How to get 1000 likes on your facebook status for free | 100% working

Monday, 25 June 2012


watch my video tutorial on youtube :http://adf.ly/9jmCR
click here to goto the bot & skip ads : http://adf.ly/9jm4l

How to get 1000 likes on your facebook status for free



Use at your own risk :P:P!!!

How to Bind a virus(keylogger/trojan) with any other file | Binders Free download

                  


What is Binder?
Bridges the Gap between XML and Code (C++,C#,Java,VB6,VB.Net). Generates a class library based on an XML Schema (XSD, XDR or DTD). The resulting library makes it simple to read and write XML documents programmatically. Drastically cutting time spent developing and testing. Because the class library is strongly typed you can also make use of intelligence. The library forces compliance to the schema resulting in valid XML every time. Simple words it converts your code and forms into an executable program.
Why Hackers use Binder?
It’s simple. They bind the virus with another clean for example (.exe) to make the virus undetected to anti-virus software. Many binders has extra features like add bytes, change icons, etc. to make them more undetected. You can go to stuff page and download the binder to see how it’s work. Of course is detected from some anti-virus use it for education purpose.
How you can protect from a mask virus?
You can’t! Binders is usually detected very fast from good anti-virus software’s, when you open some binded virus your anti-virus software will probably show you (injection). If your anti-virus software is not detect the virus or the binder the only think you have to do is to confront it as a simple virus.


A good list of my binder collection Free download :
 3   nbinder
 4   sbinder

Operating System Developed by Anonymous | Anonymous-Os 0.1

A
nonymous-OS 0.1 : Anonymous Hackers released their own Operating System 
Anonymous-OS+0.1

Yes! Its true,  Anonymous Hackers released their own Operating System with name "Anonymous-OS", is Live is an ubuntu-based distribution and created under Ubuntu 11.10 and uses Mate desktop. You can create the LiveUSB with Unetbootin.

Pre-installed apps on Anonymous-OS:
- ParolaPass Password Generator
- Find Host IP
- Anonymous HOIC
- Ddosim
- Pyloris
- Slowloris
- TorsHammer
- Sqlmap
- Havij
- Sql Poison
- Admin Finder
- John the Ripper
- Hash Identifier
- Tor
- XChat IRC
- Pidgin
- Vidalia
- Polipo
- JonDo
- i2p
- Wireshark
- Zenmap
…and more

Download Anonymous-OS 0.1Warning : It is not developed by any Genuine Source, can be backdoored OS by any Law enforcement Company or Hacker. You at your own Risk.

Hacking With Android | (Anti) Android Network Tool Kit



Have an android phone, Looking for easy ways to hack like pentesters ?? Well you are in luck, Anti or Anti or Android networking Tool Kit  is Just what the world needs, another killer mobile app for android devices, Anti allows you to control other devices such as Desktop PC, other Android Phones and even iOS devices with just a few pushes






Anti - Android Network Tool Kit


Android Network Toolkit (ANTI) is an amazing android application. You could bring all the hacking tools on PC to your Android smartphone. Using this app is as simple as pushing a few buttons, and then you can penetrate your target.


How Anti Works ?
Anti will map your network, scan for active devices and vulnerabilities, and will  display the information accordingly, Green led signals an 'Active device', Yellow led signals "Available ports", and Red led signals "Vulnerability found". Also, each device will have an icon representing the type of the device. When finished scanning, Anti will produce an automatic report specifying which vulnerabilities you have or bad practices used, and how you can exploit/fix each one of them.




                                                        






Features


Scan - This will scan the selected target for open ports and vulnerabilities, also allowing the user to select a specific scanning script for a more advanced/targeted scan.


Spy - This will 'sniff' images transferred to/from the selected device and display them on your phone in a nice gallery layout. If you choose a network subnet/range as target, then all images transferred on that network - for all connected devices - will be shown. Another feature of the Spy plugin is to sniff URLs (web sites) and non-secured (ie, not HTTPS) username/passwords logins, shown on the bottom drawer.


D.O.S - This will cause a Denial Of Service (D.O.S) for the selected target, ie. it will deny them any further access to the internet until you exit the attack.


Replace images - This will replace all images transferred to/from the target with an Anti logo, thus preventing from attacked used seeing any images on their browsers while the browse the Internet, except for a nice looking Anti logo...


M.I.T.M - The Man In The Middle attack (M.I.T.M) is an advanced attack used mainly in combination with other attack. It allows invoking specific filters to manipulate the network data. Users can also add their own mitm filters to create more mitm attacks.


Attack - This will initiate a vulnerability attack using our Cloud service against a specific target. Once executed successfully, it will allow the attack to control the device remotely from your phone.


Report - This will generate a vulnerability report with findings, recommendations and tips on how to fix found vulnerabilities or bad practices used.




For more info and Download details please visit the Following link


                       Download (Anti)Android Network Tool Kit

How to chat on facebook with operamini | no application required



                                         



Hello facebook users :) 
Now you can chat on facebook using Opera mini 
No other applications needed
 
Just login to facebook and open this link 
 
click here  (skip ads)
 
Happy chatting :)  

Must Read For All Who Are In Desparate Need Of Web Traffic

Sunday, 17 June 2012



Are you a website or blog owner working hard to generate traffic to your website or you are an internet marketer who is struggling to generate traffic to his/her web page so that his/her online venture should turn into money making game. Then here is a system that guarantees you hits and conversions from your online ventures. And the best part of its 100% free. I joined this system 7 days ago and I was able to pull out 922 page-views with with 441 unique page hits in just 7 days to my brand new website. Believe me that's not joke at all pulling out 922 hits in just 7 days. I personally recommend you to join this system and see results all by your own eyes I guarantee you it does works and the best part about it is its free. You don't need credit card or Paypal account to join this system registration is just clicks away.
Though paid membership is also available which guarantees double return than free membership but don't pay until you see results all by yourself while working free on it. When you will log-in to your account you will be asked to have a look on a 24 minute tutorial which will guide you though system. Please don't skip a part of it because each step means more traffic. For more information click following link.

SSL And TLS Attacks | Weak Ciphers

SSL And TLS Attacks | Weak Ciphers


Both SSL and TLS protocols works on the basis of Public Key Infrastructure (PKI) and commonly includes key exchange algorithm to handle security. Apart from just CA authority the strength of SSL cipher depends on length of key, encryption algorithm used to encipher data and Message Authentication Code (also known as SSL MAC). In this post we will have our look on how key length could effect on cipher strength. So depending on the length of initial key generated for data exchange during SSL and TLS communication, ciphers can be divided into following categories.