Thursday, 30 May 2013

Play Music through CMD


FIRST  DOWNLOAD THIS & INSTALL => DOWNLOAD NOW 

                             

AFTER DOWNLOAD & INSTALL THE DOS BOX

 

THEN DOWNLOAD THIS mpxplay=>  DOWNLOAD NOW

10 FREE KEYLOGGERS

10 FREE KEYLOGGERS TO MONITOR YOUR LOCAL PC OR LAPTOP!

HERE IS AN EXCLUSIVE LIST OF TOP 10 FREE LOCAL KEYLOGGERS. HOWEVER IF YOU ARE PLANNING TO MONITOR ONLY YOUR PC OR ANY PC WHICH YOU HAVE CONTROL OF, THEN YOU CAN BLINDLY GO FOR “HARDWARE KEYLOGGERS” AS THEY ARE THE SAFEST KEYLOGGERS AND OPERATE IN A COMPLETE STEALTH. IF YOU STILL WANNA PREFER FREE KEYLOGGERS THEN BELOW IS THE LIST OF FREE KEYLOGGERS THAT WILL REALLY HELP YOU MONITOR YOUR PC.

1) REFOG FREE EDITION

Refog Free Keylogger beats competition in two respects: it’s simple to use and it’s free. REFOG Free Keylogger can look after your children without them even noticing. Even technically minded children won’t detect the key logger when it runs in a stealth mode. The program removes all the shortcuts and can be accessed only through a hot key combination. Running unobtrusively from the moment the system boots, REFOG Free Keylogger keeps track of all typed or pasted text.

->Download It From here

2) Black box express

Simple to use monitoring of one local computer; Monitor Screen recordings, Programs, Keystrokes typed, Websites, Web Searches, Emails/Webmails/ Instant Messenger Chat sent and received. Alerts and Warnings instantly or as a summary on your e-mail or cell phone. everything for 100% Free. No strings attached.

->Download It From here

3) PERSONAL KEYLOGGER

The Personal Keylogger application was designed to be a small tool that will allow you to secretly record all keystrokes and other input. All specific instructions are explained in the application. To exit it and receive your logs, you will need to enter in your keycode. If you have forgotten your keycode, you will need to restart the computer. Keycode is like password. To stop Personal keylogger, you can enter your keycode anywhere on the screen. Once you type-in your keycode, the keylogger will stop monitoring and the log.txt file will be created in your selected destination folder.

->Download It From Here
4) PY KEYLOGGER

PyKeylogger is an easy-to-use and simple keylogger written in python. It is primarily designed for backup purposes, but can be used as a stealth keylogger, too. It does not raise any trust issues, since it is a short python script that you can easily examine. It is primarily designed for personal backup purposes, rather than stealth keylogging. Thus, it does not make explicit attempts to hide its presence from the operating system or the user. That said, the only way it is visible is that the process name shows up in the task list, so it is not immediately apparent that there is a keylogger on the system.
#Tip: Press and hold ‘left-CTRL + Right-CTRL + F12′ keys simultaneously to bring up the Control Panel (default password is blank).

->Download It From Here
                                                                              5) HERETIC MACRO

Heretic is a powerful tool that is able to record user events, such as mouse clicks and keys, into a C/Java-like script, and play that script either once or repeatedly. It has many commands for dynamic pixel-based botting, window based botting, and static botting/macro-ing (i.e. key presses, mouse clicks, mouse moves, and pauses).

->Download It From HERE


6) Ultimate Keylogger

Ultimate Keylogger Free is a free popular all-round monitoring solution. It runs in the background and monitors all typed keystrokes, applications, passwords, clipboard, email, and visited websites’ URLs. You can view the reports as HTML files. Ultimate Keylogger Free will help you to find out, what exactly took place in the system.

->Download It From HERE


7) Actual keylogger

It runs hidden in the background and automatically records all keystrokes (including Alt, Ctrl and other functional buttons). The interface can be password protected and the log files are encrypted. You can view the reports as HTML or plain text. In the hidden mode it is invisible in all operating systems.

->Download It From HERE


8) Revealer Keylogger Free Edition

Revealer Keylogger is surely the easiest and faster way to record keyboard inputs. There is almost nothing to configure, in fact everything is configured internally with the best settings. Free keylogger monitoring tool that logs every keystroke even passwords behind asterisks and conversations in common instant messengers. Its interface is password protected, the software does not appear in Add/Remove programs or in the taskbar.

->Download It From HERE


9) Romaco Keylogger

Romaco Keylogger is a small and easy to use tool that can log all key-presses that are made while it is running, and display them to you in its window. It automatically exports the logged text to a text file every 5 minutes, or manually. It can be hidden at the click of a button, and recalled by vigorously pressing one of the least used keys on the keyboard, the break key.

->Download It From HERE


10) KidLogger

KidLogger collects user activity journal on the Computer and creates detailed Analysis of the user activity available online. Creates the list of most used web sites. Record the text was typed on the keyboard in any application


->Download It From HERE
                                                                                  




Use Facebook Without Internet Connection

I know Title Of  Post Sounds somewhat funny but friends You can use facebook with no internet connection And Even On Phones Which don't Have Internet Support.
And the best thing is that its Completly free.Facebook India has partnered with Fonetwish to bring Facebook on every mobile phone without requiring any apps or even the Internet.Now you can able to use facebook on cell phones like 1100.which don't have any browser or internet facility.
 The only You have to do is to  dial *325# 

from your mobile phone and follow the instructions.

First of all it asks for Facebook username and password,You have to enter these information via a number based command Prompt.
After You get in.You will see a menu like 
  1. news feed
  2. update status
  3. post on wall.
  4. friend request.
  5. messages.
  6. notifications. 

       *Account settings.

You have to enter desired Number in a number based command prompt for accessing your account.


NOTE:
  • This Service is only available in India. 

  • This Service Currently available On selected operators like Airtel, Aircel, Idea, Vodafone andTata Docomo users.

  • Access to facebook account and Status updates is completely free.If you also want to use features like Notifications, updating friends wall you have to subscribe to Fonetwish premium plan which is very cheap.

Top 10 Ways to Hack Facebook Accounts


Facebook is one of the most widely used social networking site with more than 750 million users, as a reason if which it has become the number 1 target of hackers have , I have written a couple of post related to facebook hacking here. I mentioned the top methods which were used by hackers to hack facebook accounts, however lots of things have changed in 2013, Lots of methods have went outdated or have been patched up by facebook and lots of new methods have been introduced, So in this post I will write the top 10 methods how hackers can hack facebook accounts.

10 Ways How Hackers Can Hack Facebook Accounts


So here are the top 10 methods which have been the most popular in Everytime :


1. Facebook Phishing


Phishing still is the most popular attack vector used for hacking facebook accounts, There are variety of methods to carry out phishing attack, In a simple phishing attacks a hacker creates a fake login page which exactly looks like the real facebook page and then asks the victim to login into that page, Once the victim logins through the fake page the victims "Email Address" and "Password" is stored in to a text file, The hacker then downloads the text file and get's his hands on the victims credentials.



2. Keylogging 

Keylogging, according to me is the easiest way to hack a facebook password, Keylogging sometimes can be so dangerous that even a person with good knowledge of computers can fall for it. A keylogger is basically a small program which once is installed on victims computer will recordevery thing which victim types on his/her computer. The logs are then send back to the attacker by either FTP or directly to hackers email address.




3. Stealers



Almost 80% percent people use stored passwords in their browser to access the facebook, This is is quite convenient but can sometimes be extremely dangerous, Stealers are software's specially designed to capture the saved passwords stored in the victims browser, Stealers once FUD can be extremely powerful.


4. Session Hijacking


Session Hijacking can be often very dangerous if you are accessing Facebook on a http:// connection, In a Session Hijacking attack a hacker steals the victims browser cookie which is used to authenticate a user on a website and uses to it to access victims account, Session hijacking is widely used on Lan's.



5. Sidejacking With Firesheep


Sidejacking attack went common in late 2010, however it's still popular now a days, Firesheep is widely used to carry out sidejacking attacks, Firesheep only works when the attacker and victim is on the same wifi network. A sidejacking attack is basically another name for http session hijacking, but it's more targeted towards wifi users.



6. Mobile Phone Hacking


Millions of Facebook users access Facebook through their mobile phones. In case the hacker can gain access to the victims mobile phone then he can probably gain access to his/her Facebook account. Their are lots of Mobile Spying softwares used to monitor a Cellphone.




7. DNS Spoofing 

If both the victim and attacker are on the same network, an attacker can use a DNS spoofing attack and change the original facebook.com page to his own fake page and hence can get access to victims facebook account.



8. USB Hacking


If an attacker has physical access to your computer, he could just insert a USB programmed with a function to automatically extract saved passwords in the browser.




9. Man In the Middle Attacks

If the victim and attacker are on the same lan and on a switch based network, A hacker can place himself b/w the client and the server or he could also act as a default gateway and hence capturing all the traffic in between, ARP Poisoning which is the other name for man in the middle attacks is a very broad topic and is beyond the scope of this article,



10. Botnets


Botnets are not commonly used for hacking facebook accounts, because of it's high setup costs, They are used to carry more advanced attacks, A botnet is basically a collection of compromised computer, The infection process is same as the keylogging, however a botnet gives you, additional options in for carrying out attacks with the compromised computer. Some of the most popular botnets include Spyeye and Zeus.


Note: This tutorial is only for Educational Purposes, I did not take any responsibility of any misuse, you will be solely responsible for any misuse that you do. Hacking email accounts is criminal activity and is punishable under cyber crime and you may get upto 40 years of imprisonment, if got caught in doing so.

Tuesday, 28 May 2013

Gmail Hacker | Fake Tool to Hack Gmail Accounts

Hey friends,
today I am going to disclose some nice stuff that Hackers nowadays using to make people fool these days. Hackers are spreading a software tool named as Gmail Hacker v1.0 on the internet with title " Hack Gmail Accounts using Gmail Hacker" or"Gmail Hacker : A superb Gmail Account Hacking tool"

But beware of such articles because its nothing more than a smart keylogger which is actually intended to hack users credentials that user gonna use to hack somebody's gmail account. Let us discuss the process in detail:

First of all frankly speaking, Gmail Hacker is a hacking tool (social engineering hacking tool) which can be used in either way like Hacking someone's Gmail account and at same time loosing your Gmail Account( if not handled with extreme care). So friends which process you all wanna learn first. Hacking one or getting Hacked one. or both at same time going step by step.

First you have this stuff:
  • Winrar (In order to extract the files) 
Now lets go step by step for the Hacking procedure:
Gmail Hacker for Hacking Gmail Accounts:

Step 1 - Extract the arhive named Gmail.rar on your computer, Once you have extracted you will see the following file:
Builder.exe

Step 2 - On opening Gmail hacker builder.exe you will see the following:

Step 3 - Next you need to enter your gmail address where you would receive logs.However I would recommend you to create a fake email address and use it for receiving logs. 

Step 4 - Once you have entered your credentials, click on the build button. 

Step 5 - A file named gmailhacker.exe would be created, On executing the file, the victim will see the following:
Now you need to apply your social engineering skills in order to make the victim enter his/her credentials on to the software. The simplest way of accomplishing this is to tell the victim that the application Gmailhacker.exe is itself a gmail hacking software, You just need to the victim's username, your own gmail ID and your own gmail password, where you would receive victims passwords and click "Hack Them".

Step 6 - Once the victim clicks on the "Hack Them" button, his own gmail credentials that he entered would be sent to you on the email you typed while configuring the software. 
Well, here is an interesting part, when the victim will click on the button "Hack them", he will receive the following error, making him thinking that their is a problem with the software

Note: This tutorial is only for Educational Purposes, I did not take any responsibility of any misuse, you will be solely responsible for any misuse that you do. Hacking email accounts is criminal activity and is punishable under cyber crime and you may get upto 40 years of imprisonment, if got caught in doing so.


Monday, 27 May 2013

Download Hitman Absolution PC Game Full Rip



Free Download Hitman Absolution mediafire, Free Download Hitman Absolution full version. Download Hitman Absolution compressed, Download Hitman Absolution installation setups, Download Hitman Absolution rapidshare links, Hitman Absolution download links, Download Hitman Absolution all versions. Download Hitman Absolution torrent, Download Hitman Absolution utorrent setup.

Hitman Absolution Information:
Hitman: Absolution the fifth game in the Hitman series and was developed by IO Interactive and Nixxes Software. The game was published by Square Enix and Eidos, and released on November 20, 2012 for the PC, PlayStation 3 and Xbox 360. Absolution features a more personal story about Agent 47, who has been betrayed and must uncover a conspiracy. 47's ultimate mission is to assassinate Diana Burnwood, his former employer and friend who provided him his missions in the previous games.

Format         Xbox 360
Developer    Io Interactive
Publisher     Square Enix
Genre          Action
Also on       PS3 | PC

System requirements for hitman absolution:

  • CPU: 2.4 GHz dual core Intel or AMD processor
  •  RAM: 1GB of system memory
  • Graphics: DirectX 10 compatible card with 512 MB RAM. AMD Radeon 3000 series graphics cards.
  • Operating system: Windows Vista
  • DirectX compatible sound card
  • 10 GB of hard drive space

Hitman Absolution system requirements (recommended)
  • CPU: 2.6 GHz quad core Intel or AMD processor, Core i5 or Phenom X2
  • RAM: 2GB
  • Graphics: DirectX 10 compatible card with 1GB of video memory, AMD 5000-series.
  • Operating system: Windows 7
  • DirectX compatible sound card
  • 10 GB of hard drive space
Hitman Absolution Wallpapers, Screen Shorts, Photo, Images:






How To Download ???

Please Click the Download Link which I have provided above.
If you find AdF.ly, Please wait 5 seconds and click skip Ad for download.



 or
any problem download please alternate link





Download Counter Strike Global Offensive PC Game Compressed


Free Download Counter Strike Global Offensive mediafire, Free Download Counter Strike Global Offensive full version. Free Download Counter Strike Global Offensive compressed, Free Download Counter Strike Global Offensive installation setups, Free Download Counter Strike Global Offensive rapidshare links, Counter Strike Global Offensive download links, Free Download Counter Strike Global Offensive all versions. Free Download Counter Strike Global Offensive torrent, Free Download Counter Strike Global Offensive utorrent setup.

Information Counter Strike Global Offensive PC Game
Counter-Strike: Global Offensive will expand upon the team based action gameplay that it pioneered when it was launched 12 years ago.

Counter-Strike: Global Offensive features new maps, characters, and weapons and delivers updated versions of the classic CS content (de_dust, etc...). In addition, Counter-Strike: Global Offensive will introduce new gameplay modes, matchmaking, leader boards, and more.

"Counter-Strike took the gaming industry by surprise when the unlikely MOD became the most played online PC action game in the world almost immediately after its release in August 1999," said Doug Lombardi at Valve. "For the past 12 years, it has continued to be one of the most-played games in the world, headline competitive gaming tournaments and selling over 25 million units worldwide across the franchise. Counter-Strike: Global Offensive promises to expand on CS' award-winning game play and deliver it to gamers on the PC as well as the next gen consoles and the Mac."

System Requirement: 
Windows 7/Vista/XP
Processor: Intel Core 2 Duo E6600 or AMD Phenom X3 8750 processor or better
Memory: 1GB XP / 2GB Vista
Hard Disk Space: At least 7.6GB of Space
Video Card: Video card must be 256 MB or more and should be a DirectX 9-compatible with support for Pixel Shader 3.0 

Counter Strike Global Offensive Wallpapers, Screen Shorts, Photo, Images:










How To Download 
Please Click the Download Link which I have provided above.
If you find AdF.ly, Please wait 5 seconds and click skip Ad for download.



Download



Download


Tuesday, 21 May 2013

Make Your Pendrive a "Password Stealer"


Here's a small hackby which you can turn any into a password stealer.The pendrive will steal all the stored passwords in the system of the victim.

Download : You can download the files from HERE.

Steps of Use :

1.Extract pendrive password stealer.rar . 
2.Copy all the contents of the file.
3.Paste the contents in the pendrive you want to use for stealing.
4.Insert the pendrive in the system of the victim.
5.Click on "launch" file.
6.Within seconds your pendrive will have text files containing all the stored passwords of the victim for any website.

P.S. :If the victim is not using stored passwords,then the password files will come out empty.

Note: This is for educational purposes only. Author is not liable for any misuse.