maanantai 26. maaliskuuta 2012

Filesonic Premium Account

User : sex1firmier67@hotmail.com
Pass : sabrina

Uploading Premium Accounts 3/26/2012

User : heilnims@hotmail.com
Pass : fifa99
User : onemore@2die4.com
Pass : norelia
User : mmahomey@yahoo.com
Pass : farside1
User : bradenbulay@yahoo.com
Pass : parsifal..1
User : blacliat@yahoo.com
Pass : 445sfs
User : bigalaz1@gmail.com
Pass : yo1234
User : agirge@gmail.com
Pass : aifam00

SPOTIFY

USER:PASS
baltort:porsche1
branny10:bingo1
Omfugufmo:s15355373

maanantai 12. maaliskuuta 2012

sunnuntai 11. maaliskuuta 2012

Hexjector


Hexjector is an Opensource,Cross Platform PHP script to automate Site Pentest for SQL Injection Vulnerabilties.

Features :
1. Check for SQL Injection Vulnerablities.
2. Pentest SQL Injection Vulnerablities.
3. Web Application Firewall Detector.
4. Scan For Admin Page
5. Manual Dump Function
6. Browser
7. SQL Injection Type Detection
8. Search For Vulnerable Sites by using Google Dork
9. MD5 Cracker


Download: Here

Top 10 Windows Hacking Tools

Top 10 Windows Hacking Tools


1. Cain & Abel – Cain & Abel is a password recovery tool for the Microsoft Windows Operating System. It allows easy recovery of various kind of passwords by sniffing the network, cracking encrypted passwords using Dictionary, Brute-Force and Cryptanalysis attacks, recording VoIP conversations, decoding scrambled passwords, revealing password boxes, uncovering cached passwords and analyzing routing protocols.




2. SuperScan – SuperScan is a powerful TCP port scanner, pinger, resolver. SuperScan 4 (Current Version) is a completely-rewritten update of the highly popular Windows port scanning tool, SuperScan.




3. GFI LANguard Network Security Scanner – GFI LANguard N.S.S. is a network vulnerability management solution that scans your network and performs over 15,000 vulnerability assessments. It identifies all possible security threats and provides you with tools to patch and secure your network. GFI LANguard N.S.S. was voted Favorite Commercial Security Tool by NMAP users for 2 years running and has been sold over 200,000 times!



4. Retina – Retina Network Security Scanner, recognised as the industry standard for vulnerability assessment, identifies known security vulnerabilities and assists in prioritising threats for remediation. Featuring fast, accurate, and non-intrusive scanning, users are able to secure their networks against even the most recent of discovered vulnerabilities.



5. SamSpade – SamSpade provides a consistent GUI and implementation for many handy network query tasks. It was designed with tracking down spammers in mind, but can be useful for many other network exploration, administration, and security tasks. It includes tools such as ping, nslookup, whois, dig, traceroute, finger, raw HTTP web browser, DNS zone transfer, SMTP relay check, website search, and more.



6. N-Stealth – N-Stealth is a commercial web server security scanner. It is generally updated more frequently than free web scanners such as whisker and nikto, but you have to pay for the privilege.



7. Solarwinds – Solarwinds contains many network monitoring, discovery and attack tools. The advanced security tools not only test internet security with the SNMP Brute Force Attack and Dictionary Attack utilities but also validate the security on Cisco Routers with the Router Security Check. The Remote TCP Reset remotely display all active sessions on a device and the Password Decryption can decrypt Type 7 Cisco Passwords. The Port Scanner allows testing for open TCP ports across IP Address and port ranges or selection of specific machines and ports.




8. Achilles – The first publicly released general-purpose web application security assessment tool. Achilles acts as a HTTP/HTTPS proxy that allows a user to intercept, log, and modify web traffic on the fly.



9. CookieDigger - CookieDigger helps identify weak cookie generation and insecure implementations of session management by web applications. The tool works by collecting and analyzing cookies issued by a web application for multiple users. The tool reports on the predictability and entropy of the cookie and whether critical information, such as user name and password, are included in the cookie values.




10. Netcat (The Network SwissArmy Knife) – Netcat was originally a Unix utility which reads and writes data across network connections, using TCP or UDP protocol. It is designed to be a reliable “back-end” tool that can be used directly or easily driven by other programs and scripts.

Top 10 Linux Hacking Tools

Top 10 Linux Hacking Tools


1. nmap – Nmap (“Network Mapper”) is a free open source utility for network exploration or security auditing. It was designed to rapidly scan large networks, although it works fine against single hosts. Nmap uses raw IP packets in novel ways to determine what hosts are available on the network, what services (application name and version) those hosts are offering, what operating systems (and OS versions) they are running, what type of packet filters/firewalls are in use, and dozens of other characteristics. Nmap runs on most types of computers and both console and graphical versions are available.




2. Nikto – Nikto is an Open Source (GPL) web server scanner which performs comprehensive tests against web servers for multiple items, including over 3200 potentially dangerous files/CGIs, versions on over 625 servers, and version specific problems on over 230 servers. Scan items and plugins are frequently updated and can be automatically updated (if desired).



3. THC-Amap – Amap is a next-generation tool for assistingnetwork penetration testing. It performs fast and reliable application protocol detection, independant on the TCP/UDP port they are being bound to.



4. Ethereal – Ethereal is used by network professionals around the world for troubleshooting, analysis, software and protocol development, and education. It has all of the standard features you would expect in a protocol analyzer, and several features not seen in any other product.



5. THC-Hydra – Number one of the biggest security holes are passwords, as every password security study shows. Hydra is a parallized login cracker which supports numerous protocols to attack. New modules are easy to add, beside that, it is flexible and very fast.



6. Metasploit Framework – The Metasploit Framework is an advanced open-source platform for developing, testing, and using exploit code. This project initially started off as a portable network game and has evolved into a powerful tool for penetration testing, exploit development, and vulnerability research.



7. John the Ripper – John the Ripper is a fast password cracker, currently available for many flavors of Unix (11 are officially supported, not counting different architectures), DOS, Win32, BeOS, and OpenVMS. Its primary purpose is to detect weak Unix passwords. Besides several crypt(3) password hash types most commonly found on various Unix flavors, supported out of the box are Kerberos AFS and Windows NT/2000/XP/2003 LM hashes, plus several more with contributed patches.




8. Nessus – Nessus is the world’s most popular vulnerability scanner used in over 75,000 organisations world-wide. Many of the world’s largest organisations are realising significant cost savings by using Nessus to audit business-critical enterprise devices and applications



9. IRPAS – Internetwork Routing Protocol Attack Suite – Routing protocols are by definition protocols, which are used by routers to communicate with each other about ways to deliver routed protocols, such as IP. While many improvements have been done to the host security since the early days of the Internet, the core of this network still uses unauthenticated services for critical communication.



10. Rainbowcrack – RainbowCrack is a general propose implementation of Philippe Oechslin’s faster time-memory trade-off technique. In short, the RainbowCrack tool is a hash cracker. A traditional brute force cracker try all possible plaintexts one by one in cracking time. It is time consuming to break complex password in this way. The idea of time-memory trade-off is to do all cracking time computation in advance and store the result in files so called “rainbow table”.

BLACKBUNTU




Blackbuntu features the following upstream components: Ubuntu 10.10, Linux 2.6.35 and Gnome 2.32.0
System requirements

- 1GHz x86 processor
- 768 MB of system memory (RAM)
- 10 GB of disk space for installation
- Graphics card capable of 800×600 resolution
- DVD-ROM drive or USB port


Community Edition 0.2
You can download the Blackbuntu Community Edition 0.2 ISO CD with the following link:


http://blackbuntu.sourceforge.net

http://www.blackbuntu.com

Turbobit Premium Account 02x 11/03/2012

Turbobit Premium Account 02x 11/03/2012

User:gaziridvan@gmail.com
Pass:asdfgh

User : tommyhav@yahoo.com
Pass : skippy


Share-Online Premium Account 11-3-2012

Share-Online Premium Account 11-3-2012

User:l33tser
Pass:4them

torstai 8. maaliskuuta 2012

Android Software Downloading Sites

1. Handango

2. Handmark

3. Handster

4. Getjar

5. Aproov

6. OpenAppMkt

7. PCWorld

Secret Hacking codes for Android Mobile Phones:

1. Complete informaton about your phone =  *#*#4636#*#*

This code can be used to get some interesting information about your phone and battery. It shows following 4 menus on screen:

- Phone information

- Battery information

- Battery history

- Usage statistics


2. Factory data reset

*#*#7780#*#*

This code can be used for a factory data reset. It'll remove following things:

- Google account setting stored in your phone

- System and application data and settings

- Downloaded applications

NOT REMOVE:

Current system software and bundled application

SD card files


3. Format android phone

  *2767*3855#


4. Phone Camera Update

*#*#34971539#*#*

This code is used to get information about phone camera. It shows following 4 menus:

- Update camera firmware in image (Don't try this option)

- Update camera firmware in SD card

- Get gamera firmware version

- Get firmware update count

Don't use first option! Phone camera stop working and you'll need to take your phone to service center to reinstall camera firmware.


5. End Call/Power

*#*#7594#*#*



6. File Copy for Creating Backup

*#*#273283*255*663282*#*#*

This code opens a File copy screen where you can backup your media files.


7. Service Mode

*#*#197328640#*#*


8. WLAN, GPS and Bluetooth Test Codes:

*#*#232339#*#* OR *#*#526#*#* OR *#*#528#*#*           - WLAN test (Use "Menu" button to start various tests)

*#*#232338#*#*                  - Shows WiFi mac

*#*#1472365#*#*                 - GPS test

*#*#1575#*#*                    - Another GPS test

*#*#232331#*#*                  - Bluetooth test

*#*#232337#*#                   - Shows Bluetooth device address



9. Codes to get Firmware version information:

*#*#4986*2650468#*#* - PDA, Phone, H/W, RFCallDate

*#*#1234#*#* - PDA and Phone

*#*#1111#*#* - FTA SW Version

*#*#2222#*#* - FTA HW Version

*#*#44336#*#* - PDA, Phone, CSC, Build Time, Changelist number



10. Codes to launch various Factory Tests:

*#*#0283#*#* - Packet Loopback

*#*#0*#*#* - LCD test

*#*#0673#*#* OR *#*#0289#*#* - Melody test

*#*#0842#*#* - Device test (Vibration test and BackLight test)

*#*#2663#*#* - Touch screen version

*#*#2664#*#* - Touch screen test

*#*#0588#*#* - Proximity sensor test

*#*#3264#*#* - RAM version

Unlock Code Generator v3.10 for Nokia

Nokia Mobile Unlock code generator unlocks the Nokia cell phones and help us to use any service provider we want.
This application will generate network unlock codes for your mobile phone which you simply enter into the phone keypad to unlock your phone to all networks.

Nokia Free unlock codes calculator  allow users to use their mobile phone with any service provider around the world.


Download


How to use Nokia mobile Unlock code generator:

1. Remove your sim card and switch on the phone

2. Type *#06# to get phone serial number and enter this into the program along with your phone model number and current network

3. Extract and install the Nokia Phone Manager. The click on Nokia Free Unlock.exe

4. Now select your mobile model.

5. Now enter your IMEI number in the IMEI box.

6. Click on calculate button and you will receive a list of unlock codes.

7. Now you have the list of codes, enter the code into your phone (use the * key for the pw+ characters)

8. Your phone will say something like 'sim restrictions lifted' and then reboot itself.

The Hacker Search


The most famous sites that list the dorks are:


IHS - http://www.hackersforcharity.org/ghdb/
Exploit-DB - http://www.exploit-db.com/google-dorks/

We see some sites or Dork Google Search: 
intext: "SteamUserPassphrase =" intext: "SteamAppUser =" - "username" - "user"





Uploading Premium Account's 8 March 2012

25X Uploading Premium Account's 8 March 2012

Username : bradenbulay@yahoo.com
Password : parsifal..1

UserName : blacliat@yahoo.com
Password : 445sfs

UserName : bigalaz1@gmail.com
Password : yo1234

UserName : 50595@charter.net
Password : bigdog

UserName : agirge@gmail.com
Password : aifam00

Username : drake94400@hotmail.com
Password : squaresoft

Username : joshkerr@gmail.com
Password : rrek1209

UserName : peter.jennen@bigpond.com
Password : snapper67

Username : djynen@gmail.com
Password : yong1eng

UserName : Tacamo@gmail.com
Password : 911711

UserName : ldmuse@yahoo.com
Password : diverdn

UserName : rodcee@hotmail.com
Password : 520711

Username : mmpk125@gmail.com
Password : sjbjmmpk

Username : Daiuy19@earthlink.net
Password : Jwmonroe

UserName : maafi_michel@yahoo.fr
Password : azur01

UserName : helziran@yahoo.com
Password : ruzzar

userName : frank@goodimpressions.co.uk
Password : rowena

UserName : apollo747@ntlworld.com
Password : 808000

UserName : pmanieri@comcast.net
Password : genesis

Username : jan-by@hotmail.com
Password : vintage

Username : bong2405@hotmail.com
Password : asasasas

UserName : piloneo@libero.it
Password : pirata

UserName : tommyhav@yahoo.com
Password : skippy

Username : chakab@msn.com
Password : 696969

Username : kreyling526@gmail.com
Password : joey526

48X Wupload Premium Account's 8 March 2012

UserName : ewfwec@auone.jp
Password : 333333

UserName : jozsi139@gmail.com
Password : walter

UserName : jameel.aboulhosn@gmail.com
Password : dude123

UserName : masahiko1@yacht.ocn.ne.jp
Password : masa0197

UserName : Qwdrert@web.de
Password : 3382169

UserName : yavuzzayim@hotmail.com
Password : 19801980

UserName : samymoustafa@upcmail.nl
Password : ihsane

UserName : jjbcsr@yahoo.com
Password : railroad

UserName : Dazza.lfc@gmail.com
Password : dazza417

UserName : davidm_13@msn.com
Password : covad456

UserName : rakeshj81@yahoo.com
Password : starry4

UserName : sealcrt@hotmail.com
Password : seal1980

UserName : Pccatcher@gmx.ch 
Password : 9grTmiMQk 

UserName : wall44street@gmail.com
Password : juice3 

UserName : albo@mail2world.com
Password : useralboraaq 

UserName : allen.blanchard@gmail.com 
Password : wysiwyg 

UserName : scotthobs@gmail.com 
Password : sausages 

UserName : jgreff@zoominternet.net
Password : xucjBIX3j

UserName : gotplansss@yahoo.com
Password : diamond

UserName : mrtakizu@gmail.com
Password : hoangvu

UserName : mouse128@singnet.com.sg
Password : mickyang

UserName : Myrdivar
Password : Shannara

UserName : notlild_bigd@yahoo.co
Password : dwyer111

UserName : piloneo@libero.it
Password : pirata

UserName : tommyhav@yahoo.com
Password : skippy

UserName : chakab@msn.com
Password : 696969

UserName : kreyling526@gmail.com
Password : joey526

UserName : helziran@yahoo.com
Password : ruzzar

userName : frank@goodimpressions.co.uk
Password : rowena

UserName : pmanieri@comcast.net
Password : genesis

UserName : jan-by@hotmail.com
Password : vintage

UserName : bong2405@hotmail.com
Password : asasasas

UserName : ldmuse@yahoo.com
Password : diverdn

UserName : rodcee@hotmail.com
Password : 520711

UserName : mmpk125@gmail.com
Password : sjbjmmpk

UserName : daiuy19@earthlink.net
Password : jwmonroe

UserName : maafi_michel@yahoo.fr
Password : azur01

UserName : onemore@2die4.com
Password : norelia

UserName : apollo747@ntlworld.com
Password : 808000

UserName : peter.jennen@bigpond.com
Password : snapper67

UserName : heilnims@hotmail.com
Password : fifa99

UserName : bmwmy 
Password : 3382169
 
UserName : ume0197
Password : masa0197

UserName : devonclubs@cableone.net
Password : birdman

UserName : dealer01
Password : dealer321

UserName : premiumaccounts1.blogspot.com@live.com
Password : premiumaccounts1.blogspot.com

UserName : dorseysr@gmail.com
Password : 123faith

Firstload Premium Account 8 March 2012

UserName : fst3051465
Password : v8f1auru

9X Fileape Premium Account's 8 March 2012

UserName : Cirus776
Password : roselawn

UserName : ironhead
Password : ironhead

UserName : wolverine
Password : wolverine

UserName : tucanz
Password : marlboro

username : broker832003
Password : steveb

UserName : eldorado
Password : eldorado

Username : kksmshh
Password : trgmgr

Username : raven21
password : raven21

Username : Escape
password : meeshaissmart

keskiviikko 7. maaliskuuta 2012

HOIC - High Orbit Ion Cannon In Action [Tutorial] [Download]




DOWNLOAD

SQL Injection with Backtrack 5 [Tutorial]

Backtrack 5R2 EtherApe snip / tutorial

Fileserving.com Premium Account 3/7/2012

User: ica24.tk@gmail.com
Pass: http://ica24.tk

Turbobit.net Premium Account 3/7/2012

User: gaziridvan@gmail.com
Pass: asdfgh

User: tommyhav@yahoo.com
Pass: skippy

Wupload Premium Account 3/7/2012

User: mouse128@singnet.com.sg
Pass: mickyang

User: wall44street@gmail.com
Pass: juice3

User: jjbcsr@yahoo.com
Pass: railroad

User: gotplansss@yahoo.com
Pass: diamond

User: pccatcher@gmx.ch
Pass: 9grTmiMQk

User: albo@mail2world.com
Pass: useralboraaq

User: ewfwec@auone.jp
Pass: 333333

User: notlild_bigd@yahoo.com
Pass: dwyer111

tiistai 6. maaliskuuta 2012

Metaslpoit Pro 4.0

Metasploit Pro helps enterprise defenders prevent data breaches by efficiently prioritizing vulnerabilities, verifying controls and mitigation strategies, and conducting real-world, collaborative, broad-scope penetration tests to improve your security risk intelligence.
Prevent data breaches

Metasploit Pro helps you improve your enterprise vulnerability management program and test how well your perimeter holds up against real world attacks:

Download

Collection Of Best Hackers Deface Pages

All html codes are shared on pastebin, copy it and paste in notepad
then edit it and save as index.html or anyname.html

1- Tiger M@te's Deface Page

Download



2- Happy Birhthday Deface Page
Download

3- Deface Page For Long Messages + Video

Download


4- #opFreedom Plestine
Designed by The Hackers army
Download


5- Lovely deface Page for Your Girlfried or loved one
 


6- Deface Page with dancing firefox script
Download



7-Multi colour deface page
Download


8- Simple Black Deface Page
Download


9-Matrix Style Deface Page
Download


10-Pro Style Deface Page
Download


9- Awesome  #opFreedom Plestine Page with New Fuctions
Download


10- Awesome Matrix style Deface Page
Download


11- Romantic deface Page with Roses
Download


12- Deface Page with Jquery
Download


13- #opmegaupload Deface Page
Download





2X Turbobit Premium Account 6 March 2012

2X Turbobit  Premium Account 6 March 2012 

Username : tommyhav@yahoo.com
Password : skippy

Username : sinicin_sv@mail.ru
Password : r3v759x

6X Usenext Premium Accounts 6 March 2012

UserName : 7498048
Password : schlumpel

UserName : Juggernaut
Password : Juggernaut

UserName : synadari
Password : synadari

UserName : Arminius
Password : Arminius

UserName : BrainmanX
Password : BrainmanX

UserName : avi-7498048-5d1
Password : D90E15AC

48X Wupload Premium Account's 6 March 2012

UserName : jozsi139@gmail.com
Password : walter

UserName : jameel.aboulhosn@gmail.com
Password : dude123

UserName : masahiko1@yacht.ocn.ne.jp
Password : masa0197

UserName : Qwdrert@web.de
Password : 3382169

UserName : ewfwec@auone.jp
Password : 333333

UserName : yavuzzayim@hotmail.com
Password : 19801980

UserName : samymoustafa@upcmail.nl
Password : ihsane

UserName : jjbcsr@yahoo.com
Password : railroad

UserName : Dazza.lfc@gmail.com
Password : dazza417

UserName : davidm_13@msn.com
Password : covad456

UserName : rakeshj81@yahoo.com
Password : starry4

UserName : sealcrt@hotmail.com
Password : seal1980

UserName : Pccatcher@gmx.ch 
Password : 9grTmiMQk 

UserName : wall44street@gmail.com
Password : juice3 

UserName : albo@mail2world.com
Password : useralboraaq 

UserName : allen.blanchard@gmail.com 
Password : wysiwyg 

UserName : scotthobs@gmail.com 
Password : sausages 

UserName : jgreff@zoominternet.net
Password : xucjBIX3j

UserName : gotplansss@yahoo.com
Password : diamond

UserName : mrtakizu@gmail.com
Password : hoangvu

UserName : mouse128@singnet.com.sg
Password : mickyang

UserName : Myrdivar
Password : Shannara

UserName : notlild_bigd@yahoo.co
Password : dwyer111

UserName : piloneo@libero.it
Password : pirata

UserName : tommyhav@yahoo.com
Password : skippy

UserName : chakab@msn.com
Password : 696969

UserName : kreyling526@gmail.com
Password : joey526

UserName : helziran@yahoo.com
Password : ruzzar

userName : frank@goodimpressions.co.uk
Password : rowena

UserName : pmanieri@comcast.net
Password : genesis

UserName : jan-by@hotmail.com
Password : vintage

UserName : bong2405@hotmail.com
Password : asasasas

UserName : ldmuse@yahoo.com
Password : diverdn

UserName : rodcee@hotmail.com
Password : 520711

UserName : mmpk125@gmail.com
Password : sjbjmmpk

UserName : daiuy19@earthlink.net
Password : jwmonroe

UserName : maafi_michel@yahoo.fr
Password : azur01

UserName : onemore@2die4.com
Password : norelia

UserName : apollo747@ntlworld.com
Password : 808000

UserName : peter.jennen@bigpond.com
Password : snapper67

UserName : heilnims@hotmail.com
Password : fifa99

UserName : bmwmy 
Password : 3382169
 
UserName : ume0197
Password : masa0197

UserName : devonclubs@cableone.net
Password : birdman

UserName : dealer01
Password : dealer321

UserName : premiumaccounts1.blogspot.com@live.com
Password : premiumaccounts1.blogspot.com

UserName : dorseysr@gmail.com
Password : 123faith

maanantai 5. maaliskuuta 2012

Open Torrent Trackers

See which torrent trackers is open to register



OpenTrackers.net

FileSharingZ.com

TorrentInvites.org

The Mole v0.3 Released : Automatic SQL Injection Exploitation Tool




Nasel has just released the new version of The Mole, an automatic SQL Injection exploitation tool. Only by providing a vulnerable URL and a valid string on the site it can detect the injection and exploit it, either by using the union technique or a boolean query based technique.


Feature:
  • Support for injections using Mysql, SQL Server, Postgres and Oracle databases.
  • Command line interface. Different commands trigger different actions.
  • Auto-completion for commands, command arguments and database, table and columns names.
  • Support for filters, in order to bypass certain IPS/IDS rules using generic filters, and the possibility of creating new ones easily.
  • Exploits SQL Injections through GET/POST/Cookie parameters.
  • Developed in python 3.
  • Exploits SQL Injections that return binary data.
  • Powerful command interpreter to simplify its usage.


    Download

    Tutorial

    The Hacker News

Megashare premium Accounts 05/03/2012

User : cuto_eto@hotmail.com
Pass : 4d560dc07f218

User : jonnydeep1970@virgilio.it
Pass : 4d835917a4592

IObit Game Booster 2.0 Premium Key 5 March 2012

Your license code is: 1C8D2-C2FB3-7CA4B-AFCB9

Huge List Of Porn Accounts

Download List

Hacked Yahoo Acounts

mlogin.yahoo.com/w/login/user?_done=widget%3Aygo-mail%2Fhome.bp&.intl=IN&.lang=en
in&_httpHost=m.yahoo.com


minybily:lennon
fflp33:33fflp
r4975r:r2152r
skjalk:Fenris62
cupmocha:cupmocha
mikesaguy:silvertree
whbjwhbj:cbcbcbcb
song2bird2001:song2001
copperheader8:helpme
dpa789kd:dgr9158
kielosa:kwiettie
radbama07:U1dwaz90
zoldakma:superfly
okeefesf:cobra577
inondatore:skizz73
pandub44:solo44
cgof_be:steve00
spikedudej:ainttellin
rkelly1982:wildcats
michael1003z:merlin8469
dathnna:124311
mmnd90:101495
goavs77:paradidl
eyhp2002:376378
darbdes:youthere
slo992:suzuki
jeeperman42:basset42
kansas055:tfsj40b
lankster223:futbol10
lfvegas:felipe
zfresh4lif:sarahnot
vinscoco:1295nw13
yrr3j2:jerome2
mparvedson:sullivan
skachru:erjkb122
dlriv83:ededed
roylaker:goebel
chrisch12:sinusitis
Croydondms:titans
tfdrummerboy:thewayne
pheimlicher:159265
coparush:crimson
ADX3018:TORIAD
tucpatsfan:sunshine
Ron543x:theresa
ARKITECT86:DESOLATE
drdfog:baylee
tspecops:hooyah
bremdawg:18436572
Ephebe22:jbinoche
evilfatso:phycoflab
jsepoch:172428
beyder28:blacksea
trek53189:trekbike
Tuldian:ranger
mars1bug:marsbug1
ependola:hello123
crispix120:bobbyboy

Minecraft premium Accounts

sebono:tepl0010
keeslime:dialauszionease
shappurfumysorb:jwilliams
mtdude123:moulder50
Comstar:Pharma5
ander604:mgmidget

Dolemite:roemmelt
Kirschcg:barmby
McLeod10:mighty12
brian23:sirtorch
orinoko:klaus11
gavina:halmcg
charles:fight25
lesner:rmconti
kevin125:phins34

duessex:pybubideb1109
darkness777:ajk231
Chris1127:muhi95
lippold:ga9ddd
BATCYCLE:gofannon
joshua:zayeds
halloxx:handy48
he2rzon:hockey87
parkinso:test

TIGHTBU2:BallerDave
Duane611:C6vyJ5E
KWwJyzy:KyxpJKw
VNu3k8xf:baxter
cougarx1:evrzvdm
gfpam33:gndsc85
gnjsbya:Wujiman
ajaxxx:akcasket
breakeym:adambaum
chonny:hmvpc39
ivorted:ugrate

wirehead17:afo123
slurpawitz:jpstumps
laidigk:Ja307757
Complet:merlini
bda621:Velvet010
Mature1:Rich6372
dadden1966:lamaro

sunnuntai 4. maaliskuuta 2012

Net Tools 5



Download

Contents

Net Tools 5.0 (build 70) contains a whole variety of network tools. Here is a list of the most important tools:
1) IP Address Scanner
2) IP Calculator
3) IP Converter
4) Port Listener
5) Port Scanner
6) Ping
7) NetStat (2 ways)
8) Trace Route (2 ways)
9) TCP/IP Configuration
10) Online - Offline Checker
11) Resolve Host & IP
12) Time Sync
13) Whois & MX Lookup
14) Connect0r
15) Connection Analysator and protector
16) Net Sender
17) E-mail seeker
18) Net Pager
19) Active and Passive port scanner
20) Spoofer
21) Hack Trapper
22) HTTP flooder (DoS)
23) Mass Website Visiter
24) Advanced Port Scanner
25) Trojan Hunter (Multi IP)
26) Port Connecter Tool
27) Advanced Spoofer
28) Advanced Anonymous E-mailer
29) Simple Anonymous E-mailer
30) Anonymous E-mailer with Attachment Support
31) Mass E-mailer
32) E-mail Bomber
33) E-mail Spoofer
34) Simple Port Scanner (fast)
35) Advanced Netstat Monitoring
36) X Pinger
37) Web Page Scanner
38) Fast Port Scanner
39) Deep Port Scanner
40) Fastest Host Scanner (UDP)
41) Get Header
42) Open Port Scanner
43) Multi Port Scanner
44) HTTP scanner (Open port 80 subnet scanner)
45) Multi Ping for Cisco Routers
46) TCP Packet Sniffer
47) UDP flooder
48) Resolve and Ping
49) Multi IP ping
50) File Dependency Sniffer
51) EXE-joiner (bind 2 files)
52) Encrypter
53) Advanced Encryption
54) File Difference Engine
55) File Comparasion
56) Mass File Renamer
57) Add Bytes to EXE
58) Variable Encryption
59) Simple File Encryption
60) ASCII to Binary (and Binary to ASCII)
61) Enigma
62) Password Unmasker
63) Credit Card Number Validate and Generate
64) Create Local HTTP Server
65) eXtreme UDP Flooder
66) Web Server Scanner
67) Force Reboot
68) Webpage Info Seeker
69) Bouncer
70) Advanced Packet Sniffer
71) IRC server creater
72) Connection Tester
73) Fake Mail Sender
74) Bandwidth Monitor
75) Remote Desktop Protocol Scanner
76) MX Query
77) Messenger Packet Sniffer
78) API Spy
79) DHCP Restart
80) File Merger
81) E-mail Extractor (crawler / harvester bot)
82) Open FTP Scanner
83) Advanced System Locker
84) Advanced System Information
85) CPU Monitor
86) Windows Startup Manager
87) Process Checker
88) IP String Collecter
89) Mass Auto-Emailer (Database mailer; Spammer)
90) Central Server (Base Server; Echo Server; Time Server; Telnet Server; HTTP Server; FTP Server)
91) Fishing Port Scanner (with named ports)
92) Mouse Record / Play Automation (Macro Tool)
93) Internet / LAN Messenger Chat (Server + Client)
94) Timer Shutdown/Restart/Log Off/Hibernate/Suspend/ Control
95) Hash MD5 Checker
96) Port Connect - Listen tool
97) Internet MAC Address Scanner (Multiple IP)
98) Connection Manager / Monitor
99) Direct Peer Connecter (Send/Receive files + chat)
100) Force Application Termination (against Viruses and Spyware)
101) Easy and Fast Screenshot Maker (also Web Hex Color Picker)
102) COM Detect and Test
103) Create Virtual Drives
104) URL Encoder
105) WEP/WPA Key Generator
106) Sniffer.NET
107) File Shredder
108) Local Access Enumerater
109) Steganographer (Art of hiding secret data in pictures)
110) Subnet Calculater
111) Domain to IP (DNS)
112) Get SNMP Variables
113) Internet Explorer Password Revealer
114) Advanced Multi Port Scanner
115) Port Identification List (+port scanner)
116) Get Quick Net Info
117) Get Remote MAC Address
118) Share Add
119) Net Wanderer
120) WhoIs Console
121) Cookies Analyser
122) Hide Secret Data In Files
123) Packet Generator
124) Secure File Splitting
125) My File Protection (Password Protect Files, File Injections)
126) Dynamic Switch Port Mapper
127) Internet Logger (Log URL)
128) Get Whois Servers
129) File Split&Merge
130) Hide Drive
131) Extract E-mails from Documents
132) Net Tools Mini (Client/Server, Scan, ICMP, Net Statistics, Interactive, Raw Packets, DNS, Whois, ARP, Computer's IP, Wake On LAN)
133) Hook Spy
134) Software Uninstaller
135) Tweak & Clean XP
136) Steganographic Random Byte Encryption
137) NetTools Notepad (encrypt your sensitive data)
138) File Encrypter/Decrypter
139) Quick Proxy Server
140) Connection Redirector (HTTP, IRC, ... All protocols supported)
141) Local E-mail Extractor
142) Recursive E-mail Extractor
143) Outlook Express E-mail Extractor
144) Telnet Client
145) Fast Ip Catcher
146) Monitor Host IP
147) FreeMAC (MAC Address Editor)
148) QuickFTP Server (+user accounts support)
149) NetTools Macro Recorder/Player (Keybord and Mouse Hook)
150) Network Protocol Analyzer
151) Steganographic Tools (Picture, Sounds, ZIP Compression and Misc Methods)
152) WebMirror (Website Ripper)
153) GeoLocate IP
154) Google PageRank Calculator
155) Google Link Crawler (Web Result Grabber)
156) Network Adapter Binder
157) Remote LAN PC Lister
158) Fast Sinusoidal Encryption
159) Software Scanner
160) Fast FTP Client
161) Network Traffic Analysis
162) Network Traffic Visualiser
163) Internet Protocol Scanner
164) Net Meter (Bandwidth Traffic Meter)
165) Net Configuration Switcher
166) Advanced System Hardware Info
167) Live System Information
168) Network Profiler
169) Network Browser
170) Quick Website Maker and Web Gallery Creator
171) Remote PC Shutdown
172) Serial Port Terminal
173) Standard Encryptor
174) Tray Minimizer
175) Extra Tools (nmap console & win32 version)

Many extra features and utilities are included in this package!

Netflix Premium Accounts 04/03/2012

User:ytrewq
Pass:qwerty

User:friendlycow@gmail.com
Pass:homers

User:lauretta
Pass:lauretta

User:mendez
Pass:mendez

Megashare premium Accounts 04/03/2012

User:cuto_eto@hotmail.com
Pass:4d560dc07f218

User:jonnydeep1970@virgilio.it
Pass:4d835917a4592

UltraISO Premium 9.3.6 Serial Keys 5 March 2012

Name: stereo52
Serial: 3686-1CCC-2CB1-A21C

Name: smaster
Serial: 4E3E-12C9-2CAE-0FA1

Name: hroy8
Serial: 6C74-5DCC-EB96-7C21

Name: nek331
Serial: 377-A13A-8D59-D8C4

Name: paniPond
Serial: 5CF3-9FE7-EDBE-2B4E

Name: ecords
Serial: 5F3B-CB13-DC2D-7D8D

Name: urnbichler
Serial: A28C-B44F-5BF8-53E9

Name: winxp89
Serial: 0EDC-A98B-88A4-4FA8

Name: kazett1
Serial: 32FD-C6E6-7C5D-F3DE

Name: bansheeq
Serial: 178B-0B1D-E1C3-7251

lauantai 3. maaliskuuta 2012

HOTFILE PREMIUM ACCOUNTS 4/03/2012

User: feosar-Wardom-Com.tr2
Pass: siryiq

Cheathappens Premium Accounts 4 March 2012

achaurn:spuddy
lahe20:heisan02
cliffro:biggone

Wupload Premium Accounts

User: rakeshj81@yahoo.com 
Pass: starry4
User: sealcrt@hotmail.com
Pass: seal1980
User: jozsi139@gmail.com
Pass: walter
User: jameel.aboulhosn@gmail.com
Pass: dude123
user: scotthobs@gmail.com
pass: sausages
user: samymoustafa@upcmail.nl
pass: ihsane
User: jjbcsr@yahoo.com
Pass: railroad
User: Dazza.lfc@gmail.com
Pass: dazza417
User: masahiko1@yacht.ocn.ne.jp
Pass: masa0197
User: Qwdrert@web.de
Pass: 3382169
User: Yavuzzayim@hotmail.com
Pass: 19801980
User: ewfwec@auone.jp
Pass: 333333
user: allen.blanchard@gmail.com
pass: wysiwyg
User: Pccatcher@gmx.ch
Pass: 9grTmiMQk
user: albo@mail2world.com
Pass: useralboraaq

Grey Hat Hacking The Ethical Hackers Handbook (Mcgraw-2011-Ed3)


THE LATEST STRATEGIES FOR UNCOVERING TODAY'S MOST DEVASTATING ATTACKS
Thwart malicious network intrusion by using cutting-edge techniques for finding and fixing security flaws. Fully updated and expanded with nine new chapters, Gray Hat Hacking: The Ethical Hacker's Handbook, Third Edition details the most recent vulnerabilities and remedies along with legal disclosure methods. Learn from the experts how hackers target systems, defeat production schemes, write malicious code, and exploit flaws in Windows and Linux systems. Malware analysis, penetration testing, SCADA, VoIP, and Web security are also covered in this comprehensive resource.

  • Develop and launch exploits using BackTrack and Metasploit
  • Employ physical, social engineering, and insider attack techniques
  • Build Perl, Python, and Ruby scripts that initiate stack buffer overflows
  • Understand and prevent malicious content in Adobe, Office, and multimedia files
  • Detect and block client-side, Web server, VoIP, and SCADA attacks
  • Reverse engineer, fuzz, and decompile Windows and Linux software
  • Develop SQL injection, cross-site scripting, and forgery exploits
  • Trap malware and rootkits using honeypots and SandBoxes

  • ISBN: 0071742557
    Publisher: McGraw-Hill Osborne Media
    Date: 2011-01-06
    Pages: 720
    Author: Allen Harper, Shon Harris, Jonathan Ness, Chris Eagle, Gideon Lenkey, Terron Williams


    Download PDF

    Hacking and Securing iOS Applications: Stealing Data, Hijacking Software, and How to Prevent It

    If you're an app developer with a solid foundation in Objective-C, this book is an absolute must--chances are very high that your company's iOS applications are vulnerable to attack. That's because malicious attackers now use an arsenal of tools to reverse-engineer, trace, and manipulate applications in ways that most programmers aren't aware of. This guide illustrates several types of iOS attacks, as well as the tools and techniques that hackers use. You'll learn best practices to help protect your applications, and discover how important it is to understand and strategize like your adversary.

  • Examine subtle vulnerabilities in real-world applications--and avoid the same problems in your apps
  • Learn how attackers infect apps with malware through code injection
  • Discover how attackers defeat iOS keychain and data-protection encryption
  • Use a debugger and custom code injection to manipulate the runtime Objective-C environment
  • Prevent attackers from hijacking SSL sessions and stealing traffic
  • Securely delete files and design your apps to prevent forensic data leakage
  • Avoid debugging abuse, validate the integrity of run-time classes, and make your code harder to trace


    ISBN: 1449318746
    Publisher: O'Reilly Media
    Date: 2012-01-25
    Pages: 356
    Author: Jonathan Zdziarski


    Download PDF
  • Realitykings.Com Premium Account 3 March 2012

    http://members.realitykings.com 21limpid:kain48

    http://members.realitykings.com 23w5vxgdh8:k6gvfa

    http://members.realitykings.com 2z4hr2uv7v:actmmp

    http://members.realitykings.com 31pileacib:skillsigof18

    Meatmembers.Com Premium Account 3 March 2012

    Tämä yhteenveto ei ole käytettävissä. Näytä postaus klikkaamalla tätä.

    perjantai 2. maaliskuuta 2012

    Beini 1.2.1 WiFi Hacking Linux Distro

    Best Security Linux Distros


    1. BackTrack
    2. Operator

    3. PHLAK
    4. Auditor5. L.A.S Linux
     6. Knoppix-STD7. Helix
    8. F.I.R.E
    9. nUbuntu
    10. WarLinux

    Hotfile Premium Account 3 March 2012

    USER : vdbtim
    PASS : cherry

    AVG 2012 Serial Keys ALL TYPE

    AVG INTERNET SECURITY
    8MEH-RS47Y-82HT8-GONVA-BCCCZ-DEMBR-ACED
    8MEH-RFR8J-PTS8Q-92ATA-ORC6Q-JEMBR-ACED
    8MEH-RXYFD-JUV72-8922R-FTDO8-QEMBR-ACED
    8MEH-RXYFD-JUV72-8922R-FTBZ6-QEMBR-ACED
    8MEH-R6BFE-HWUHF-DPNDA-VFUWX-2EMBR-ACED
    8MEH-RGM33-K474L-6FGRR-8QEFN-UEMBR-ACED
    ________________________________________
    AVG INTERNET SECURITY SBS EDITION
    8MEH-RAJC2-O3H77-KRRQA-HO7OJ-REMBR-ACED
    8MEH-RF4BZ-FHKTO-VRV3A-4J9NO-DEMBR-ACED
    8MEH-RGHD3-SUAUO-SXPWA-PMJ8O-9EMBR-ACED
    8MEH-RUT9Q-4FS2R-PX2XA-TNTK4-LEMBR-ACED
    8MEH-RB32G-UPX8U-TRLQR-BLZCO-CEMBR-ACED
    ______________________________________
    AVG ANTI-VIRUS PLUS FIREWALL
    8MEH-REDSL-7VLFC-ULA8R-EKCGK-4EMBR-ACED
    8MEH-RYH2W-SRS6N-H2HGA-WM424-9EMBR-ACED
    8MEH-RF22Z-A6FGS-QDWMR-2NRWJ-BEMBR-ACED
    8MEH-RYH2W-SRS6N-H2HGA-W6VS7-9EMBR-ACED
    8MEH-RCB97-4YUT9-P4RRR-RTZLQ-2EMBR-ACED
    ______________________________________
    AVG EMAIL SERVER EDITION
    8MEH-RLKZO-8TSGH-HSYKA-KL2EG-SEMBR-ACED
    8MEH-RD8B8-2XJH3-Z6YQA-ERFNN-GEMBR-ACED
    8MEH-RE6B8-SA83Z-A489R-9OOUP-EEMBR-ACED
    _______________________________________
    AVG FILE SERVER EDITION
    8MEH-R2CML-SBEEW-MOXFR-TABQX-3EMBR-ACED
    8MEH-RQEZT-B9SH3-E64FA-9LCBD-6EMBR-ACED
    8MEH-R9Q3V-ZYWZT-92KCR-ALLMV-YEMBR-ACED
    __________________________________________
    AVG ANTI-VIRUS NETWORK EDITION
    8MEH-R6633-Y8C8H-YCNSR-HCD4X-EEMBR-ACED
    8MEH-RX7AF-9R64N-NPW7R-L9GN4-FEMBR-ACED
    8MEH-RK82S-PFW82-C33BA-QF8FA-GEMBR-ACED
    ________________________________________
    AVG ANTI-VIRUS
    8MEH-RF22Z-AN7HS-QDWMR-2EEBP-BEMBR-ACED
    8MEH-RYH2W-SAK7N-H2HGA-W73J4-9EMBR-ACED
    8MEH-RNXBD-GMNGF-BSLSR-ZJKOD-PEMBR-ACED
    8MEH-RF4BZ-FH4UO-VRV3A-4CH9L-DEMBR-ACED
    8MEH-RG9B7-BGGVC-PXRCR-JPR2L-HEMBR-ACED
    8MEH-RVEGA-VJYY3-Y3DLA-8NXY2-6EMBR-ACED
    ______________________________________
    AVG ANTI-VIRUS FREE...
    8MEH-RWEYH-SXRDN-6H9FR-3BGG8-6EMBR-ACED
    8MEH-RRX6F-OUD7X-H9ZCR-XEAL7-PEMBR-ACED
    8MEH-RMXLW-H6B3A-BABPA-SG62A-PEMBR-ACED
    _________________________________________________
    AVG ANTI-VIRUS SBS EDITION
    8MEH-RQXTV-H9OWD-E447R-MPA7E-PEMBR-ACED
    8MEH-R78BH-EYP8L-MLMVA-ZSMUR-GEMBR-ACED
    8MEH-RAJC2-O3G77-KRRQA-HOPHO-REMBR-ACED
    8MEH-RQX93-WYRKW-BE2FR-Q7MQG-PEMBR-ACED
    8MEH-RB32G-UPY8U-TRLQR-BTN8P-CEMBR-ACED

    Naughtyamerica.com Accounts 2 March 2012

    Tämä yhteenveto ei ole käytettävissä. Näytä postaus klikkaamalla tätä.

    Uploading Premium Accounts

    Uploading Premium Accounts

    peter.jennen@bigpond.com:snapper67
    alibooms@hotmail.com:123654
    jan-by@hotmail.com:vintage
    piloneo@libero.it:pirata
    tommyhav@yahoo.com:skippy
    chakab@msn.com:696969
    kreyling526@gmail.com:joey526
    apollo747@ntlworld.com:808000
    daiuy19@earthlink.net:jwmonroe
    helziran@yahoo.com:ruzzar
    jan-by@hotmail.com:vintage

    Wupload Premium Accounts

    Wupload Premium Accounts

    wall44street:juice3
    scottibiza:sausages
    railroad:railroad
    dealer01:dealer321
    hackteam007:premiumaccounts1.blogspot.com
    walboraaq:useralboraaq
    mindbus:wysiwyg
    HitAccount.Net6:ihsane
    Freeforall_12:dazza417
    davidm_13:covad456
    rakeshj81:starry4
    gxone:dude123
    ume0197:masa0197
    jozsi139:walter