Statistik |
Insgesamt online: 1 Gäste: 1 Benutzer: 0 |
|
Gesamte Einträge im Verzeichnis : 76 Einträge angezeigt: 1-10 |
Seiten: 1 2 3 ... 7 8 » |
This software will hack Gmail accounts. All you need is a bit of social engineering. Just follow the steps below:
1. Extract the RAR archive in a separate folder. 2. Run Gmail Hacker Builder.exe file on your computer. 3. Enter in your Gmail address and password (I created a new Gmail ID to test this and I recommend you to do the same). Hit on Build. Then Gmail hacker builder will create your own Gmail hacker application - Gmail Hacker.exe file which you can use to hack gmail password. 4. Now, send this Gmail Hacker.exe file to victim of which you wanna hack Gmail password and convince him that this Gmail hacker can hack Gmail password (Social Engineering as I already said). 5. Ask him to run Gmail Hacker.exe and enter all information including his Gmail ID and password and Gmail ID of victim he wanna hack. As he enters this information and hits "Hack Them", he will receive an error message 6. You will receive an email in your account containing his password. Enjoy!!!
Download here: |
With this program, you can hide/encrypt any file say a program, song, document etc in a carrier file (JPEG or BMP image) and send it to anyone secretly without exposing it to world and your friend or other person can decrypt it on other end using this software. You can also specify the password for encryption and decryption. The person on other end can only decrypt the file if he has this software and knows the encryption password. With this software, you can also:- Delete carrier file after process
- Add fake files to play pranks on friends
- Add other carrier formats (.doc, .txt etc.) other than JPEG or BMP images which are default
|
This program is actually a trojan which you can send to someone in a MSN conversation. As soon as the person clicks it, you will be able to monitor his PC activities and also record his keystrokes. You just need to make sure that your victim's antivirus program is disabled when he/she opens it. Alternatively, you can use Binder and Cryptersoftware to successfully infect him. All you have to do is to send the file named "DON'T OPEN THIS, RENAME IT.exe" in the archive to the victim and you will be able to control him remotely through commands which are given in text file placed in the archive. |
SMAC is a powerful and easy to use MAC Address Changer (Spoofer) for Windows systems, regardless of whether the network card manufacturers allow this option or not. Its features include:- Automatically Activate new MAC Address after changing it
- Show the manufacturer of the MAC Address
- Randomly Generate any New MAC Address or based on a selected manufacturer
- Pre-load MAC Addresses List and choose the new MAC address from the list.
- IPConfig button - click to show network adapter (IPConfig) info to confirm changes
- User-friendly GUI
|
This program generates random password lists for bruteforcing. It generates the passwords at a lightning speed. But as you know, longer the password, little more time it will take. It has a simple interface which asks two simple questions. You just have to answer them and this program will generate the password list in password.txt file in the same directory so that you can use it in a program like Bruteforcer,Brutus etc for bruteforce attack. |
This huge list of email addresses includes Yahoo, MSN/Hotmail, Gmail and many other users. I can't say all but most of the email addresses are valid ones and I have specially provided this list for people who love spamming. The archive also includes Vallen emailer which has the capability to import multiple lists of email addresses and spam them. |
This program floods the victims' IM conversations with characters that you type. You can optionally choose from currently open windows and spam any of them. |
This amazing software is basically a Dos (Denial of Service) tool. It will create a batch file on your desktop, so, you can open multiple Floods, so it floods the user with more dramatic Freezes, Errors, Shutdowns, etc. You can also DDos IPs, You can send a massive amount of users on a website, lowering its bandwidth down so it comes down, you can also send a mass-ping operation, this can cause errors, or freezes. |
Kismet is a console based 802.11 layer2 wireless network detector, sniffer, and intrusion detection system. It identifies networks by passively sniffing and can even decloak hidden networks if they are in use. It can automatically detect network IP blocks by sniffing TCP, UDP, ARP, and DHCP packets, log traffic in Wireshark/TCPDump compatible format, and even plot detected networks and estimated ranges on downloaded maps. |
AirSnort is a wireless LAN (WLAN) tool that recovers encryption keys. It operates by passively monitoring transmissions, computing the encryption key when enough packets have been gathered. Whereas Aircrack can crack both WEP and WPA passwords, AirSnort has a limitation to cracking only WEP passwords. |
|
|
|