internet marketers are experiencing a gold rush of web 3.0 FREE advertising to highly targeted leads on the fastest growing social network "Facebook". Facebook Blaster Pro can run your marketing efforts on autopilot because automation is key to your success.


Fully Automatic Benefits:

- Auto Mass Friend Requests
- Auto Mass Friend Messages
- Auto Mass Friend Wall Poster
- Auto Mass Friend Poker
- Auto Mass Amber Alerts
- Auto Mass Captcha Bypass


Download:



HOTFILE  ||  UPLOADING


Read More Add your Comment 0 comments


Hacking PHP 4.4 sites in 20 seconds



Now here is a real hacking tutorial in which I am going to hack a real website,and that too in less than 20 seconds.and I am not kidding. Actually sites with PHP Hacking PHP 4.4 sites in 20 seconds - rdhacker.blogspot.com4.4 have a SQL injection vulnerability in them which makes their Admin control panel easily accessible,and I mean in one big shot,you will be admin of that site.
Remember,this tutorial is applicable on PHP4.4 machines with Apache running in parallel with them.Also,since I will be hacking REAL websites,I will not be displaying their URL’s or else I will be gunned down (by law of course :P).It will be partial in nature,that is I WILL not be teaching each and everything to you,I assume you know basics of SQL injection/PHP injection/Google searching.

In the mean time,here is how you can start -
Step 1 – Search for them
Yep,make a Google dork to find sites running Apache and PHP 4.4 . Its quite easy.
Step 2 – Scan them
Start by scanning them using Nmap,Do and intense scan and find the open ports. If you find port 2000 open,then you have almost got it. most websites running PHP4.4 have this port for admin login.
Now just login using port 2000 ie -

http://www.website.com:2000
and you will be comfortably login into admin page like this -
You will login with port 2000 into website - rdhacker.blogspot.com
Step 3 – Hack them
Now in the fields,you have to type -
username – admin
password – a’ or 1=1 or ‘b
domain - a’ or 1=1 or ‘b
Inject the fields qith these values - rdhacker.blogspot.com
and press go,you will login into admin
and you have hacked into admin - rdhacker.blospot.com
voila..you have hacked into admin. Actually sites based on PHP 4.4 have the vulnerability in them that they are vulnerable to SQL injection.It will literally take 20 seconds.
I hope that was informative :P go learn something.

Cheers!


Read More Add your Comment 1 comments


400 Virus Source Codes - My Best Virus Code Collection






400 Virus Source Codes

  • Avispa.dr
  • Dark Avenger
  • AVA.550
  • Univ/a
  • Auspar.377
  • Auspar.338
  • OC/oops
  • Middle
  • Auspar.635
  • Aus-Term.mp.3490
  • Jeru.1413
  • OC/scud
  • Auspar.dr
  • Auspar.635
  • Auspar.615
  • Auspar
  • Aust.543
  • Auspar.424
  • Auspar.377
  • Auspar.338
  • Auspar.292a
  • Auspar.215
  • Auspar.187
  • Auspar
  • Univ/b
  • Aurea.653
  • Iron-Maiden
  • Akuku.1111
  • Akuku.889
  • Akuku.886
  • NRLG.b
  • Attitude
  • Attention.394
  • HLL.ow.4505
  • Attention.394.dam
  • Xany
  • Univ/g
  • Univ/q
  • Univ.cmp
  • OC/vcl
  • Atomant.2143
  • AT
  • Atomic.350
  • Astra.1010
  • Suriv.dr
  • Comasp
  • Shocker.cmp.7000
  • Tiebud
  • BtDr.b
  • Ash.743
  • Univ/r
  • Armagedon.y
  • Armagedon
  • Vienna
  • ARCV.Scy.1208
  • ARCV.Scroll.795ARCV.Scroll.dr)
  • ARCV.Sand.1172
  • ARCV.More
  • ARCV.Kiss
  • ARCV.Jo.986
  • ARCV.Jo.912a
  • ARCV.250.dr
  • ARCV.642
  • ARCV.639a
  • ARCV.1183.dr
  • ARCV.Anna.742.dr
  • ARCV.639a
  • ARCV.Jo.916
  • ARCV.839
  • ARCV.Slime.773
  • ARCV.Ice
  • ARCV.Ice
  • Univ/q
  • ARCV.330a
  • ARCV.255
  • Crew.2480
  • Univ/o
  • 7thSon.426
  • Arara.dr
  • Arara.1054
  • Arab.834
  • Armagedon.y
  • QScreen3
  • Suriv.1488
  • Suriv.dr
  • Dark Avenger.2000
  • Jerusalem.cr
  • Jerusalem.cr
  • APLittle.153
  • APLittle.150
  • APLittle.147
  • APLittle.142a
  • APLittle.118a
  • APLittle.153
  • Univ.topsy
  • Anti-Pascal
  • Tiny-GM.129
  • Jerusalem
  • BtDr.Unk2
  • Jeru.1605
  • AntiMIT
  • Antiexe
  • Murphy
  • Thanksgiving.mp.1253a
  • Anticad.3012a
  • Anticad.mp.4096.d
  • Anticad.2900
  • Anticad.mp.4096.a
  • Anticad.2646
  • Anthrax.mp.1024
  • Univ.ow/d
  • Vacsina.1206
  • ARCV.Anna.742.dr
  • HLLP.Animus
  • Andromeda
  • Jerusalem.ch
  • Jeru.1808.a
  • QZap141
  • Pixel.845
  • Pixel.k
  • Ambulance
  • AlphaStrike.2000
  • Alien.733.a
  • Alia.1023
  • YD.1049.a
  • Alex.1951
  • Brain
  • Albania
  • Alabama.1560.a
  • Akuku.886
  • Tiebud
  • BtDr.Aircop
  • BtDr.b
  • HLL.ow
  • HLL.cmp.8064
  • AHADisk
  • Agiplan
  • YDOC/vcl
  • Syslock.dropped
  • NRLG.b
  • V2P6.1993
  • Dead
  • BitAddict
  • ARCV.Scroll.795
  • ARCV.Scroll.dr
  • Acid.dr
  • and alot more...




Posted Image
http://rapidshare.com/files/82708010/Virus_Source.zip


Read More Add your Comment 0 comments





When you are done with this tutorial you will be able to Make and Use a keylogger that is close to fully undetectable, without the victim getting suspicious. You will be able to keylog just about anyone.

This Guide will be split into 2 parts:
1. Writing your own undetectable keylogger
- The language
- Logging and storing
- Uploading logs
2. Setting it up to be un-suspicious and trustworthy
- Binding with other files
- Making sure its existence is hidden

Before we begin I want to point out that this keylogger is NOT perfect.
It will be unable to record some symbols
It will occasionally rearrange a letter with one another if the user types fast
But the passwords should easily get through.

WRITING A KEYLOGGER !

In this guide we will be using Microsoft Visual Basic 6.0 (vb6 for short)
If you do not know/have this, dont leave just yet.
Reading this guide its not "Necessary" to have vb6 knowledge (highly recommended tho)
Download VB6 now, below



Open up VB6 and choose standard EXE.

Put on your form:
3 timers
1 label

Image


Double-click your form (design) and you see the source of our keylogger, almost empty at this point.

Image


Go back to the design and set properties for the form
Set the form name to a few random letters (title doesnt matter)
Set Visible = false
Set ShowInTaskbar = false
This should make it invisible from the user.

Image


Read More Add your Comment 3 comments


 

Members

Join Us At Facebook

Enter your email address:

Delivered by FeedBurner

© 2011 Ksecurity-team All Rights Reserved Hackguide4u Theme by Adnan Anjum Learn Hacking Online hackguide4u.blogspot.com