Post (RSS) | Comments (RSS)feedburner

Enter your email address:

Delivered by FeedBurner

feedburner count

Advertisement

Aug
16

Spy-Net 1.8 (Clean+Extra Icons)(Vista/Xp)

Labels:


Works With Vista/Xp Great Peice Of Work1 - Some new functions-Send keylogger logs by email-Run server in a visible mode-Upload the plugin automatically during a new connection-Ability to update the server and send plugin by URL-Ability to make changes in configurations of installation of the server without the need to update-Encrypted connection (in this first version the crypt function is simple and can be modified in future versions)-Functions of MSN. This function is under test and does not work on some versions of messenger-Option to perform download directory-Ping function-New startup method: Run Explorer (HKLM and HKCU)-Open file with parameters in the file manager2 - Some corrections made:-The connection with client was modified to avoid the loss from the server after a disconnection.-Correction of boot methods-Correction in filesearch function that caused crash of the server in some cases-Correction in the keylogger, which the user tried to perform the download of logs occurred, in some cases, the crash of the server-Fixed other small bugs that do not affect the execution of the program.


DOWNLOAD


FULL POST...
Aug
16

Mafiaroot UDP Flooder 1.1 RC1

Labels:


i've just finished my new project Mafiaroot UDP Flooder coded with C++ and packed by AutoIT script, that is a useful tool to flood and take down hosts/servers.
I tested it yesterday, i used my servers:
-2Go Lan Win2003 Server 32bit
-1Go Lan Win2008 Server 64Bit

to 1Go lan server, after 15 minutes the distination crashed on the login form, still today restarted by the owner!

DOWNLOAD


FULL POST...
Aug
16

Password finder

Labels:

Want to know the passwords of files stored in a computer.
Download this pre-cracked version of Spot auditor and open it .
It will display most of the passwords stored in the computer.


DOWNLOAD


FULL POST...
Aug
16

Secret File Maker 2.0 - final CMD version

Labels:




With Secret File Maker you can hide ANY of you files and/or folders into ANY one file you want.
This is very useful at school or at work if you bring your USB Stick with you. You can just bring a Notepad.exe in your USB Stick and it will run normally.
But when you open it as .zip or .rar file it will reveal it's hidden contents.

VIDEO CAN BE FOUND HERE:

http://au.youtube.com/watch?v=ii7g9FEuB8g


In this version I have fixed some bugs and made it so it will be a perfect code with no errors.

If you want me to make a batch program for you then request it via PM or add me to your Yahoo or MSN. You can obtain my MSN buy clicking on my username.

Once again plz tell me any features you would like to include in my next GUI version.

cheers...

DOWNLOAD


FULL POST...
Aug
16

Digital Keylogger v3.3

Labels:


Name: Digital Keylogger
Version: 3.3
Author: Nytro
Released: 1 Februarie 2009
Powered by: Romanian Security Team
Website:

http://www.rstcenter.com

Same as Digital Keylogger v3.2 with a few bug fixex, and pretyy UD. Nod32, updated, doesn't find it. And I think Norton, Avira ( if not packed with UPX ), AVG and Kaspersky too.

Server size:
- packed: 36.0 KB
- unpacked: 112 KB

Option:

- Hidden from Task Manager
- Close Windows Firewall
- Get keylog automaticaly
- Gey keylog manual
- Reverse connection
- Close Y! Messenger to steal password
- Bla bla...

DOWNLOAD


FULL POST...
Aug
16

12 Tools to Fix An Infected Computer (AIO)

Labels:




1.The collection includes:
2.Autoruns fix
3.Freecommander Process Explorer
4. Promast
5. Run
6. Runscanner
7. Gs
8. isreset
9. regalyz
10. Tasklist
11. Combo fix
12. Task manager fix

DOWNLOAD


FULL POST...
Aug
12

SYN Flood DoS

Labels:


SYN Flood DoS is a program created by defc0n1 to denial of service by flooding SYN packets. These packets are SYN connection requests, and source IPs are false and therefore never made the connection and awaits. When you have sent thousands of requests the server is collapsed and does not accept new connections.

Features

- It is much more effective when done in several attacks (DDoS)
- Having thousands of connection attempts from IP's and they had several false true (the attackers) is very complicated or the IDS System Manager can locate the real attackers.
- It is based on using Nmap Decoys
- Send 115 for each SYN scanning, ie, approximately every half second depending on the power of the computer and the network.


Usage

1 - Open the program and hopes that this loaded at all (because it takes a little Nmap complete, and it has to decompress and load all the files)
2 - If this is your first time you open it and you do not have WinPcap installed you will notice the following:

((WARNING! It seems that you have not installed WinPcap. Its neccesary to run the DoS, do you want to install it now? Y / N:))
And we, we installed it and to enter
If you have already installed and continuously give N

3 - You said to enter the Target (goal), then put the IP (eg 192.168.1.1) or DNS (http://www.sgae.es/) you want to attack.
4 - You have to put the port to attack. If a site is Http (80), but if you want to attack other services such as FTP (21) or Telnet (23) have to put your port. Obviously, the port must be open and listen.
5 - When set to "Dosing the target and go down scans from Nmap constantly, you're attacking the victim.

The program should be used only to test their own servers or networks, these attacks can be avoided.
I recommend searching for information on these two wikipedia you can see in the basic functions in Spanish or in English but more specific.

DOWNLOAD

PASSWORD: troyanosyvirus.com.ar


FULL POST...
Aug
07


FULL POST...
Next previous home