Home » Archives for September 2010
Download Free Quick heal total security 2010 Full Version
Quick Heal AntiVirus 2010, with its intuitive and easy-to-use interface, provides hassle-free protection for your system. Once installed it acts as a shield against viruses, worms, trojans, spywares and other malicious threats. It also provides protection against new and unknown viruses using Quick Heal's renowned DNAScan technology, and blocks malicious websites. Quick Heal AntiVirus 2010 is very low on resource usage and gives enhanced protection without slowing down your computer.
Download:
SETUP + CRACK
Code:
http://www.fileserve.com/file/WehmUAY

Download Free AVG 9.0 Build 663.1703 Pro (Full Version For 8 Years)
Anti-Virus, Anti-Spyware, Anti-Spam, LinkScanner & Firewall. Comprehensive protection for your computer! This award-winning product gives you unbeatable Internet security by protecting against viruses, spyware, hackers, spam and malicious websites. AVG Internet Security is a reliable and easy-to-use solution for home and small office users which is trusted by millions of users worldwide. Unique Internet security thanks to new technology - Only AVG gives you real-time protection against malicious websites thanks to our new LinkScanner technology. Comprehensive protection for Windows against all online threats from the world's most trusted security company. Use the Internet with confidence in your home or small office.
FEATURES:
All-in-one protection
• Anti-Virus: protection against viruses, worms and trojans
• Anti-Spyware: protection against spyware, adware and identity-theft
• Anti-Rootkit: protection against hidden threats (rootkits)
• Anti-Spam: filters out unwanted and fraudulent e-mails (anti-phishing)
• Web Shield & LinkScanner: protection against malicious websites
• Firewall: protection against hackers
• System Tools: for easy system management
Easy-to-use, automated protection
Real-time protection, automatic updates, low-impact background scanning for online threats, and instant quarantining or removal of infected files ensures maximum protection. Every interaction between your computer and the Internet is monitored, so nothing can get onto your system without your knowledge. AVG scans in real time:
• All files including documents, pictures and applications
• E-mails (all major email programs like MS Outlook and Thunderbird supported)
• Instant messaging and P2P communications
• File downloads and online transactions such as shopping and banking
• Search results and any other links you click on
Download:-
Code:
http://hotfile.com/dl/72717637/479968c/avg.warezfeak04_9.0.730.exe.html
Code:
http://www.fileserve.com/file/kTXgvfb

Adobe Photoshop CS5 (Portable) 2010 (Cracked)
In addition, Photoshop CS5 includes revolutionary tools to enhance the creative potential of users. Brand new drawing tools include a tool Mixer Brush, who mixes an infinite number of colors on one brush tool Bristle Tips, creating the effect of this smear brush. With Puppet Warp tool, users can change the position or view of any element of the image, for example, straightened his bent arm on the photos or adjust an image of the landscape to create a new spatial perspective.
Source
OS: Windows XP, Vista, 7
Language: English
The medicine: not required
Size: 122.75 MB
Download Software Here
http://www.fileserve.com/file/MUcTJT8

Security Tips Helpful Security Tips for Internet Users and Website owners
Special Thanks To Zarabyte Security
Account Security Tips
1. Try not to use common Passwords use Alphanumeric Passwords.
2. Use a Diffrent Passwords for each site you go to, Don't keep using the same password about 98% of Online Users don't use more then 10 diffrent passwords I recommend using a diffrent Password for every site since alot of people are lazy they use the same password for everything Your typical Hacker love theses kinda things makes it alot easyer to gain access to all your accounts using a diffrent Password will take them longer.
3. Another bad thing is storing important information in your E-Mail You should not keep really important information in your inbox as alot of the Hackers get snoopy and will go thru your emails looking for useful stuff like User names & Passwords for other sites Credit Card info Banking account Info ect...
4. Becareful with using Credit Cards Online Sites most websites store Your credit card info in what is called an SQL Data Base if the WebSite don't have good security on there website files good chance your credit card information could be comprised since alot of the data bases store your billing information in plain text.
Wireless Security Tips
1. Becareful when using Cyber Cafes as it is easy for a hacker to sniff your information over the Network.
2. When setting up a Wireless network don't use WEP as a WEP can be cracked really easy. Use a WPA/WPA2 and dont use a easy Password Phase.
3. Becareful when using someone else Wireless Internet try not to do anything important on Networks you dont own I recommend you buy a VPN when using a Wireless network that isn't yours as I said a hacker can sniff what HTTP information email passwords usernames even sniff AIM/Yahoo/ICQ/MSN Chats.
4. Buy a VPN if your going to be traveling alot and using wireless networks at hotels and other places. A VPN is a tunnel basicly when a hacker trys to sniff your information if your logged in thru a VPN he wont see your information.
Webmaster Security Tips
1. Protect Your visitors & Encrypt your visitors Passwords & Credit card information!
2. Check Your website for SQL Injections & Look into fixing your code.
3. Make sure your server is up to date with all security patches.
4. Hide/Rename or remove the admin folder. Or Password protect the folder

Reverse A Phisher Program
Special Thanks To Zarabyte Security
Step 1 -Head to http://reflector.red-gate.com/Download.aspx and download .NET reflector
Step 2 - Run .NET reflector
Step 3 - Download the phisher you want to reverse
Step 4 - Go into your Downloads folder and grab your phisher into .NET Reflector
Step 5 - expand your phisher
Step 6 - Open the one that is the name of the file, not the ".MY", ".MY.RESOURCES", or "-" or "references"
Step 7 - Theirs usually a form1, expand it
Step 8 - Look for button1_click, or something very similar, it's usually near the top, right click it and click
"Disassemble"
Step 9 - Now look for Network credentials, and you have the email info
Step 10 - Go to the email, check the inbox
[How to find phishers on youtube]
What to search for
MapleStory:
Meso Generator
NX Generator
Rapidshare:
Point Generator
XBL:
Xboxlive generator
Points Generator
RuneScape:
Item generator
Gold Generator
Skill Changer

A Complete List of md5 Web Crackers
Here you got a nice list with md5 crackers online enjoy:
- md5gle.com
- online md5 cracker,md5 reverse, md5 decrypt (457,354,352,282)
- md5Crack.com | online md5 cracker
- [ md5 crack password crack hash checker ]
- md5cracker.tk (MD5 Search engine by searches a total of 14 on-line crackers.)
- Index of / (5,889,729)
- AP3 Designs
- http://md5-db.com (The database is approximately 70gb)
- md5.rednoize.com - reverse engineer md5 hashes - powered by rednoize.com (56,502,235)
- GData: An Online MD5 Hash Database (3,251,106)
- TMTO[dot]ORG (306.000.000.000)
- milw0rm.com - free md5/lm hash cracking (Milw0rm Cracker db)
- BlackLight's hash cracker (2,456,288)
- .:Shell-Storm.org:. | DataBase MD5 | ( The data base currently contains 169582 passwords )
- Parallels Confixx (Need Account)
- http://passcracking.com/ (Register to increase your priority)
- http://www.xmd5.org
- Hashkiller.com
- plain-text.info
- insidepro.com
- md5decrypter.co.uk
- c0llision.net
- md5pass.info
- hashcrack.com
- generuj.pl
- authsecu.com
- md5decryption.com
- chwett.com/md5
- md5this.com
- tmto.org
- kerinci.net
- hash.db.hk
- crackfor.me
- md5hood.com
- neofusion.de
- md5.shalla.de
- md5.my-addr.com
- hashcracking.info <-- API: https://hashcracking.info/check.php?hash= {hash}
- md5.opencracking.info
- md5online.net
- macrosoftware.ro/md5
- netmd5crack.com
- bokehman.com
- hash-database.net
- thoran.eu
- md5-database.net
- web-security-services.com
- bitdelivery.net
-----------------------------------------------------------------
CRACKED PASSWORD LIST
-----------------------------------------------------------------
http://www.md5oogle.com/md5hashes.php
[ md5 crack password crack hash checker ]
milw0rm.com - free md5/lm hash cracking
darkc0de.com [ index ]
-----------------------------------------------------------------
MULTI
-----------------------------------------------------------------
md5cracker.org
md5.igrkio.info
hashkiller.com
hashchecker.de
sinhalayo159.07x.net
-----------------------------------------------------------------
IRC
-----------------------------------------------------------------
plain-text.info (irc.Plain-Text.info #rainbowcrack |||| irc.rizon.net #rainbowcrack)
md5.overclock.ch (irc.rizon.net #md5)
c0llision.net (irc.after-all.org #md5crack |||| ircd.hopto.org #md5crack)
-----------------------------------------------------------------
ICQ
-----------------------------------------------------------------
c0llision.net (427-921-047) <- md5, ntlm
hashkiller.com (405-701-776) <- md5
-----------------------------------------------------------------
LM
-----------------------------------------------------------------
lmcrack.com
plain-text.info
-----------------------------------------------------------------
NTLM
-----------------------------------------------------------------
plain-text.info
md5decrypter.co.uk
-----------------------------------------------------------------
SHA1
-----------------------------------------------------------------
md5.rednoize.com
hash.db.hk
md5decrypter.co.uk
-----------------------------------------------------------------
SHA256
-----------------------------------------------------------------
md5.shalla.de
hash.db.hk
-----------------------------------------------------------------
RAINBOW TABLE
-----------------------------------------------------------------
Free Rainbow Tables » Distributed Rainbow Cracking » LM, NTLM, MD5, SHA1, HALFLMCHALL, MSCACHE
Rainbow Tables . net

R:How to hack websites using Auto SQL I Helper V.2.7 + with images+Video Tutorial
"SQL I Helper V.2.7" tool.
At the beginning "SQLI HelperV.2.7" is a tool that can hack vulnerable websites using SQL injection. You don't have to spend hours and hours trying to find your way in a website and trying hundreds of combination's and codes to hack a website.
This tool will do it all by itself. You only have to tell it what to do.
You can download it from here: Download Link: (this should link to reiluke.i.ph and nowhere else!)
http://reiluke.i.ph/blogs/reiluke/20...download-link/
Download Video Tutorial Here
Lets start.
First you need to find the potential website that you think it might be possible to hack it. Remember that some websites are simply unhackable.
After you find your website ( better to end with "article.php?id=[number]" ) example: "http://encycl.anthropology.ru/article.php?id=1"
I will explain my tut on how to hack this website.
Check if your website can be hacked by trying to go this address :
http://encycl.anthropology.ru/article.php?id='1 <------ notice the ' before the number 1.
you should get this message:
This mean that this website can be hacked because you get an error.
Now open your SQL I Helper V.2.7
and write the link :
http://encycl.anthropology.ru/article.php?id=1 <---- without the '
here
and press the inject button.
Now you should wait until the tool finish searching for columns . Time may vary depending on your connection speed , your pc speed , and the number of columns in the website.
So now you should have this:
then select "Get database" and you get this:
http://i40.tinypic.com/znq9tz.jpg
Now select any element from the "database name" box and press the "Get tables" button , I will select "anthropo_encycl":
then select any element from the "table name" box and press the "Get columns" button , I will select "user":
then select any elements you want from the "columns name" box and press "Dump Now" , i will select "usr_login" and "usr_pass"
After clicking "Dump Now" , you should see this new window
Now copy the hash on a peace of paper and go to this website:
http://www.md5crack.com/
enter the hash and press the button "Crack that hash baby!" and you should get the source of the hash.
hash:21232f297a57a5a743894a0e4a801fc3
username: admin
hash:202cb962ac59075b964b07152d234b70
Password: 123

Download Free The Best Hacking Tools Collection
The Best Hacking Tools Collection
Collection Includes:
1. Port & IP Scaner
2. Ping & Nukes
3. Java
4. Mail Bomb
5. Chat
6. Serial Software
7. Keyboard Key Logger
8. Credit Card Generator
9. Crash Hard Drive
10.Password Recovery Tool
11.Security
12.Clients
Free Download:
1. Hotfile
2. Uploading

Online Scanners and Malware Analysers
Here is a compilation for a list of Online Scanners and Malware Analysers.
URL : Virus Total
About :
VirusTotal is a service that analyzes suspicious files and facilitates the quick detection of viruses, worms, trojans, and all kinds of malware detected by antivirus engines.
Specs:
- Free, independent service
- Use of multiple antivirus engines
- Real-time automatic updates of virus signatures
- Detailed results from each antivirus engine
- Real time global statistics
URL : Jotti's Malware Scan
About :
Jotti's malware scan is a free online service that enables you to scan suspicious files with several anti-virus programs. Scanners used are Linux versions; detection differences with Windows versions of the same scanners may occur due to implementation differences. There is a 20MB limit per file. Keep in mind that no security solution offers 100% protection, not even when it uses several anti-virus engines (for example, this scan service).
Files uploaded here are shared with anti-virus companies so detection accuracy of their anti-virus products can be improved. Read more about this in our privacy policy. If you do not want your files to be distributed, please do not send them at all.
URL : Anubis : Analysing Unknown Binaries
About :
Anubis is a tool for analyzing the behavior of Windows PE-executables with special focus on the analysis of malware. Execution of Anubis results in the generation of a report file that contains enough information to give a human user a very good impression about the purpose and the actions of the analyzed binary. The generated report includes detailed data about modifications made to the Windows registry or the file system, about interactions with the Windows Service Manager or other processes and of course it logs all generated network traffic. The analysis is based on running the binary in an emulated environment and watching i.e. analyzing its execution. The analysis focuses on the security-relevant aspects of a program's actions, which makes the analysis process easier and because the domain is more fine-grained it allows for more precise results. It is the ideal tool for the malware and virus interested person to get a quick understanding of the purpose of an unknown binary.
URL : ThreatExpert
About :
ThreatExpert (patent pending) is an advanced automated threat analysis system (ATAS) designed to analyze and report the behavior of computer viruses, worms, trojans, adware, spyware, and other security-related risks in a fully automated mode.
The ThreatExpert system produces reports with the level of technical detail that matches or exceeds antivirus industry standards such as those found in online virus encyclopedias.
URL : ViruSCAN
About :
VirSCAN.org is a FREE on-line scan service, which checks uploaded files for malware, using antivirus engines, indicated in the VirSCAN list. On uploading files you want to be checked, you can see the result of scanning and how dangerous and harmful/harmless for your computer those files are.
URL : UploadMalware
About :
UploadMalware.com is an easy way for you to submit files for analysis by anti-malware and security professionals.
URL : CWSandbox
About :
Sunbelt CWSandbox provides fast analysis of virus, spyware, trojan, or other malware samples. CWSandbox enables the automatic collection of malware from different inputs including Nepenthes, a web server/interface, or a directory.
Rapidly analyze behavior of malware - including infected trojans, Office documents, browser helper objects (BHOs), malicious URLs and more - by executing the code inside a controlled environment, the Sunbelt malware sandbox!
URL : Norman Sadbox
About :
Norman Sandbox offers -
- Free uploads of program files that you suspect are malicious or infected by malicious components, and instant analysis by Norman SandBox. The result is also sent you by email.
- In-depth information about the analysis performed by Norman SandBox of each malicious file that is uploaded. Search facility in all analyses after Registry keys, file names, etc.
- Comprehensive statistics of files that are uploaded to Norman SandBox center during the latest day, week and month. You will then be able to see tendencies in the creation of malicious software.
URL : Joebox
About :
Joebox is a simple sandbox application with a unique special concept. It is designed for automatic behaviour analysis of malware on Windows based operating systems.
URL : Microsoft Malware Protection
About :
The Microsoft Malware Protection Center (MMPC) provides world class antimalware research and response capabilities that support Microsoft's range of security products and services. With laboratories in multiple locations around the globe the MMPC is able to respond quickly and effectively to new malicious and potentially unwanted software threats wherever and whenever they arise.
URL : SuspectFile
About :
It not english.
URL : F-Secure Sample Analysis System
About :
It requires registration for a person to submit samples, but registration is free
URL : Wepawet
About :
Wepawet is a service for detecting and analyzing web-based malware. It currently handles Flash and JavaScript files. Things you can do with Wepawet -
- Determine if a page or file is malicious
- Analyze a malicious resource
- Identify the attacks launched by a malicious resource
URL : Eureka Malware Analysis Page
About :
Eureka is a binary static analysis preparation framework. It implements a novel binary unpacking strategy based on statistical bigram analysis and coarse-grained execution tracing. Eureka incorporates advanced API deobfuscation capabilities to facilitate the structural analysis of the underlying malware logic. For each uploaded binary, the Eureka service will attempt to unpack and disassemble the binary, and will produce an annotated callgraph, subroutine/data index page, strings summary, and list of embedded DNS entries.
URL : Comodo Instant Malware Analysis
About :
This is a secure malware analysis system which gives a detailed report of what an executable does including registry edits and creating of folders and deleting them.
URL : NoVirusthanks
About :
Free service that allows users to upload and scan a file with 24 Antivirus Engines. Users can also scan a website url or a remote file with the option Scan Web Address.
URL : VirusTrap
About :
VirusTrap is a commercial service for penetration testers, network auditors, system administrators who need to analyze unknown binaries during their work. Our scanner was made to help computer users identifying malicious files by scanning them with 25 antivirus engines.
URL : Online Virus Scan
About :
VirusChief is a service that analyzes suspicious files and facilitates the quick detection of viruses, worms, trojans, and all kinds of malware detected by antivirus engines.
Specs:
- Free, independent service
- Use of multiple antivirus engines
- Real-time automatic updates of virus signatures
- Detailed results from each antivirus engine
- Link output
- BB-Code output
- File deletion after the scan-report was generated
URL : FortiGaurd
About :
Yet another malware scanner which lets you upload unknown binaries and gives you a report about them via email.
URL : Filterbit - OPSWAT Metascan
About :
Powered by OPSWAT Metascan®, Filterbit™ is a free service where you can upload files for scanning, analysis and identification by multiple antivirus engines. Filterbit facilitates rapid detection of viruses, trojans, worms and other malware that may be contained within your uploaded files. In many cases, Filterbit can also scan, analyze and individually identify multiple files contained within a file archive such as Winzip, WinRar, PKZip and other types. Filterbit also analyzes the types of each uploaded file such as Microsoft Word, PDF, TXT and other types and reports this in a human readable format. Filterbit currently uses Metascan® antivirus engines from CA (Computer Associates), Norman Data Defense Systems, ClamAV, ESET, Microworld and VirusBuster.

shellz scanner
It uses some dorks to find uploaded shells, once u found a good one u can use the proxy checker to be anonymous and surf using the integrated navigator...
u need the ocx of winsock if u use the proxy finder.
http://www.megaupload.com/fr/?d=T93DHKDB

Download Free WebProxy Trojen Creator V.1.2 With Video Tutorial
This tool create a fully proxy trojan to use as private proxy..
The trojan has just only about 47kb (no icon)!
Coded by me with VB.NET and C# (.net framework v.2)
Features:
-Fully proxy server trojan with Hijacking EXE with embebbed the trojan;
-Supports multi-listening ports;
-Supports multi-connections from various clients (multi-thread system);
-Supports cookies;
-Supports SSL;
-Report IP/Ports to mail of the trojan owner.
-Assembly Manipulation(version info, change icon, etc..);
-Trojan compressed binary (anti-embebbed detection AV);
-Etc..
Screen Shots:
Download Link:
http://rapidshare.com/files/21358005...0j4n_v.1.2.rar
Video torturial:
http://rapidshare.com/files/21397609...0j4n_v.1.2.wmv

How to Fix Folder Options Missing Problem

Download Free Core Impact v7.5 Cracked
Download Free Core Impact v7.5 Cracked
With the addition of web application testing to its comprehensive network and end-user security testing capabilities, CORE IMPACT v7.5 now enables users to safely assess an organization´s security posture against the top three attack methods that jeopardize data today: penetration of network defenses through server vulnerabilities, deception of end users through social engineering attacks, and manipulation of web applications to access backend data.
The product´s unified interface provides a consistent methodology for replicating data breach attempts that spread among these attack vectors. Only IMPACT allows users to test information security in such an integrated, comprehensive, in-depth and seamless fashion.
Key new features in CORE IMPACT v7.5 include:
New Web Application Rapid Penetration Test (RPT) reduces time and experience required to test web application security
Through a series of step-by-step wizards, IMPACT streamlines the testing of web applications by automating tasks that would traditionally require significant time, effort and expertise to perform. IMPACT v7.5 extends the product’s proven RPT methodology with new Information Gathering and Attack and Penetration stages specifically designed to test web applications. The new Information Gathering stage crawls a website to identify pages to be tested, and the Attack and Penetration stage leverages dynamically created exploits to test the security of both custom and out-of-the-box
web applications.
Two new reports identify exposure to web application attacks and assist with remediation and
compliance activities
The Web Application Executive Report and the Web Application Vulnerability Report help developers and security professionals to identify and resolve web application security weaknesses. The Web Application Vulnerability Report provides detailed information about vulnerable fields and other paths of attack revealed during the testing process, identifying exactly which parts of the exposed application require development changes or other security fixes. The Web Application Executive Report provides a high-level summary of tested web applications and results to inform management of test results and to justify remediation resource requirements.
Dynamically produced exploits test custom and customized web applications
Because most web applications are either created in-house or purchased and then heavily customized, testing them for security vulnerabilities requires the creation of custom exploits. CORE IMPACT v7.5 first analyzes web applications for weaknesses and then leverages the results to dynamically create exploits that leverage real-world attack techniques – replicating the actions of an actual hacker.
When CORE IMPACT v7.5 discovers an exploitable vulnerability in a Web Application, it records the successful attack technique as a Remote File Inclusion (RFI) Agent or a SQL Agent (as applicable). The new agents allow testers to repeatedly take advantage of found vulnerabilities without having to manually manipulate the target web applications or running any code on vulnerable servers. This is done without writing code to the targeted web application server.
New Remote File Inclusion (RFI) Agent emulates attacks against PHP applications
The RFI Agent allows testers to demonstrate the consequences of a successful remote file inclusion attack by interacting with compromised PHP applications to:
Open a PHP Console – enables the tester to interact with the web application and server using PHP commands; provides direct access to backend databases and programs associated with the
web application
Open a Command Shell – enables the tester to run operating system commands on the web server
Install an IMPACT Network Agent – replicates multistaged attacks by leveraging the compromised web server as a beachhead from which to test other network systems against exploits for OS and services vulnerabilities
New SQL Agent assesses risks to backend databases
The SQL Agent allows testers to demonstrate the consequences of a successful SQL injection inclusion attack by interacting with compromised applications to:
Get Database Logins – provides a list of accounts that can access the database
Get Database Schema – retrieves the complete schema from the database, including all tables and rows
SQL Console – allows the tester to directly interact with the
SQL database
Get Database Version – retrieves the specific version information about the database that has been exposed.
http://rapidshare.com/files/247132816/CI7.rar
Crack with Immunity Debugger and Sheriff Key Generator:
Code:
http://www.sheriff-software.com/download.asp
....................................................................................................................................................................................................................
....................................................................................................................................................................................................................
....................................................................................................................................................................................................................
....................................................................................................................................................................................................................

Very Good Notepad Hacks

do
wscript.sleep 100
wshshell.sendkeys "You are a fool."
loop
@echo off
msg * I don't like you
shutdown -c "Error! You are too stupid!" -s
Save it as "Anything.BAT" in All Files .

VistaLogger
File Info
Report generated: 28.7.2009 at 22.12.43 (GMT 1)
Filename: testwindowsxp.exe
File size: 20 KB
MD5 Hash: 9bce818115941b46e31c0583c482b820
SHA1 Hash: E09D12C8B34595C97EDFA103C3339DBD4D395F4A
Self-Extract Archive: Nothing found
Binder Detector: Nothing found
Detection rate: 0 on 22
Detections
a-squared - -
Avira AntiVir - -
Avast - -
AVG - -
BitDefender - -
ClamAV - -
Comodo - -
Dr.Web - -
Ewido - -
F-PROT6 - -
Ikarus T3 - -
Kaspersky - -
McAfee - -
NOD32 v3 - -
Norman - -
Panda - -
QuickHeal - -
Solo Antivirus - -
Sophos - -
TrendMicro - -
VBA32 - -
VirusBuster - -
http://www.multiupload.com/9GLI5JZ6TE
