Jika komputer anda terkena virus prorat gunakan software ini untuk memperbaiki nya
AntI ProRAT 2.5
Salah satu contoh terinfeksi prorat : Tidak bisa mengaktifkan windows firewall
Saturday, July 21, 2012
AntI ProRAT 2.5
Category: Anti Virus
How to make a trojan undetectable
Here i am posting few of them and most popular as well as working method.
Hex Editing to make Trojans Undetectable:-Basic Guide
You may not be knowing what is hex editing here is the details.Many of you may know other ways of hiding virus too like using public cyptors which I will be posting soon here on DARKSITE. Many of you also asked that how to hide a Trojan or your created server in key loggers so that the antivirus of the victim may not identify the virus and he may not get warned.Here is the tutorial that explain how the hackers make Trojan Undetectable and how can you be fooled by hackers too as they may fool your antivirus, So, its necessary that you should have this knowledge as the view of security.What is Hex editing?
Category: Hacking
Auto Like Facebook 2012
Pertama anda harus punya browser mozilla firefox dulu
Download Mozilla Terbaru
Setelah itu, anda harus instal add ons Grease Monkey
Download Grease Monkey
klik add to firefox, tunggu prosesnya lalu klik instal
setelah itu tutup llalu buka lagi firefox anda (restart)
lalu klik di bawah ini untuk download scriptnya...
Download Script
Tunggu 3 detik, lalu klik install
ok, selesai, coba buka facebook
menu like akan muncul di sebelah kiri browser anda
Category: Info
Tuesday, July 17, 2012
Collection of best tools to perform email bombing on email account
An e-mail bombing is the technique of sending of a massive amount of e-mail to a specific person or system.may be lakhs of e-mail at a go. A huge amount of mail may simply fill up the recipient's disk space on the server or, in some cases, may be too much for a server to handle and may cause the server to stop functioning. In the past, mail bombs have been used to "punish" Internet users who have been egregious violators of netiquette (for example, people using e-mail for undesired advertising, or spam).
Category: Software
FBI Inspection Tool worlds most Wanted Software
This a pack of system tools which are used by FBI to analyse and inspect other computers. These must be used only educational purpose, please don't misuse the tools.
These tools are worlds most wanted software now its for free...
these tool is being used by FBI For performing computer forensics activity.
Tools that are included in this pack are:
ADS Locator (Alternate Data Streams)
Historian 1.4 (Browser Analyze)
Disc Investigator 1.4 (File-Slack-Analyze)
Live View 0.6 (System Analyze)
MUI Cacheview 1.00 (Registry Analyze)
Network miner 0.85 (Network A
Regripper 2.02 (Registry Analyze)
System report 2.54 (PC Analyze)
USB-History R1 (USB-Stick-Analyze)
Windows File Analyzer (File Analyze)
Winpcap 4.02 (Network)
Now comes the download link part download it from link below.
FBI Internet Tool
Torrent download link
Category: Software
Best Browser for hacking with inbuilt feature of hacking
Hello friends today i am posting an article on hackers web Browser with built in features for hackers.
"OWASP Mantra Browser for security Framework for penetration testers"
So lets discuss what is this. Mantra Browser is a most Recommended Browser for hackers and penetration Testers. It includes security framework which can be very useful to scan various web servers or websites for different attacks like sql injection and XSS attacks.
Category: Software
Hack Windows Connected Telnet Server
Hack Windows Connected Telnet Server : Video Tutorial
and connect by Telnet to Login in Dos server windows .
Download This Video Tutorial From Below(click On The Download Box):
Tutorial by T3es