Top 6 RapidLeech Sites 2011 You Are Looking 4

1


Top :1 NoLeech
--------------------------------------------------------------------------------------------------------------
Site Links : www.NoLeech.com
Can convert Premium links such as of : depositfiles - duckload - easyshare - filefactory - fileserve - filesonic - hotfile - megashares - megaupload - netload - uploading
File Size Limit: Unlimited
Auto-Delete: 6 Hours After Transload
--------------------------------------------------------------------------------------------------------------
Top 2 :  Hyperleech
--------------------------------------------------------------------------------------------------------------
Site Link :  http://www.Hyperleech2.info
Plugins : 78 Plugins
Premium: fileserve - megaupload - rapidshare - depositfiles
File Size Limit: 4.00 GB
Auto-Delete: Auto-Delete: 2 Hours After Transload

Read more

HOW I MET YOUR GIRLFRIEND -DEFCON 18

0



HOW I MET YOUR GIRLFRIEND from shobhit tiwari on Vimeo.   Here is a interesting video presentation from defcon 18 by Samy Kamkar .The guy is discussing how to attack advanced users who are into computer side via cookie bruteforcing+exploiting there router via XXXSS,XPS and generating the exact geolocation of the victim.  Dont miss this video

Read more

Reverse Domain IP Lookup Tool:DRIL

0


DRIL (Domain Reverse IP Lookup) tool is a Reverse Domain Tool that will really useful for penetration testers to find out the domain names which are listed in the the target host. DRIL is a GUI, JAVA based application which uses the Bing API key. DRIL has a simple user friendly which will be helpfull for penetration tester to do there work fast without a mess.

Download DRIL v2.2 (DomainReverseIPLookup.jar) Here.

Read more

Mantra: A Browser based Security Framework!

0

 Mantra is a dream that came true for the author. It is a collection of free and open source tools integrated into a web browser – Firefox, which can become handy for students, penetration testers, web application developers, security professionals etc. It is portable, ready-to-run, compact and follows the true spirit of free and open source software. Mantra is a security framework which can be very helpful in performing all the five phases of attacks including reconnaissance, scanning and enumeration, gaining access, escalation of privileges, maintaining access, and covering tracks. Apart from that it also contains a set of tools targeted for web developers and code debuggers which makes it handy for both offensive security and defensive security related tasks.

Read more

Sniffjoke Antisniffing Framework & Tool For Session Scrambling

0

What is sniffjoke?

SniffJoke is an application for Linux that handle transparently your TCP connection, delaying, modifying and injecting fake packets inside your transmission, make them almost impossible to be correctly read by a passive wiretapping technology (IDS or sniffer).

An Internet client running SniffJoke injects in the transmission flow some packets able to seriously disturb passive analysis like sniffing, interception and low level information theft. No server support is needed!

The internet protocols have been developed to allow two elements to communicate, not some third-parts to intercept their communication. This will happen, but the communication system has been not developed with this objective. SniffJoke uses the network protocol in a permitted way, exploiting the implicit difference of network stack present in an operating system respect the sniffers dissector.

Read more

Apple Mac OS X v.10.4 Tiger *ISO* (4CD) | 2 GB

0

Apple Mac OS X v.10.4 Tiger *ISO* (4CD) | 2 GB

Mac OS X version 10.4 Tigerwas the fifth major release of Mac OS X, Apple s desktop and server operating system for Macintosh computers. Tiger was released to the public on 29 April 2005 as the successor to Mac OS X v10.3Panther, which was released 18 months earlier, and Tiger was superseded by Mac OS X v10.5Leopardon 26 October 2007, after 30 months, making Mac OS X v10.4 the longest running version of Mac OS X. [1] Some of the new features include a fast searching system called Spotlight, a new version of the Safari web browser, Dashboard, a newUnifiedtheme, and improved support for 64-bit addressing on Power Mac G5s.

This will not work on intel macs, never install a older version of OSX on your system then the version that came with it, you can brick your system
 

Read more

Camtasia Studio 7.0 with crack for you

0

Camtasia Studio for Win. Camtasia Studio 7 will slash your editing time, provide more editing control, and make you look great with HD quality video. All dazzle. No hassle. HD quality video for the web Produce videos for the web using the industry leading H.264 format. No tweaks or technospeak, just sparkling HD quality video with compact file sizes...every single time. Two existing production presets (blog and web) and three new presets (YouTube, HD display, and Screencast.com) take advantage of the new format. Fewer do overs. Independent audio & video editing When recording audio and video at the same time, it's - Camtasia Studio for Win.




Read more

How to Hack Windows Passowrd

0

All of the windows passwords are stored in the form of "Hashes", an encrypted form in the SAM file which is located in "c:\windows\system32\config\" but no one can access, edit , open or read that file while you are using that operating system because Windows lock "SAM" to be accessed while the windows is in ruining.
To see the password SAM file we need other operating system such as Live Os ( Live Os do not requires installation in the system ) which can read the SAM file and give us the passwords in the Understandable language

To do so we can use any of the software listed here :
---------------------------------
1. Ophcarack
2. Offline Password Cracker
3. Hiren Multiboot Disk
---------------------------------
In this article i am going to illustrate only by using "OphCrack" ( for other rests read the upcoming articles )

you need to have OphCrack live cd to perform this operation download it from the given link

download link 1
----------------
----------------
Step-1 : Insert OphCrack Live CD and restart the system.

Step-2 : Select "OphCrack graphic Mode ( Auto Mode )"

Step-3 : OphCrack window will open now automatically
             wait for some time (it takes few minutes as processing time ) and you will get the
             windows passwords.
----------------------------





----------------------------

Read more

How to Create Backdoor login for Beginners

0

According to Wikipedia, Backdoor in a computer system  is a method of bypassing normal authentication, securing remote access to a computer, obtaining access to plaintext, and so on, while attempting to remain undetected. The backdoor may take the form of an installed program or may subvert the system through a rootkit.

here, i am going to show it via system32 files

Step-1: Go to "c:\Windows\System32" and locate "CMD.EXE" and "SETHC.EXE"
   
    SETHC.EXE - responsible for the sticky keys   
    CMD.EXE - for command prompt


    retain a copy of the CMD.EXE and SETHC.EXE and save for the backup (hardly of 800 kb)

Step-2: Rename "SETHC.EXE" to whatever you want and "CMD.EXE" to "SETHC.EXE"
             this allows you   to open cmd prompt when you hit "shift" five times
        (to rename the file you need to have the adminisator's privilages)

Step-3: Now log-off and press "shift" five times and you will see the command prompt on the screen
   
            Now write "net user yourusername /add" in the cmd prompt box and hit "Enter"
            this will create a new user named "yourusername"
   
    log-in using "yourusername" user account and when you done log-off and again press "shift"
    5 times and again the cmd prompt will open, in it write "net user yourusername /del"     this will delete your user so that when the computer owner logins the computer it will not get to
    know about the other user account

Step-4: You are almost done, whenever you want to use his/her computer just start computer and
             follow the Step-3.

     "YOU NEED TO HAVE LOGGED IN AS ADMINISTRATOR ATLEAST ONCE TO CREATE BACKDOOR LOG IN , IF YOU DON'T GET THE ADMINISTRATOR LOG-IN,BREAK THE ADMIN PASSWORD BY READING NEXT ARTICLE"

Read more

How to reset BIOS and all other Biometric Passwords

0

BIOS Password
-----------------

The BIOS ( basic input output system ) password is the password needed when you enters the BIOS settings initially it is disabled but some of the guy's enable it to protect the bios settings.


to break BIOS password simply open the cabinet of your computer and locate the small "Cell Battery" on the mother board , remove it and again reinstall it and the BIOS password is now Disabled.

All Biometric Passwords
--------------------------

To Break Face Recognition and Biomatric Password remove the "Jumper" located near by the "Cell Battery", it is of 3 legs generally of Brown or Green in color, Remove and reinstall it and your Biomatric password  is reset to null and now it is disabled.

Read more

what is hacking ?

1

Some of you alarm that what hacking is in reality ?, well term hacking is nothing but just getting command over anything it can be computer or the way of talking or any thing else.

for example, if you are good speaker and you are having command over it, it means you are a hacker of a language that you are speaking. similarly with Computers, if you are having deep knowledge of computers then you are a hacker of computer.


 
-------------------------------
Hacking Is Not a Crime But Cracking Is
-------------------------------

Read more

 
Design by ThemeShift | Bloggerized by Lasantha - Free Blogger Templates | Best Web Hosting