Tuesday, February 7, 2012

Working SENuke X


CRACKED SENUKE BLACK HAT 
  1. Download and install SEnuke X (latest):

    Code:
    http://www.senuke.com/SENukeUpdate/Installer/setup.exe

  2. Download and run Loader Installer :

    Code:
    http://senukebiz.s3.amazonaws.com/senukex/loader_install.exe
  3. If everything is OK, run SEnuke X as usual (from desktop) and login with:
  4. Email: any@any.com
  5. Password: 6b6fe7d54246452
  6. if that fails use this one : 796a561f86eef9f




Mini FAQ



"Cant start senuke" error: loader.exe installed to wrong directory. Must be placed near SEnuke.exe

Cracking porn passwords


1. Download all tools:

1. Athena II - Download Here!
2. Raptor 3 - Download Here!
3. Proxy Finder - Download Here!
4. Proxy Checker - Download Here!
5. CForce - Download Here!

2. Athena II:

1. Run Athena II.
2. Setup Athena II.
3. Click Start.

4. Wait about 5~10 min. and click stop…
5. Copy Logins.txt from Athena II folder to the desktop.

3. Raptor3

1. Open Raptor 3.
2. Go to File > Open and in the dialog open logins.txt from desktop.
3. In Tools click “Remove Duplicats”.
4. Go to Filet in Tools > Click on “Custom Filters” tab.
5. Right click in empty spot > click “Add”.
6. In filter name type “bangbros” > Action: Keep If > Filter Subject: Line > Condition: Has > Amount: Any > Filter: What: bangbros > Click Ok.
7 .Check the new made filter and click filter buton under empty spot.
8. In Generators select “Pass Leecher” > Right click at emty spot > click on “Add” > Select logins.txt from decktop > click “Leech” buton under emty spot.
9. Now go to File > Save All > Save the file as Combo.txt on desktop.

4. Proxy Finder

1. Open ProxyFinder.
2. Click “Find” button.
3. When its done click “Save” button and save as Proxy.txt on desktop.

5. Proxy Checker

1. Open Proxy Checker.
2. On Proxy field click “Load” button and load Proxy.txt from desktop.
3. Click “Start” button.
4. When its done click “Save” button on Responding Proxys field and save as CheckedProxys.txt on desktop.

6. CForce

1. Open CForce.
2. Click on “Auto” tab.
3. In url field type the members login url from the site that you want to hack.
4. At “Proxy-List” field click on “Load” button and load CheckedProxys.txt from desktop.
5. At “Combo-List” field click on “Load” button and load Combo.txt from desktop.
6. Click start and wait till its done.
7. When its done you will have working logins here.

Monday, February 6, 2012

Premium Account Daily Update


WUPLOAD PREMIUM ACCOUNT 06/02/2012

UPLOADED PREMIUM ACCOUNT 06/02/2012

FILEFACTORY PREMIUM ACCOUNT 06/02/2012

MEGASHARE PREMIUM ACCOUNT 06/02/2012

TurBobit Premium Account 06/02/2012 

Megashare Premium Account 06/02/2012

UPLOADING PREMIUM ACCOUNT 06/02/2012


DOWNLOAD LINK Read more

How To Bypass, Block, Remove and Disable CPALead Surveys


Find that filling CPALead Survey a little bit frustrating? Here’s a simple method for CPALead Bypass.Blocking CPALead.com is easy. All you need is Mozilla Firefox and a simple plugin called QuickJava.Some websites offer CPALead Scripts that bypass the surveys but cause the site to lose functionality such as Javascripts. To preserve the functions, you can remove CPALead surveys using QuickJava fast and hassle-free
All you have to do is to follow the instructions to get rid of CPALead or skip the surveys.

1. Use Mozilla Firefox with Quick Java.
After you have installed the add-on, a small statusbar will appear at the bottom of Firefox.
Js – Javascript | J – Java | F – Flash | SL – Silverlight | I – Images | CSS
2. Go to the website which you want to disable CPALead.
Wait for the website to fully load before you proceed with the following steps. This is important to maintain the functionality of the site such as Javascripts.
3. Follow these steps very carefully (according to sequence)
Click Js (to Disable Javascript), then click CSS (to disable PageStyle or NoStyle) then click Js again (to Enable Javascript)
The purpose of Disabling Javascript in the first step is to stop CPALead from redirecting you their website.
Disabling CSS will unlock CPALead’s box from blocking the website you are viewing.
Reenable Javascript to maintain the original functionality of the website.

Hcon Security Testing Framework v0.4 [Fire Base] - codename 'Freedom'

What it can do ? :
Most of the part of HconSTF is semi-automated but you still need your brain to work it out.
It can be use in all kind of security testing stages, it has tools for conducting tasks like,
1. Information gathering
2. Enumeration & Reconnaissance
3. Vulnerability assessment
4. Exploitation
5. Privilege escalation
6. Reporting
also can be used for web debugging

Is it useful for me ? :
HconSTF is very flexible and good enough for any
1. IT Security Professionals
2. Web Developers
3. IT students
or any one interested in IT security

Some Highlight Features :
Categorized and comprehensive toolset
Contains hundreds of tools and features and script for different tasks like SQLi,XSS,Dorks,OSINT to name a few
HconSTF webUI with online tools (same as the Aqua base version of HconSTF)
Each and every option is configured for penetration testing and Vulnerability assessments
Specially configured and enhanced for gaining easy & solid anonymity
Works for web app testing assessments specially for owasp top 10
Easy to use & collaborative Operating System like interface
Light on Hardware Resources
Portable - no need to install, can work from any USB storage device
Multi-Language support (feature in heavy development translators needed)
Works side-by-side with your normal web browser without any conflict issues
Works on both architectures x86 & x64 on windows XP, Vista, 7 (works with ubuntu linux using wine)
Netbook compatible - User interface is designed for using framework on small screen sizes
Free & Open source and always will be

Categories of tools :
Information gathering / Analysis
Editors / Debuggers
Exploitation / Auditing
Anonymity
Passwords
Cryptography
Database
Scripting / Automation
Network Utilities
Reporting

downloadClick to start download
Web Application Analysis

Contents

1 Backdoors
2 CMS Scanners
3 Database Assessment
3.1 MS-SQL
3.2 MYSQL
3.3 Oracle
3.4 SQL Injection Frameworks
4 Fingerprinting
5 Fuzzers
6 Proxies
7 Scanners
8 Security Training Environments and Programs
9 Testing Frameworks
10 Web Browser Assessment
11 Web Browser Plugins

Backdoors

XSS Shell 

CMS Scanners

CMS Explorer
OWASP Joomla Vulnerability Scanner
Plecost-wordpress-fingerprinter
WPScan 

Database Assessment

MS-SQL

DBPwAudit
Metacoretex
Mssqlfp
MSSQLScan
multiinjector
Pblind
SA Exploiter
SQLbrute
SQLiX
SQLMap
SQL Ninja 

MYSQL 

DBPwAudit
Metacoretex
MYSQLAudit
MySploit
Pblind
SQLCheck
SQLData
SQLiX
SQLMap
Sqlsus
UDF 

Oracle

DBPwAudit
Metacoretex
Opquery
Opwg
Oscanner
Ose
Otnsctl
Pblind
SQLbrute
SQLiX
SQLMap 

SQL Injection Frameworks

BSQL Hacker 

Fingerprinting

Wafp 

Fuzzers

FuzzDb
OWASP ZAP
PowerFuzzer
Wfuzz 

Proxies

Burpsuite
Fiddler
OWASP ZAP
Paros Proxy
ProxyStrike
Ratproxy
Webscarab 

Scanners

CSRFTester
Curl
DFF Scanner
DirBuster
Grabber
Grendel Scan
Httprint
Jmeter
Lbd
List Urls
Mini Mysqlat0r
Netsparker Community Edition
Nikto
OpenAcunetix
OWASP ZAP
SecuBat
Skipfish
SoapUI
Swfintruder
W3AF
Wapiti
WebRaider
Webshag
WMAT
x5s
Xsss
Yokoso! 

Security Training Environments and Programs

DVWA
Jarlsberg
Web Security Dojo 

Testing Frameworks

Bizploit
Sahi
Websecurify 

Web Browser Assessment

Beef
Browser Fuzzer 3 (bf3)
Browser Rider 

Web Browser Plugins

Groundspeed
X06D 

Saturday, February 4, 2012

Stealth Keylogger v1.1 (USB Spread, Antis, Server Deleter, Fud & More!

Hotmail & Gmail Support
USB Spread
Antis
Melt Server
Disable Sites
Fake Message Generator
Disable certain Windows functions in Registry
Account Info Encryption
Server Deleter (HOW TO: Simply upload text file somewhere, and set up a certain word in it, which will activate Self-Destruct of the server that reads it.To stop self destruct simply delete that word from that text file.)
File Pumper
Icon Changer


iKeyGuard - The Only iPhone/iPad Key Logger

 iKeyGuard - The Only iPhone/iPad Key Logger


There homepage: http://ikeyguard.com/

Shutdown someone PC While chatting on msn or yahoo

1) Right click on desktop, and then go New, then Shortcut.

2) Then in the "type location of the item" you want to type:
%windir%\system32\shutdown.exe -s -t 120 -c "This is a virus" or anything of your choice

The 120 you typed in can also be change at will, this is simply the amount of time they receive in till there computer will shutdown.
Once the code has been entered as you have seen above click next.

After you have given it a name click on finish.
You should now have an icon on your desktop that is called "Hack msn" or whatever name you gave it.
It is also advised you change the icon to something different,So the victim fall for it.

Xbox360 Games Easy Updater v3.0 for Linux - v2.0 for Windows

What's it?
It's a simple Linux/Windows tool to search for and download updates for your XBOX360 games directly from your PC (no need of XBOX Live!))
You have simply to select one or more XBOX360 ISOs and the program automatically will get the Media-ID (using ABGX) and will search for the latest available update on the online database of xbuc.net. Then you'll can download it directly using this program, so without the need to open any internet browser or external programs.

What's new/fixed (v3.0 - Linux ONLY):
* Completely rewritten the layout of the GUI (again)
* Now the program's window is resizable so it can fit any screen resolution
* Moved all controls from buttons into menus
* Added keyboard shortcuts to the most important commands
* Now the program saves the settings (input/output folder and modes) and automatically reload them at next startup
* New dependency for the program: gambas2-gb-settings

What's new/fixed (v2.0 - both Windows and Linux):

How to: Install & configure VMware VirtualBox and Virtual PC


Convert Physical Computer Into Virtual Machine


Virtual Machine software like VirtualBox, Virtual PC, Parallels, VMware etc, provide the utility of not only running multiple virtual environments on the host system, but also allow creating and configuring the machines as per the requirements. The Virtual Machine software are designed keeping high-end usage requirements in mind, and therefore, such applications are authorized to gain complete control over all the installed hardware and software components. While machine virtualization utilities are widely used to run disk images of operating systems, including Windows, Mac OS X, and Linux distributions, they don’t allow converting the physical into a virtual machine in order to use the entire system on other platforms in a virtual environment. Today, we look at the the simplest way to convert the local machine to virtual machine, and then configure and run it on other systems using virtualization software.
Amongst the virtualization software available out there, VMware Workstation is considered to be the most powerful machine virtualization application, enabling users to run both x86 and x64 OS editions as guest machines. Although it’s a paid utility, it offers a free VMware Player to run the pre-configured guest systems on host computer. VirtualBox, on the other hand, is a completely free virtualization software, letting users create, configure and run Virtual Machines on their systems. VirtualBox supports virtual hard disks and OS images created using VMware, and therefore, it can seamlessly run the guest machine configured via VMware. In this post, we will guide you through the process of creating a VMware Disk of local machine, and then use it on VMware, Virtual PC and VirtualBox.

Friday, February 3, 2012

The Best Tutorials all in one post

Welcome! These are useful links to help you continue in your Hacking/Programming adventure!


--------------------------------------Ebooks Sites:----------------------------------------
****General:****
http://www.freebookspot.cc
http://doc.hackbbs.org/

------------------------------Information Gathering:---------------------------------
****Search Engines: (Not Recommended)****
http://www.google.com
https://google.com/

****Private Search Engines: (Recommended)****
https://ixquick.com/

****Profile Information Websites:****
http://www.pipl.com
http://www.anywho.com/
http://www.zabasearch.com/

****Governements and business Web sites:****
http://www.hoovers.com
http://finance.yahoo.com
http://www.sec.gov/edgar.shtml
http://www.uspto.gov


****Background Checks And Other personal information:****
http://www.choisepoint.com
http://www.ussearch.com
http://www.zabasearcg.com


****Whois:****
http://www.betterwhois.com
http://www.allwhois.com
http://www.whois.net
http://www.godaddy.com
http://www.dnstools.com

------------------------------------Hacking Websites:--------------------------------------
****English:****
http://www.ubers.org
http://www.i-hacked.com
http://www.insecure.in
http://www.hacktutors.info/


Hacking tools

Nessus
The “Nessus” Project aims to provide to the internet community a free, powerful, up-to-date and easy to use remote security scanner for Linux, BSD, Solaris, and other flavors of Unix.

Ethereal
Ethereal is a free network protocol analyzer for Unix and Windows. Ethereal has several powerful features, including a rich display filter language and the ability to view the reconstructed stream of a TCP session.

Rapid Leech Server List


Last Update: 29/01/2012 11:11:53


How to get Latest XXX Passwords & Premium Accounts by Google

Go to 

http://google.com

search: http://*:*@brazzers.com
You can brazzers.com change to other site name

DONE

Bitacasa

Infinite Storage On Your Desktop
Bitcasa makes your desktop infinite. No more worries about whether your local hard drive is full or having to upgrade your cloud plan. You've got all the space you could ever use.

Data Storage Should Be Smarter
Keeping your data on your laptop or desktop is risky because they are prone to fail. That's why Bitcasa brings the cloud to your desktop. Since all files are encrypted your data is safe from everyone—even us.

No More Syncing And Copying
Bitcasa is your new hard drive. Anywhere you go. You don't need to copy files onto another drive, you keep them on the Bitcasa drive.

Sharing
Want to share a photo album? You can instantly share any of your folders in Bitcasa to friends or family.

Want to share a large file with a colleague? Sharing of any size file is completely free with Bitcasa.

Your Data Is Secure
Bitcasa encrypts your data before it is sent to the cloud. It is actually impossible for Bitcasa to access any of your data for any reason.

LINK- https://www.bitcasa.com/ 

Website for hackers


To check if a port is open:

http://www.canyouseeme.org/

To multiple scan a file for viruses:

http://vscan.novirusthanks.org/

The best online dork scanner out here:

http://dreamkiller.byethost17.com/sqli/

To check if a site is down: 

http://www.downforeveryoneorjustme.com/

A place to get newest exploits:

http://www.exploit-db.com/

Lets other people view your inserted text: 

http://pastebin.com/

The free online crypting + decrypting service:

http://www.crypo.com/

An online MD5 decrypter: 

http://www.md5decrypter.com/

The best online Admin Page Finder:

http://sc0rpion.ir/af/

Online WPA cracker:

http://wpa.darkircop.org/

Online Fake Mailer:
http://emkei.cz/

A mailing site ( it gives you a temporary email account to send and receive messages ): 

http://10minutemail.com/10MinuteMail/index.html

It gives you alternatives for program's:

http://alternativeto.net

Upload and send files to friends etc. Very quick:

http://ge.tt/


The best online Admin Page Finder:

http://sc0rpion.ir/af/

Online WPA cracker:

http://wpa.darkircop.org/

Online Fake Mailer:

http://emkei.cz/

http://10minutemail.com/10MinuteMail/index.html

Hack Security Cameras (Dorks)

nurl:ViewerFrame?Mode=intitle:Axis 2400 video server
inurl
:/view.shtml
intitle
:Live View / - AXIS
inurl
:view/view.shtml^inurl:ViewerFrame?Mode=inurl:ViewerFrame?Mode=Refresh
inurl
:axis-cgi/jpg
inurl
:axis-cgi/mjpg (motion-JPEG)inurl:view/indexFrame.shtml
inurl
:view/index.shtml
inurl
:view/view.shtml
liveapplet
intitle
:live view intitle:axis
intitle
:liveapplet
allintitle
:Network Camera NetworkCamera
intitle
:axis intitle:video server
intitle
:liveapplet inurl:LvAppl
intitle
:EvoCam inurl:webcam.html
intitle
:Live NetSnap Cam-Server feed
intitle
:Live View / - AXIS
intitle
:Live View / - AXIS 206M
intitle
:Live View / - AXIS 206W
intitle
:Live View / - AXIS 210?inurl:indexFrame.shtml Axis
inurl
:MultiCameraFrame?Mode=Motion
intitle
:start inurl:cgistart
intitle
:WJ-NT104 Main Page
intext
:MOBOTIX M1intext:Open Menu
intext
:MOBOTIX M10intext:Open Menu
intext
:MOBOTIX D10intext:Open Menu
intitle
:snc-z20 inurl:home/intitle:snc-cs3 inurl:home/intitle:snc-rz30 inurl:home/intitle:sony network camera snc-p1?intitle:sony network camera snc-m1?site:.viewnetcam.com -www.viewnetcam.com
intitle
:Toshiba Network Camera user login
intitle
:netcam live image
intitle
:i-Catcher Console Web Monitor
inurl
:”ViewerFrame?Mode=intitle:Axis 2400 video server
inurl
:/view.shtml
intitle
:”Live View / - AXIS” inurl:view/view.shtml^inurl:ViewerFrame?Mode=inurl:ViewerFrame?Mode=Refresh
inurl
:axis-cgi/jpg
inurl
:axis-cgi/mjpg (motion-JPEG)inurl:view/indexFrame.shtml
inurl
:view/index.shtml
inurl
:view/view.shtml
liveapplet
intitle
:”live view” intitle:axis
intitle
:liveapplet
allintitle
:”Network Camera NetworkCamera”
intitle
:axis intitle:”video server”
intitle
:liveapplet inurl:LvAppl
intitle
:”EvoCam” inurl:”webcam.html”
intitle
:”Live NetSnap Cam-Server feed”
intitle
:”Live View / - AXIS”
intitle
:”Live View / - AXIS 206M”
intitle
:”Live View / - AXIS 206W”
intitle
:”Live View / - AXIS 210″
inurl
:indexFrame.shtml Axis
inurl
:”MultiCameraFrame?Mode=Motion”
intitle
:start inurl:cgistart
intitle
:”WJ-NT104 Main Page”
intext
:”MOBOTIX M1″ intext:”Open Menu”
intext
:”MOBOTIX M10″ intext:”Open Menu”
intext
:”MOBOTIX D10″ intext:”Open Menu”
intitle
:snc-z20 inurl:home/intitle:snc-cs3 inurl:home/intitle:snc-rz30 inurl:home/intitle:”sony network camera snc-p1″
intitle
:”sony network camera snc-m1″
site
:.viewnetcam.com -www.viewnetcam.com
intitle
:”Toshiba Network Camera” user login
intitle
:”netcam live image”
intitle
:”i-Catcher Console Web Monitor”
 
//others, may be duplicates
 
intitle:”Live View – AXIS” inurl:view/view.shtml^inurl:ViewerFrame?Mode=inurl:ViewerFrame?Mode=Refresh
inurl
:axis-cgi/jpg
inurl
:axis-cgi/mjpg (motion-JPEG)inurl:view/indexFrame.shtml
inurl
:view/index.shtml
inurl
:view/view.shtml
liveapplet
intitle
:”live view” intitle:axis
intitle
:liveapplet
allintitle
:”Network Camera NetworkCamera”
intitle
:axis intitle:”video server”
intitle
:liveapplet inurl:LvAppl
intitle
:”EvoCam” inurl:”webcam.html”
intitle
:”Live NetSnap Cam-Server feed”
intitle
:”Live View – AXIS”
intitle
:”Live View – AXIS 206M”
intitle
:”Live View – AXIS 206W”
intitle
:”Live View – AXIS 210?inurl:indexFrame.shtml Axis
inurl
:”MultiCameraFrame?Mode=Motion”
intitle
:start inurl:cgistart
intitle
:”WJ-NT104 Main Page”
intext
:”MOBOTIX M1intext:”Open Menu”
intext
:”MOBOTIX M10intext:”Open Menu”
intext
:”MOBOTIX D10intext:”Open Menu”
intitle
:snc-z20 inurl:home/intitle:snc-cs3 inurl:home/intitle:snc-rz30 inurl:home/intitle:”sony network camera snc-p1?intitle:”sony network camera snc-m1?site:.viewnetcam.com -www.viewnetcam.com
intitle
:”Toshiba Network Camera” user login
intitle
:”netcam live image”
intitle
:”i-Catcher Console – Web Monitor”