Showing posts with label Account Hacking. Show all posts
Ardamax Keylogger v4.0.1, v3.8.9, v3.7.8, v3.7.6 Latest [Full] [Free] [Crack] [Serial Key]
Ardamax Keylogger is a keystroke recorder that captures user's activity and saves it to an encrypted log file. The log file can be viewed with the powerful Log Viewer. Use this tool to find out what is happening on your computer while you are away, maintain a backup of your typed data automatically or use it to monitor your kids. Also you can use it as a monitoring device for detecting unauthorised access. Logs can be automatically sent to your e-mail address, access to the keylogger is password protected. Besides, Ardamax Keylogger logs information about the Internet addresses the user has visited.
This invisible spy application is designed for 2000, XP, 2003, Vista and Windows 7.
Keylogger Features:
* Email log delivery - keylogger can send you recorded logs through e-mail delivery at set times - perfect for remote monitoring!
* FTP delivery - Ardamax Keylogger can upload recorded logs through FTP delivery.
* Network delivery - sends recorded logs through via LAN.
* Clipboard logging - capture all text copied to the Windows Clipboard.
* Invisible mode makes it absolutely invisible to anyone. Ardamax Keylogger is not visible in the task bar, system tray, Windows 2000/XP/2003/Vista/Windows 7 Task Manager, process viewers (Process Explorer, WinTasks etc.), Start Menu and Windows Startup list.
* Visual surveillance - periodically makes screenshots and stores the compressed images to log.
* Chat monitoring - Ardamax Keylogger is designed to record and monitor both sides of a conversation in following chats:
o AIM
o Windows Live Messenger 2011
o ICQ 7
o Skype 4
o Yahoo Messenger 10
o Google Talk
o Miranda
o QiP 2010
* Security - allows you to protect program settings, Hidden Mode and Log file.
* Application monitoring - keylogger will record the application that was in use that received the keystroke!
* Time/Date tracking - it allows you to pinpoint the exact time a window received a keystroke!
* Powerful Log Viewer - you can view and save the log as a HTML page or plain text with keylogger Log Viewer.
* Small size – Ardamax Keylogger is several times smaller than other programs with the same features. It has no additional modules and libraries, so its size is smaller and the performance is higher.
* Ardamax Keylogger fully supports Unicode characters which makes it possible to record keystrokes that include characters from Japanese, Chinese, Arabic and many other character sets.
* It records every keystroke. Captures passwords and all other invisible text.
Other Features:
* Windows 2000/2003/XP/Vista/Windows 7 support
* Monitors multi-user machines
* Automatic startup
* Friendly interface
* Easy to install
Enjoy;)
Download: This file is full Ardamax (Latest) Keylogger with no activation needed, downloaded from their official site. Just Downlaod and ENJOY ;)
ARDAMAX 4.0.1 :::http://adf.ly/e6Enc {Comment If you want more INFO}
Registration :::http://adf.ly/e6EvS
Registration :::http://adf.ly/e6EvS
ARDAMAX 3.8.9 ::: HERE (UPDATED)
ARDAMAX 3.7.8 ::: http://www.box.net/shared/lidooniyjv (FULL)
Ardamax 3.7.6:::http://www.box.net/shared/dzp1m8koen (FULL
ARDAMAX 3.7.8 ::: http://www.box.net/shared/lidooniyjv (FULL)
Ardamax 3.7.6:::http://www.box.net/shared/dzp1m8koen (FULL
SERIAL KEY :
==========
Name: Luiz Ricardo P Oliveira
serial: 3F1A-54F8-032C
==========
Name: Luiz Ricardo P Oliveira
serial: 3F1A-54F8-032C
Wednesday, February 26, 2014
Posted by Anonymous
Hacking Facebook through Social Manipulation.
One the way to hack Facebook is Social Engineering, but the question asked by nearly all the people who are new to hacking scene is that "What is social Engineering and how to hack a (Facebook) account by it?"
So i decided to write this article to explain what it is and give a real life example of my own.
First lets see what Wikipedia have to say:
"Social engineering is commonly understood to mean the art of manipulating people into performing actions or divulging confidential information."
According to Hacker's Jargon Dictionary:
"Social Engineering: n. Term used among crackers and samurai for cracking
techniques that rely on weaknesses in wetware rather than software; the aim is to trick people into revealing passwords or other information that compromises a target system's security. Classic scams include phoning up a mark who has the required information and posing as a field service tech or a fellow employee with an urgent access problem. "So actually if you trick some one to give you the confidential information he is manipulated by you. So now its clear that our beloved Phishing is also a kind of social manipulation. This might give you the size of it!
||For those who don't know about Phishing, read this > http://hackthepc.blogspot.com/2011/03/making-facebook-phishing-site-tutorial.html||
Lets get started:
So Phishing is a way to hack and its social engineering, but what are the other ways? Well apart from this you could trick the other person to give you his password. I know this might be really difficult but once you have mastered you could really make your name. Because the most wanted hacker of all times Kevin Mithnik actually used Social manipulation to hack though he himself couldn't write his own exploit!
An easy way is to guess the password from the information given, normally people use following things as their password:
- Date of birth
- Surname
- Phone Number
- School's name
- Girl Friend's name :)
- Favourite Movie
- Favourite Band
- Favourite Hero/Heroine
- Favourite Fruit! (I used one when I was young!)
These are only some, but if you know the other person very well these might work!
Another idea is to manipulate the other person in giving you the Answer to their security Question! This is what I am going to cover in Real Life Example!
"THE MAIN TRICK IS TO EXPLOIT THE TRUST BASE TO HACK!"
So it means you should exploit the trust that victim have in you to get the information, the trust could be of a friend, colleague or official (If you are pretending to be a Facebook guy who need their password).
REAL LIFE EXAMPLE:
Some months back my best friend challenged me to hack his Facebook account, unfortunately he was a reader of my blog and knew all the ways like Phishing or Keylogging. So I couldn't hack him for much time every time i tried i failed. So I though of social engineering.
What I did first was to got the primary Email Address of Facebook, I got that easily by Visiting his Profile page. The email was in Hotmail!
So I opened the Hotmail password reset page > https://account.live.com/password/reset and gave his email this gave me the following page:
Here the security Question was " Name of Best Friend from Childhood?", it seemed pretty easy so started entering the name of all his friends but to my amazement the name was someone's whom i didn't knew.
So I went to the Chat and manipulated him. Following is some text from chat:
====================================================
Me: Hello, how are you/
He: Fine. whatsup!
Me: Nothing, just getting ready for your party.
He: Ohh great, it is going to be fun!
Me: Yah i know, who else is comming?
He: Only you and [He named some which were not the answer]
Me: Hey havent you called you old friends? I wanted to meet them.He: Nupp!!!
Me: Are in contact with them, BTW who is your best friend apart from our group?
He : Ohh my best friend apart form you people is Arslan.
Me: ohh great looking forward to the party! bye.
====================================================
So those people who don't know ARSLAN is a name and to my Good Luck it was also the password! So I hacked his email and from their I hacked his Facebook account,
Don't worry no harm was done I just showed him that i did it and returned him the account because it is unethical to hack people to harm them. Real Hackers don't do this and I for my self only hack my dearest friends (who don't mind) for fun that all for me!
So from this example you people might have learn that how easy it is to hack through Social Engineering. But ALAS! the success rate is very low, but still where nothing works this works!
Friday, November 25, 2011
Posted by Anonymous
REFOG Keylogger v5.1.8.934 + Serial [ Full Version ] [Crack]
Concerned About Your Children Safety?
If your kids spend time chatting or playing computer games, they can be approached or threatened by the strangers. Internet has anonymity, and anonymity means impunity in the minds of molesters. The solution? Violate their anonymity by monitoring your kids’ activities!
REFOG Personal Monitor is designed to deal with extended families, but it fits small families just as easy. Allowing you to monitor your children activities remotely over the Internet, REFOG Personal Monitor does not even require your close presence in order to be alerted about suspicious activities of either your children or someone they chat with.
Easy To Install and To Use
REFOG Personal Monitor can be set up and used by anyone. The monitor does not involve a steep learning curve and does not demand a degree in Computer Science to configure and operate. Simply download your free trial version and get yourself going!
Remote Monitoring
REFOG Personal Monitor provides the necessary degree of interactivity, allowing you to monitor your kids’ actions remotely over the email. There’s no need to rush home during the launch hour just to check the logs. See what your kids are doing with their computer without leaving your office!
Real-Time Alerts
Should you be worried now or later? If you want constant protection of your family, simply logging keystrokes and storing screen captures is not enough. Often, an immediate action is required to get your kids out of trouble.
REFOG Personal Monitor is highly flexible, allowing you to configure multiple alerts on harmful or offensive keystrokes sent or received on their computer. Set your alarms, and get notified instantly with real-time alerts if a pre-defined event happens on their PC.
You can easily set REFOG Personal Monitor to alert you by e-mail. Templates are available to filter keystrokes that contain pre-defined trigger phrases, making false alerts hardly possible.
Save Screens and Key Presses
REFOG Personal Monitor keeps a list of all activities you specify it to log. It records all visited Web sites, keeps logs of chats and instant messenger conversations as well as other things typed or received by your kids in chats, messengers, blogs, forums and other online and offline applications.
REFOG Personal Monitor saves each key pressed and every phrase typed, and makes periodic captures of the computer screen to better illustrate what was going on at that moment.
Capture Chats and Instant Messengers
REFOG Personal Monitor captures every key that they press, but does not stop there. Individual keystrokes are of little use when analyzing your kids’ behavior. REFOG Personal Monitor can detect popular chats and instant messengers, and forms clearly legible and readable logs containing chats and instant messenger conversations formatted in a manner that is convenient to read.
Stealth Operation
For even better protection, REFOG Personal Monitor can be completely hidden from your kids’ eyes. It runs silently and unobtrusively on their PC while taking screen shots and recording every key that they press, logging applications that they use and Web sites that they visit. You can access these logs either locally or remotely at any time, even if you are not at home!
Keystroke recording
Once installed and running, Refog registers all keys pressed by a user, thus acting as a keylogger. This function captures all data that has been entered by your children or an employee using a keyboard, including chats, usernames, passwords, emails, search queries and other content. In addition to key logging, Refog is also able to log clipboard text.
Web history logging
Even if users delete their browser's history, the informaton is retained in Refog's log database and always available via the reports function. All relevant information is collected including URLs visited, page titles and the timestamp.
Screenshot history
With customizable capability, Refog takes full color screenshots of a desktop screen. This ensures that the log of what is being typed by the user is backed up with visual evidence of exactly what they are doing. Without being monitored, it is often the case that employees get carried away with excessive web surfing, shopping and other personal tasks. With screenshot history, it is always possible to gather evidence if an employee is wasting the company's time. Multiple monitor configurations are supported!
Invisible mode and password protection
You may not want to disclose the act of PC monitoring, so Refog can work in special stealth mode, making it completely invisible even to a skilled PC user. It cannot be found in the program folder, control panel or tray. When required, the program can be revealed using a special command or hotkey. In addition, it is possible to protect Refog with a password, so users are unable to erase their logs.
Application monitoring and file tracking
Refog is able to record all programs executed on your PC, so it is possible to establish if your kid is playing games instead of doing his homework, an employee is wasting time offline (e.g. playing solitaire instead of working). In addition to programs, Refog stores all file operations (e.g. open, edit, copy, delete), and can reveal inappropriate interest in specific confidential documents.
IM monitoring
Refog is also compatible with all major instant messaging software (e.g. AIM, Facebook®,Yahoo! messenger, Skype, ICQ, Google Talk, MSN). It is not only able to log outgoing messages by a local user, but also incoming messages too.
Email reports
It is not necessary to gain physical access to monitored computers in order to view their logs. All reports can be delivered via email, and can be read anywhere.
Comprehensive settings and reports
It is possible to set the control levels of monitoring, enable/disable monitoring for given users, setup alert keywords and reports delivery, easily filter log files and much more. With this armory of tools, Refog comes preconfigured so it can be installed in just a few clicks and run with default settings, requiring no tech skills at all!
Refog Personal Monitor works great with all modern Windows OS releases: Windows XP®, Windows Vista®, Windows 7®
Installation Notes
Run setup file
Enter the serial
Enjoy
DOWNLOAD FROM:: {Updated}
http://adf.ly/e6Bwb
Saturday, August 13, 2011
Posted by Anonymous
How to Hack Facebook, Myspace, Tagged, Orkut, Hotmail, Gmail.
Well this is the question in every bodies mind that how can we hack a email account or How do others do it. When I started reading about Hacking I also search about this question and search for the Soft wares that can do it for me but there was nothing that work. Then comes the websites like hackfacebook.net that claim to hack 98% of facebook accounts for only 140 euros. But that is a BIG FRAUD. So question comes to mind How do we Hack the Accounts.
In real there are 5 ways to hack any account and they all work but there are not easy and not 100% efficient but with time you can master them all. The ways Are
1): Key logging
2): Phising
3): Brute force
4): Social Engineering (I call it Hacking the human ;) )
5): Guessing the Security Password.
I will Post a detailed Articles about all these ways soon but summaries are as following.
KEYLOGGING: Keylogging is the way in which you sent a Keylogger remotely or install it on a computer to which you have Physical access. Keylogger is a Program that note down every thing a user write on a computer and some Keyloggers also capture the Pictures of the screen. SO with this way you can Know the Password that the user write.
Phising: Phising is the way in which a person is tricked to go to a Fake website exactly like the real one (e.g. Facebook). And if that person enter the password then the password is stored in the website that the Hackers can get. This way works very well with Stupids ;)
Brute Force: Brute force is the way of hacking in which software try every possible password. This way is 100% accurate but it can take millions of years to complete. So it is complete failure most of times.
Social Engineering: This way is really efficient with your friend whome you can trick to tell you the sensitive information like asking them to accept a keylogger an trick the to tell you their security Question’s answer.
Guessing the Security Password: This way can be the easiest or most difficult. But if you know the person then you can easily answer the question
Saturday, July 23, 2011
Posted by Anonymous
Facebook Cookie Stealing And Session Hijacking
THIS ARTICLE IS ORIGINALLY WRITTEN BY RAFAY BALOCH. HE BLOGS AT www.rafayhackingarticles.net
Three days ago I finished the series on Gmail Session Hijacking and Cookie Stealing , due to a tremendous response of readers I planned to write a post on Facebook cookie stealing and Session hijacking. Facebook session hijacking can also be accomplished via a very popular tool called Firesheep(On a Wifi Network Only), which I won't be explaining here because I have already written it before in my post Facebook Hacking Made Easy With Firesheep
In this tutorial I will explain you how an attacker can capture your authentication cookies on a local area network and use them to hack your facebook account, Before reading this tutorial I would recommend you to part1, part2 and part 3 of my Gmail Session Hijacking and Cookie stealing series, So you could have better understanding of what I am doing here.
How To Steal Facebook Session Cookies And Hijack An Account?
An attacker can use variety of methods in order to steal your facebook authentication cookies depending upon the network he is on, If an attacker is on a hub based network he would just sniff traffic with any packet sniffer and gain access to victims account.
If an attacker is on a Switch based network he would use an ARP Poisoning request to capture authentication cookies, If an attacker is on a wireless network he just needs to use a simple tool called firesheep in order to capture authentication cookie and gain access to victims account.
In the example below I will be explaining how an attacker can capture your authentication cookies and hack your facebook account with wireshark.
Step 1 - First of all download wireshark from the official website and install it.
Step 2 - Next open up wireshark click on analyze and then click on interfaces.
Step 3 - Next choose the appropriate interface and click on start.

Step 4 - Continue sniffing for around 10 minutes.
Step 5 - After 10minutes stop the packet sniffing by going to the capture menu and clicking on Stop.
Step 6 - Next set the filter to http.cookie contains “datr” at top left, This filter will search for all the http cookies with the name datr, And datr as we know is the name of the facebook authentication cookie.
Step 7 - Next right click on it and goto Copy - Bytes - Printable Text only.
In this tutorial I will explain you how an attacker can capture your authentication cookies on a local area network and use them to hack your facebook account, Before reading this tutorial I would recommend you to part1, part2 and part 3 of my Gmail Session Hijacking and Cookie stealing series, So you could have better understanding of what I am doing here.
- Gmail Cookie Stealing And Session Hijacking Part 1
- Gmail Cookie Stealing And Session Hijacking Part 2
- Gmail Cookie Stealing And Session Hijacking Part 3
Facebook Authentication Cookies
The cookie which facebook uses to authenticate it's users is called "Datr", If an attacker can get hold of your authentication cookies, All he needs to do is to inject those cookies in his browser and he will gain access to your account. This is how a facebook authentication cookie looks like:Cookie: datr=1276721606-b7f94f977295759399293c5b0767618dc02111ede159a827030fc;
How To Steal Facebook Session Cookies And Hijack An Account?
An attacker can use variety of methods in order to steal your facebook authentication cookies depending upon the network he is on, If an attacker is on a hub based network he would just sniff traffic with any packet sniffer and gain access to victims account.
If an attacker is on a Switch based network he would use an ARP Poisoning request to capture authentication cookies, If an attacker is on a wireless network he just needs to use a simple tool called firesheep in order to capture authentication cookie and gain access to victims account.
In the example below I will be explaining how an attacker can capture your authentication cookies and hack your facebook account with wireshark.
Step 1 - First of all download wireshark from the official website and install it.
Step 2 - Next open up wireshark click on analyze and then click on interfaces.
Step 3 - Next choose the appropriate interface and click on start.

Step 4 - Continue sniffing for around 10 minutes.
Step 5 - After 10minutes stop the packet sniffing by going to the capture menu and clicking on Stop.
Step 6 - Next set the filter to http.cookie contains “datr” at top left, This filter will search for all the http cookies with the name datr, And datr as we know is the name of the facebook authentication cookie.
Step 7 - Next right click on it and goto Copy - Bytes - Printable Text only.
Step 7 - Next right click on it and goto Copy - Bytes - Printable Text only.
Step 8 - Next you’ll want to open up firefox. You’ll need both Greasemonkey and the cookieinjector script. Now open up Facebook.com and make sure that you are not logged in.
Step 9- Press Alt C to bring up the cookie injector, Simply paste in the cookie value into it.
Step 10 - Now refresh your page and viola you are logged in to the victims facebook account.
Note: This Attack will only work if victim is on a http:// connection and even on https:// if end to end encryption is not enabled.
Countermeasures
The best way to protect yourself against a session hijacking attack is to use https:// connection each and every time you login to your Facebook, Gmail, Hotmail or any other email account. As your cookies would be encrypted so even if an attacker manages to capture your session cookies he won't be able to do any thing with your cookies.
Step 8 - Next you’ll want to open up firefox. You’ll need both Greasemonkey and the cookieinjector script. Now open up Facebook.com and make sure that you are not logged in.
Step 9- Press Alt C to bring up the cookie injector, Simply paste in the cookie value into it.
Step 10 - Now refresh your page and viola you are logged in to the victims facebook account.
Note: This Attack will only work if victim is on a http:// connection and even on https:// if end to end encryption is not enabled.
Countermeasures
The best way to protect yourself against a session hijacking attack is to use https:// connection each and every time you login to your Facebook, Gmail, Hotmail or any other email account. As your cookies would be encrypted so even if an attacker manages to capture your session cookies he won't be able to do any thing with your cookies.
Tuesday, July 12, 2011
Posted by Anonymous
How to set up Ardamax and make Remote Packages. [Tutorial] [VIDEO]
The first step is to download the Ardamax from http://hackthepc.blogspot.com/2011/04/ardamax-keylogger-v376-full-free-crack.html and install it.
After installation you will see the icon of Ardamax in the lower-left corner of the PC. Left-Click on it and goto "Options". Like shown below:
Then a Window will open. In this first 'Goto" Invisibility Tab. and TICK all the options as shown below. This will make the keylogger fully Invisible on the PC.
After that goto Option and select the Hotkey by which you will again open the Ardamax as shown below ,because it will no more visible any where.
Now the keylogger is fully Invisible and will record the keystrokes and pictures. You will need Hotkey to open this Viewer again.
============================================
Remote Package Creation
============================================
This part is easy just follow the following steps:
- Right-Click on the Ardamax icon and goto "Remote Installation.."
Then just click "Next" till you reach "Control", Here you select the information that will be sent.
Then click "Next" and you will come to the "Email" here fill the information about the email which will receive the information.
Then just click "Next" and then on the "Destination" page select the Icon of the Package, then click "Finish". Now you have completed the work. The package that has been created can now be sent to anyone and then it will sent you the Keystrokes and Pictures on the "Email" that you gave.
VIDEO TUTORIAL
===============
Wednesday, June 29, 2011
Posted by Anonymous
List of Default BIOS (Backdoor) Passwords.
If You have forgotten the real password of the BIOS then it is very difficult to get it back. One alternative is to guess the Backdoor Password which will give you access to the machine.
Award BIOS backdoor passwords:
ALFAROME
BIOSTAR
KDD
ZAAADA
ALLy
CONCAT
Lkwpeter
ZBAAACA
aLLy
CONDO
LKWPETER
ZJAAADC
aLLY
Condo
PINT
01322222
ALLY
d8on
pint
589589
aPAf
djonet
SER
589721
award
HLT
SKY_FOX
595595
AWARD_SW
J64
SYXZ
598598
AWARD?SW
J256
syxz
AWARD SW
J262
shift + syxz
AWARD PW
j332
TTPTHA
AWKWARD
j322
awkward
AMI BIOS Backdoor Passwords:
AMI
BIOS
PASSWORD
HEWITT RAND
AMI?SW
AMI_SW
LKWPETER
CONDO
Phoenix BIOS Backdoor Passwords:
PHOENIX
CMOS
BIOS
Misc. Common Passwords
BIOSTAR
biostar
biosstar
CMOS
cmos
LKWPETER
lkwpeter
setup
SETUP
Syxz
Wodj
Other BIOS Passwords by Manufacturer
Manufacturer----Password
VOBIS & IBM---- merlin
Dell------------Dell
Biostar-------- Biostar
Compaq----------Compaq
Enox------------xo11nE
Epox------------central
Freetech--------Posterie
IWill-----------iwill
Jetway----------spooml
Packard Bell----bell9
QDI-------------QDI
Siemens---------SKY_FOX
TMC------------BIGO
Toshiba--------Toshiba
Toshiba--------BIOS
Biostar--------Biostar-----Q54arwms
Compaq---------Compaq
Daewoo---------Daewuu
Daytek---------Daytec
Dell-----------Dell
Enox-----------xo11nE
Epox-----------central
Freetech-------Posterie
HP Vectra------hewlpack
IBM------------IBM---------MBIUO--------sertafu
Iwill----------iwill
[Tutorial] How to set up DarkComet 3[Detail Pics]
STEP 1:
First, go to the official website of Darkcomet, here. And click on "Download", like on this picture.
![[Image: darkcomet1.png]](https://lh3.googleusercontent.com/blogger_img_proxy/AEn0k_vRoQyl5_QVB84s5idWh7TiYNspNrSthaqbNSjCku7hN2uuGmmxjOmsOJEnAfssTnT42ZgLjghIF-PxSZxbkXsefi1BYsU4GoH4j8rZd8FIcA1uYta6OoD4qQ=s0-d)
STEP 2:After clicking "Download", choose the version of DarkComet that you want on the following image, I choose DarkComet FWB 3.2.
![[Image: darkcomet2.png]](https://lh3.googleusercontent.com/blogger_img_proxy/AEn0k_s-cv89otE-Zh5kx2WT-kExRQJxlhCLJJguhQebgcnnElIhSn_KLn2-udOl6F8xzWiSF8gWSMs2o-8o0_iYKVt6M8bUMdM7V8NjEF3QDbhAnFJp2wh7kDM=s0-d)
STEP 3:Check all before downloading.
![[Image: darkcomet3.png]](https://lh3.googleusercontent.com/blogger_img_proxy/AEn0k_uZBF6TCQYDCk20IPrlb0QZgf9ED4VkjhSD38fDaNSocq082ZYiSveB5c2eT3wCewfKySsvpYNc1wt91rmGwVXcwHp9LHVpLECvGsb7FSy9tbabFPkOLw=s0-d)
STEP 4:After starting DarkComet you must accept the "Terms and condition".
![[Image: darkcomet4.png]](https://lh3.googleusercontent.com/blogger_img_proxy/AEn0k_uZySf8bYmhuMAchPUxKQIfZjJhr4utUyldYEoxbUespZFGbVlSLR6BLJfEgMxEP_uwilDcFRDit3UNhiTXiKPIaINJp0sInXViiL6gdiimaxki8-s8v-3k=s0-d)
STEP 5:Now, let Darkcomet aside for a moment, You need to register No-IP, by clicking here.
After completing your registration form, you must go on "Manage Hosts".
![[Image: darkcomet5.png]](https://lh3.googleusercontent.com/blogger_img_proxy/AEn0k_tsvE5uG54ZcyDeyclZRhXflQvyxX0BXlml7L3FYbHLezBM-N5WqaNil8XRhYYb9Fbo7ifCGeRpoJULk-79ovuqXYQ0smLTyhrGDfC9eQ-hhKOseLC9y5raSQ=s0-d)
STEP 6:Now click on "Add a Host".
![[Image: darkcomet6.png]](https://lh3.googleusercontent.com/blogger_img_proxy/AEn0k_tIrus9eQbHq6F8V4aQNnpTaG5Qj6yvLsKJDuJEvb_GbUSLvylw3vmgqMb_PIkIvyewE4h8DiID2GoXxMXVOpXhPSkCNcQ99EKRgQq6HGTcl2it2m5vd6tS=s0-d)
STEP 7:After clicking "Add a Host" you must choose a "Hostname".
![[Image: darkcomet7.png]](https://lh3.googleusercontent.com/blogger_img_proxy/AEn0k_tgWSxaoQFEEATTrEtW7lKcE6SmvFccSD4BJGeFXfUtffUZsXhlVeLPL7kahSD0GDYGG4KkAEsI_DtMtmSEgewQIUEuU3SQ-0ZEPwaXmP9U1bj3LonqcKqDHQ=s0-d)
STEP 8:Now you'll need to download "No-IP Dynamic Update Client v3.0.4" but in first, choose your "Operating System".
![[Image: darkcomet8.png]](https://lh3.googleusercontent.com/blogger_img_proxy/AEn0k_sEwbtcR5gBBF7DKZFY1xoh3dMolL84PVeWfV4BZpgRYOzOZjw5UazxSi5NUIJO0XBJGtNG8zaDVxwDvP1YRskK2C8vzrE0kJHTxdSsZTRzj2XJe9iRzYYi=s0-d)
STEP 9:Now that you've chosen your "Operating System"you can download.
![[Image: darkcomet9.png]](https://lh3.googleusercontent.com/blogger_img_proxy/AEn0k_t_bjZbCGrkJU2CCt_5nbfKMSERGMeaIcIN9BXj2m3-ePnOnTZSc4K6TqX15_dpCylRp4kkUOxawiPE8I77vpKbNbDmn1konlwo2sPklwBIUQw2Cvjj9nc=s0-d)
STEP 10:Now, you'll need to install No-IP.
![[Image: darkcomet10.png]](https://lh3.googleusercontent.com/blogger_img_proxy/AEn0k_tlUF-fHJPmIiqXeXnUTAfdYaWQwrWUex8aTdAS7iGziH6ItceubJP8nf5P0L5-nS97xrJnSOW8KFFq-MyM3axJLKNIjmuxnM2YCyRt4l4lvzRp6bgwaRCE_d8=s0-d)
STEP 11:Now, choose the install location and click on "Next >".
![[Image: darkcomet11.png]](https://lh3.googleusercontent.com/blogger_img_proxy/AEn0k_tIWAyDHsNZKf2jyd340oJTgucsI0mU16C8VvsliKjXFyv330FEYz0818LagJR9tW-kcHwaCV1PgzaNPq2S_reu6UIoZPZ8z39EId0dcScUPXpLQmMtFiHQTeQ=s0-d)
STEP 12:Now, choose start menu folder, and click on Install.
![[Image: darkcomet12.png]](https://lh3.googleusercontent.com/blogger_img_proxy/AEn0k_vRe06rJz1E2uHTenwtmo6ThYCDptojNdYbhwFruG4Lo6GbEKhuqipMrO2TJiyWXXwmtW7IuOCZDXTZo_b2n2YjcrC-pQ6V5R9xjQ9thu_WzqMFmBj_1Av5=s0-d)
STEP 13:Now you will configure No-Ip, start it and enter your E-mail address & password entered on No-IP.org.
![[Image: darkcomet13.png]](https://lh3.googleusercontent.com/blogger_img_proxy/AEn0k_t4UibSat4U-O94aHv6NMEiMGsoB2cQ82u5tICvnNQm9t5VrKIRYvQ8b7Aay3DZie-3XrxwMHil6Xs0z0dMkOTp3TvptEetsOoONuMRbNzX4yog4EwqWPEDj8Q=s0-d)
STEP 14:Now you must select you Host, check you Host and click on Save.
![[Image: darkcomet14.png]](https://lh3.googleusercontent.com/blogger_img_proxy/AEn0k_uwsqdhgTFOLJLE2oVoW3iAxAkRDZbcR3MIEy_m-vIfUXMywaJ_S4ObT1CvGCED2GWmKz43nQQPNP9CEUzO77uFeN2ljzhsuFqA20uvD_sMriYViCLk_Dgg3Q=s0-d)
STEP 15:It's OK, you can start up DarkComet 3.2 FWB. Now you must add server socket.
![[Image: darkcomet15.png]](https://lh3.googleusercontent.com/blogger_img_proxy/AEn0k_uPQAWzt5UoehrevjY2I6nwS1-uR7l9uolSFl--bRJmb_q4Vuz7otEWSUeoYT4WumxSGA3TQGX-372b5YIsRRul9Fuv2PiHD-rXqfeLzMp5f9HMliZiD7KvJeU=s0-d)
STEP 16:Now you edit your server, you will choose the "Server module (634,50 KB)".
After clicking on "Server module (634,50 KB) a window called "Server Editor - Installer version <3.0.2>" will appear.
![[Image: darkcomet16.png]](https://lh3.googleusercontent.com/blogger_img_proxy/AEn0k_tFK8vHK_mlllK7LDlnNBFfQeVMUJCehPa8EGQOdglfxEpckTnLVP28fhCpNc4IWL_SNLZeSepAn_GdtiwKKETzeR2cs3QQpD7_e-CVfptHNzDGJeJGGD5cFg=s0-d)
STEP 17:Now you start to edit the server.
![[Image: darkcomet15.png]](https://lh3.googleusercontent.com/blogger_img_proxy/AEn0k_uPQAWzt5UoehrevjY2I6nwS1-uR7l9uolSFl--bRJmb_q4Vuz7otEWSUeoYT4WumxSGA3TQGX-372b5YIsRRul9Fuv2PiHD-rXqfeLzMp5f9HMliZiD7KvJeU=s0-d)
STEP 18:Now, must enter your No-IP and test it, if the message is green, it's OK.
After, you can click on "Build module".
![[Image: darkcomet18.png]](https://lh3.googleusercontent.com/blogger_img_proxy/AEn0k_uZ9q4CKsnp_ObHdbieECxC2Jqeo9UgKD5mRcHYoFGgCUI_icyvC7YsnVfI_1aDeN0QyIjMk7SA3NVOA6sGv0QkNrEjpskRmUZl1-FJRXgcYvprJKToyR_7iw=s0-d)
STEP 19:Now, you can create the server, save it, and open it.
![[Image: darkcomet19.png]](https://lh3.googleusercontent.com/blogger_img_proxy/AEn0k_vtnMn0grOn6PhpF1tHu_LoPes4pEm7GljEiRDzFglA8TkszpLV6Umk6KHC_ydQOlX2ZX4vDP-fMfxmoUWHIDj1UBPqw72_6TWQYhU8fXcpKnTYSi5kdr9r=s0-d)
STEP 20:By opening your server, if it worked,a message at the bottom right of your screen will appear.
![[Image: darkcomet20.png]](https://lh3.googleusercontent.com/blogger_img_proxy/AEn0k_szi8JwCYn7XtrRYbJ_GNmTsWyUQsGWVeY4-VF_Rdg1eBVO8fvM8be0ZLtq_atKjScFSU2rKDYHomFHsM2x_bVM0IZLCS63bvMqibzdoQcWALXpC-tK9lgU2kI=s0-d)
Here is the final result.
![[Image: darkcomet21.png]](https://lh3.googleusercontent.com/blogger_img_proxy/AEn0k_tqHJRI7yw5ktZZBNsDKVPY3FJlSMEaQSF15eqB2sp9uODcX8rRlcAxDdO3nnZm1UNF_4nSR_bg0TBczjPxcZEJSZnzsD0et-Pw8Lkvu9BoolOu5BtFtJDujlY=s0-d)
Now the server is set up and totally ready.
====================================================================
This article was originally published on :: http://www.hackforums.net/showthread.php?tid=1218482 and written by :: XxHaTeD-RaTeDXx
+++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
First, go to the official website of Darkcomet, here. And click on "Download", like on this picture.
STEP 2:After clicking "Download", choose the version of DarkComet that you want on the following image, I choose DarkComet FWB 3.2.
STEP 3:Check all before downloading.
STEP 4:After starting DarkComet you must accept the "Terms and condition".
STEP 5:Now, let Darkcomet aside for a moment, You need to register No-IP, by clicking here.
After completing your registration form, you must go on "Manage Hosts".
STEP 6:Now click on "Add a Host".
STEP 7:After clicking "Add a Host" you must choose a "Hostname".
STEP 8:Now you'll need to download "No-IP Dynamic Update Client v3.0.4" but in first, choose your "Operating System".
STEP 9:Now that you've chosen your "Operating System"you can download.
STEP 10:Now, you'll need to install No-IP.
STEP 11:Now, choose the install location and click on "Next >".
STEP 12:Now, choose start menu folder, and click on Install.
STEP 13:Now you will configure No-Ip, start it and enter your E-mail address & password entered on No-IP.org.
STEP 14:Now you must select you Host, check you Host and click on Save.
STEP 15:It's OK, you can start up DarkComet 3.2 FWB. Now you must add server socket.
STEP 16:Now you edit your server, you will choose the "Server module (634,50 KB)".
After clicking on "Server module (634,50 KB) a window called "Server Editor - Installer version <3.0.2>" will appear.
STEP 17:Now you start to edit the server.
STEP 18:Now, must enter your No-IP and test it, if the message is green, it's OK.
After, you can click on "Build module".
STEP 19:Now, you can create the server, save it, and open it.
STEP 20:By opening your server, if it worked,a message at the bottom right of your screen will appear.
Here is the final result.
Now the server is set up and totally ready.
====================================================================
This article was originally published on :: http://www.hackforums.net/showthread.php?tid=1218482 and written by :: XxHaTeD-RaTeDXx
+++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Sunday, April 17, 2011
Posted by Anonymous
0 Crypter FREE FUD to Crypt your Keyloggers
[ Description ]
This Crypter Crypt your Keyloggers and RATs and make them undetected from Antivirus.Coded in : VB.Net
Dependencies : Framework 2.0
Works On : Windows XP/Vista/7 (32/64bit)
RunPE : Private Method
Dependencies : Framework 2.0
Works On : Windows XP/Vista/7 (32/64bit)
RunPE : Private Method
Tested & Working With :
- BlackShades
- CyberGate
- DarkComet
- Spy-Net
- Cerberus
- iStealer 6.0
- iStealer 6.3
- .NET Files
Credits :
- Kobac (<3 <3 <3 Hidden Techniques of the Lost Ninjas & RunPE method ^_^ )
- Aeonhack (Awesome Theme)
RESULTS: 0/33
AVG Free OK
ArcaVir OK
Avast 5 OK
Avast OK
AntiVir (Avira) OK
BitDefender OK
VirusBuster Internet Security OK
Clam Antivirus OK
COMODO Internet Security OK
Dr.Web OK
eTrust-Vet OK
F-PROT Antivirus OK
F-Secure Internet Security OK
G Data OK
IKARUS Security OK
Kaspersky Antivirus OK
McAfee OK
MS Security Essentials OK
ESET NOD32 OK
Norman OK
Norton Antivirus OK
Panda Security OK
A-Squared OK
Quick Heal Antivirus OK
Rising Antivirus OK
Solo Antivirus OK
Sophos OK
Trend Micro Internet Security OK
VBA32 Antivirus OK
Vexira Antivirus OK
Webroot Internet Security OK
Zoner AntiVirus OK
AhnLab V3 Internet Security OK
File Name zavrsenposo.exe
File Size: 507904
File MD5: dac6299403506538e107b05a993ba209
File SHA1: 2210fda136ead624eec7b0a93c13beb9e2d141e4
Check Time: 2011-03-21 15:00:37
http://scan4you.net/result.php?id=9e7d7_8dfsb
DOWNLOAD LINK: http://www.mediafire.com/?byuhtdbj4pit8pn
OLD DOWNLOAD LINK :
OLD PASSWORD :
Monday, March 21, 2011
Posted by Anonymous








