Share |
--- Welcome To Sky Net - The Organization of Hackers ---

Monday, August 6, 2012

Harvest Moon BTN Hack Mode


Harvest Moon Back To Nature Hack Mode
Click This To Download
Run the trainer when the game is started
***
This Trainer used :
-VEH Debugger
-Injection Script
Target Process : psxfin.exe
Game Name : Harvest Moon Back To Nature (PS1/PSX)
Created : 06/08/2012

Saturday, July 21, 2012

AntI ProRAT 2.5

Jika komputer anda terkena virus prorat gunakan software ini untuk memperbaiki nya
AntI ProRAT 2.5
Salah satu contoh terinfeksi prorat : Tidak bisa mengaktifkan windows firewall

How to make a trojan undetectable

Many of the friends may be knowing to create a Trojan virus but the main parts that comes to picture to make it undetectable or FUD.There are many ways that allow you make a Trojan virus undetectable and allow you to run/inject into victim's computer.
Here i am posting few of them and most popular as well as working method.

Hex Editing to make Trojans Undetectable:-Basic Guide

You may not be knowing what is hex editing here is the details.Many of you may know other ways of hiding virus too like using public cyptors which I will be posting soon here on DARKSITE. Many of you also asked that how to hide a Trojan or your created server in key loggers so that the antivirus of the victim may not identify the virus and he may not get warned.Here is the tutorial that explain how the hackers make Trojan Undetectable and how can you be fooled by hackers too as they may fool your antivirus, So, its necessary that you should have this knowledge as the view of security.

What is Hex editing?

Auto Like Facebook 2012

 Pertama anda harus punya browser mozilla firefox dulu
 Download Mozilla Terbaru
 Setelah itu, anda harus instal add ons Grease Monkey
 Download Grease Monkey
 klik add to firefox, tunggu prosesnya lalu klik instal
 setelah itu tutup llalu buka lagi firefox anda (restart)
 lalu klik di bawah ini untuk download scriptnya...
 Download Script
 Tunggu 3 detik, lalu klik install
 ok, selesai, coba buka facebook
 menu like akan muncul di sebelah kiri browser anda

Tuesday, July 17, 2012

Collection of best tools to perform email bombing on email account

An e-mail bombing is the technique of sending of a massive amount of e-mail to a specific person or system.may be lakhs of e-mail at a go. A huge amount of mail may simply fill up the recipient's disk space on the server or, in some cases, may be too much for a server to handle and may cause the server to stop functioning. In the past, mail bombs have been used to "punish" Internet users who have been egregious violators of netiquette (for example, people using e-mail for undesired advertising, or spam).

FBI Inspection Tool worlds most Wanted Software

This a pack of system tools which are used by FBI to analyse and inspect other computers. These must be used only educational purpose, please don't misuse the tools.
These tools are worlds most wanted software now its for free...
these tool is being used by FBI For performing computer forensics activity.


Tools that are included in this pack are:


ADS Locator (Alternate Data Streams)
Historian 1.4 (Browser Analyze)
Disc Investigator 1.4 (File-Slack-Analyze)
Live View 0.6 (System Analyze)
MUI Cacheview 1.00 (Registry Analyze)
Network miner 0.85 (Network A
nalyze)
Regripper 2.02 (Registry Analyze)
System report 2.54 (PC Analyze)
USB-History R1 (USB-Stick-Analyze)
Windows File Analyzer (File Analyze)
Winpcap 4.02 (Network)

Now comes the download link part download it from link below.

FBI Internet Tool

Torrent download link

Best Browser for hacking with inbuilt feature of hacking

Hello friends today i am posting an article on hackers web Browser with built in features for hackers.
"OWASP Mantra Browser for security Framework for penetration testers"


So lets discuss what is this. Mantra Browser is a most Recommended Browser for hackers and penetration Testers. It includes security framework which can be very useful to scan various web servers or websites for different attacks like sql injection and XSS attacks.